Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: EBS Snapshots Should Not Be Publicly Restorable

This rule requires that EBS snapshots should not be publicly restorable for security measures.

RuleEBS snapshots should not be publicly restorable
FrameworkHIPAA
Severity
Medium

Rule Description:

The rule states that Elastic Block Store (EBS) snapshots should not be publicly restorable to comply with the Health Insurance Portability and Accountability Act (HIPAA) regulations. This ensures that sensitive data stored in EBS snapshots remains secure and protected from unauthorized access or exposure to the public.

Troubleshooting Steps:

If EBS snapshots are found to be publicly restorable, the following troubleshooting steps can be taken:

  1. 1.

    Confirm the public restorability status: Verify whether the EBS snapshots are indeed publicly restorable by checking the snapshot attributes and permissions.

  2. 2.

    Review AWS Identity and Access Management (IAM) policies: Examine the IAM policies associated with the affected EBS snapshots to determine if any misconfiguration is present that allows public restorability.

  3. 3.

    Investigate AWS Resource Access Manager (RAM) settings: Check if the AWS Resource Access Manager (RAM) permissions are allowing public access to the EBS snapshots.

  4. 4.

    Audit AWS Security Groups: Analyze the security group settings associated with the instances using the EBS snapshots to ensure they are appropriately configured and not allowing public restorability.

Necessary Codes:

No specific code is required for this rule. The resolution primarily involves configuration changes through the AWS Management Console or CLI commands.

Remediation Steps:

To remediate the issue of EBS snapshots being publicly restorable, follow these step-by-step instructions:

  1. 1.

    Identify publicly restorable snapshots: Use the AWS Management Console or AWS Command Line Interface (CLI) to identify the EBS snapshots that have public restorability enabled.

  2. 2.

    Change snapshot permissions: Modify the permissions of the affected snapshots to restrict public access. This can be done through the following steps:

    • Go to the AWS Management Console and navigate to the Amazon EC2 dashboard.
    • Click on "Snapshots" in the left-hand menu.
    • Select the snapshot(s) that need to be updated.
    • In the "Actions" drop-down menu, choose "Modify Permissions".
    • Remove any entries that allow public restorability or explicit public access permissions.
    • Save the changes.
  3. 3.

    Verify changes: Double-check the permissions of the snapshots to ensure public restorability has been disabled successfully.

  4. 4.

    Test restoration: Attempt to restore the modified snapshot to confirm that it is no longer publicly restorable.

  5. 5.

    Repeat for all affected snapshots: If multiple EBS snapshots were found to be publicly restorable, repeat the above steps for each snapshot.

Additional Considerations:

It is vital to regularly review and audit the permissions of EBS snapshots to ensure ongoing compliance with HIPAA regulations. Implementing a proactive security monitoring and IAM policy review process can help prevent potential exposures and maintain the confidentiality of sensitive data.

Is your System Free of Underlying Vulnerabilities?
Find Out Now