This rule focuses on restricting SSH access from all IPs in VPC security groups.
Rule | VPC security groups should restrict ingress SSH access from 0.0.0.0/0 |
Framework | HIPAA |
Severity | ✔ High |
Rule Description
The rule specifies that the VPC security groups in an environment that adheres to the Health Insurance Portability and Accountability Act (HIPAA) regulations should restrict ingress SSH (Secure Shell) access from any IP address (0.0.0.0/0) outside of the VPC. This rule is enforced to enhance the security of the environment and protect sensitive HIPAA data.
Troubleshooting Steps (if applicable)
Necessary Codes (if applicable)
"ingress": [
{
"protocol": "tcp",
"port_range": {
"from": 22,
"to": 22
},
"source": {
"prefix_list": null,
"security_group_id": null,
"self": false,
"description": null,
"cidr_blocks": [
"0.0.0.0/0"
]
},
"description": "Allow SSH access from anywhere (HIPAA restricted)"
}
]
Step-by-Step Guide for Remediation
Note: It is important to ensure that other necessary IP ranges or security groups are included in the inbound rules to maintain authorized access for legitimate users or systems.