This rule ensures secure configuration by restricting TCP and UDP access to VPC security groups.
Rule | VPC security groups should restrict ingress TCP and UDP access from 0.0.0.0/0 |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
Rule Description:
VPC security groups in the network should restrict ingress TCP and UDP access from the IP range 0.0.0.0/0. This rule is in compliance with the NIST 800-171 Revision 2 security standard.
TCP and UDP protocols are commonly used for data communication purposes in computer networks. Opening unrestricted access to these protocols from any source IP address (0.0.0.0/0) can potentially expose the network to security risks and unauthorized access.
Troubleshooting Steps:
Necessary Code:
No code is required for this rule. Instead, modifications need to be made to the existing security group settings.
Remediation Steps:
Note:
Ensure that you have a backup plan or rollback strategy in case the updated security group settings cause any unintended consequences or disruption to the network connectivity. It is recommended to thoroughly test the new rules before enforcing them in a production environment.