This rule focuses on restricting ingress access on common ports for VPC security groups.
Rule | VPC security groups should restrict ingress access on ports 20, 21, 22, 3306, 3389, 4333 from 0.0.0.0/0 |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ High |
Rule Description
This rule is designed to ensure that the ingress access on specific ports (20, 21, 22, 3306, 3389, 4333) for a VPC's security group is restricted to a specific source IP range (0.0.0.0/0). This rule is in compliance with the FedRAMP Moderate Revision 4 requirements for securing VPCs. By implementing this rule, the VPC's security is enhanced by only allowing incoming connections on these ports from the specified source IP range.
Troubleshooting Steps (if applicable)
Check the VPC's security group configuration to verify if the ingress access rule exists.
Ensure that the specified ports (20, 21, 22, 3306, 3389, 4333) are correctly defined in the ingress access rule.
Verify if the source IP range for the ingress access rule is set to 0.0.0.0/0.
Review any error messages or warnings generated by the VPC's security group.
Necessary Codes (if applicable)
There are no specific codes or scripts required for this rule.
Step-by-Step Guide for Remediation
Open the AWS Management Console and navigate to the VPC service.
Select the VPC for which you want to configure the security group.
In the left sidebar, click on "Security Groups."
Identify the security group that needs to be updated to enforce the ingress access rule.
Select the desired security group and click on "Inbound Rules."
Look for existing rules that allow access on ports 20, 21, 22, 3306, 3389, 4333.
If there are any existing rules allowing ingress access on these ports from 0.0.0.0/0, skip to step 10.
Click on "Edit inbound rules" to modify the existing rules.
Remove any rules that allow ingress access on ports 20, 21, 22, 3306, 3389, 4333 from different source IP ranges.
Click on "Add rule" to create the new ingress access rule.
Set the following values for the new rule:
Click on "Save rules" to apply the changes.
Verify that the new ingress access rule is enforced correctly by reviewing the security group's inbound rules.
Test the connectivity to the VPC on ports 20, 21, 22, 3306, 3389, 4333 from a different source IP to ensure the rule is working as expected.
Additional Notes