Ensure VPC security groups are linked with a minimum of one Elastic Network Interface to enhance network security.
Rule | VPC security groups should be associated with at least one ENI |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
Rule Description:
This rule ensures that VPC security groups are associated with at least one Elastic Network Interface (ENI) to comply with the NIST 800-171 Revision 2 security standard. ENIs help control inbound and outbound traffic to instances in the Amazon Virtual Private Cloud (VPC).
Troubleshooting Steps:
Remediation:
To remediate this rule and ensure compliance with the NIST 800-171 Revision 2 standard, the following steps can be followed:
Please note that the specific steps for remediation may vary based on your infrastructure setup and the tools you are using to manage it. The following AWS CLI commands can be used as a general guide for remediating this issue:
aws ec2 describe-security-groups
Identify the security group(s) without an associated ENI.
For each security group without an associated ENI: a. Identify the ENI(s) that should be associated with the security group. b. If the ENI(s) do not exist:
aws ec2 create-network-interface --subnet-id <subnet-id> --security-group-ids <security-group-id>
c. Associate the ENI(s) with the security group(s):
aws ec2 modify-network-interface-attribute --network-interface-id <network-interface-id> --groups <security-group-id>
aws ec2 delete-security-group --group-id <security-group-id>
Repeat the above steps for each security group without an associated ENI until all VPC security groups comply with the NIST 800-171 Revision 2 standard.