This rule states that VPC security groups should restrict ingress access on common ports from 0.0.0.0/0.
Rule | VPC security groups should restrict ingress access on ports 20, 21, 22, 3306, 3389, 4333 from 0.0.0.0/0 |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
Rule Description:
This rule enforces the security practice of restricting ingress access on specific ports within a Virtual Private Cloud (VPC) in order to comply with the NIST 800-171 Revision 2 security guidelines. The rule ensures that access to ports 20, 21, 22, 3306, 3389, and 4333 is only permitted from trusted IP addresses rather than allowing unrestricted access from all sources (0.0.0.0/0).
Troubleshooting Steps:
Necessary Codes:
No specific codes are required to enforce this rule. Instead, the rule will involve modifying the existing security group rules associated with the VPCs.
Step-by-Step Guide for Remediation:
Identify the VPC: Begin by identifying the VPC where the ingress access needs to be restricted. Note down the VPC ID for reference.
Identify the Security Groups: Identify the security groups associated with the VPC identified in the previous step. Note down the security group IDs for further steps.
Modify Inbound Rules: Modify the inbound rules for each relevant security group to restrict ingress access on ports 20, 21, 22, 3306, 3389, and 4333.
Verify Changes: Verify that the changes have been successfully applied.
Repeat Steps for Additional Security Groups: If there are multiple relevant security groups within the VPC, repeat steps 3 and 4 for each of them.
Documentation: Document the changes made, including the date, time, and changes implemented. Ensure that all necessary stakeholders are aware of the updated security measures.
Conclusion:
By following these step-by-step instructions, you can effectively restrict the ingress access on ports 20, 21, 22, 3306, 3389, and 4333 within your VPC to comply with the NIST 800-171 Revision 2 security guidelines. Regularly reviewing and updating security group rules is crucial to ensure a secure AWS environment and protect sensitive data.