This rule ensures VPC security groups restrict ingress access on specific common ports to enhance security measures.
Rule | VPC security groups should restrict ingress access on ports 20, 21, 22, 3306, 3389, 4333 from 0.0.0.0/0 |
Framework | GxP 21 CFR Part 11 |
Severity | ✔ High |
VPC Security Groups Ingress Access Restriction Rule
Description
The rule requires that the ingress access to specific ports (20, 21, 22, 3306, 3389, and 4333) within your VPC security groups should be restricted to only allow connections from a specific IP range (0.0.0.0/0). This rule is enforced to comply with the guidelines set forth by GxP 21 CFR Part 11, which ensures the integrity and confidentiality of electronic records and signatures.
Troubleshooting Steps
In case of issues, the following troubleshooting steps can be taken:
0.0.0.0/0
) is accurately defined for the allowed ingress traffic.Necessary Code
No code is required for this rule, as it relies on configuring the security group rules within the AWS console or using AWS CLI commands.
Remediation Steps
To remediate the non-compliance with the VPC security group ingress access restriction rule, follow these steps:
Open the AWS Management Console or connect to the AWS CLI.
Navigate to the EC2 service.
Select "Security Groups" from the left-hand menu.
Locate the appropriate security group associated with the instances that need to be updated.
Select the security group and click on "Inbound Rules" or "Inbound" tab.
Identify any existing insecure inbound rules that allow unrestricted access (0.0.0.0/0) on ports 20, 21, 22, 3306, 3389, and 4333.
Remove the existing rules that allow unrestricted access (0.0.0.0/0) on the specified ports.
Click on the "Add rule" button to create new inbound rules and restrict access as necessary.
For each required port (20, 21, 22, 3306, 3389, and 4333), add a new rule with the following details:
0.0.0.0/32
for a specific IP address or 0.0.0.0/0
for all IP addresses).Repeat step 9 for each required port mentioned in the policy.
Review the new inbound rules to ensure they match the intended restrictions.
Click on the "Save" or "Apply" button to persist the changes.
The VPC security group will now restrict ingress access on ports 20, 21, 22, 3306, 3389, and 4333 only to the specified IP range (0.0.0.0/0), as required by the GxP 21 CFR Part 11 policy.