Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: VPC Security Groups should restrict Ingress TCP and UDP access from 0.0.0.0/0

This rule ensures VPC security groups are properly configured to restrict Ingress TCP and UDP access from all sources.

RuleVPC security groups should restrict ingress TCP and UDP access from 0.0.0.0/0
FrameworkHIPAA
Severity
High

VPC Security Group Ingress Restriction for HIPAA Compliance

Description:

To ensure compliance with the HIPAA (Health Insurance Portability and Accountability Act) regulations, it is essential to implement proper security measures within the AWS Virtual Private Cloud (VPC). One critical aspect of securing a VPC is to restrict inbound TCP and UDP access from the global IP range 0.0.0.0/0.

Policy Details:

According to HIPAA compliance requirements, it is necessary to limit inbound access to only trusted sources within the AWS VPC. Restricting ingress access to TCP and UDP from 0.0.0.0/0 means denying access from any IP address that is not explicitly allowed. By implementing this rule, you ensure that only authorized sources can communicate with resources within the VPC.

Troubleshooting Steps:

If you encounter any issues or potential gaps in HIPAA compliance regarding the VPC security groups, follow these troubleshooting steps:

  1. 1.
    Ensure all security groups associated with HIPAA-regulated resources have appropriate inbound rules.
  2. 2.
    Check the inbound rules of the VPC security groups to verify that TCP and UDP access from 0.0.0.0/0 is denied.
  3. 3.
    If any inbound rule allows TCP or UDP access from the global IP range, modify the rule to restrict access to trusted sources only.

Necessary Code:

The following AWS CLI command demonstrates how to modify a VPC security group to restrict ingress TCP and UDP access from 0.0.0.0/0:

aws ec2 authorize-security-group-ingress --group-id <security-group-id> --protocol tcp --port 0-65535 --cidr 0.0.0.0/0 --source-security-group-id <source-security-group-id> --region <aws-region>

Please replace the following placeholders:

  • <security-group-id>
    : The ID of the security group you wish to modify.
  • <source-security-group-id>
    : The ID of the security group that should be allowed as the source. (Instead of 0.0.0.0/0)
  • <aws-region>
    : The AWS region where your VPC is located.

Step-by-Step Remediation Guide:

  1. 1.
    Log in to the AWS Management Console.
  2. 2.
    Go to the EC2 dashboard.
  3. 3.
    Click on "Security Groups" in the left navigation pane.
  4. 4.
    Search for the security group associated with the HIPAA-regulated resources.
  5. 5.
    Select the security group and click on the "Inbound Rules" tab.
  6. 6.
    Identify any existing rules that allow TCP or UDP access from 0.0.0.0/0.
  7. 7.
    Modify each rule to restrict access to trusted sources only (e.g., specific IP ranges or security groups).
  8. 8.
    To modify a rule, select it and click on the "Edit" button.
  9. 9.
    Replace the source IP range of 0.0.0.0/0 with the appropriate IP range or security group ID.
  10. 10.
    Save the changes to update the security group with the new access restrictions.

Note: Ensure that the modified inbound rules are aligned with your organization's security policies and requirements.

By following these steps and implementing the necessary code snippets, you can enforce VPC security group ingress restrictions compliant with HIPAA regulations.

Is your System Free of Underlying Vulnerabilities?
Find Out Now