This rule ensures that EBS snapshots are not publicly restorable to protect sensitive data.
Rule | EBS snapshots should not be publicly restorable |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description
This rule is based on NIST 800-53 Revision 5 and it states that Elastic Block Store (EBS) snapshots should not be publicly restorable. EBS snapshots are point-in-time copies of Amazon EBS volumes, and they can be used to back up data or clone volumes within the Amazon Web Services (AWS) infrastructure. Publicly restorable snapshots can expose sensitive data and increase the risk of unauthorized access or data breaches.
Troubleshooting Steps
The following troubleshooting steps can be taken if there are any issues related to this rule:
Required Codes
The following AWS CLI command can be used to update the permissions of an EBS snapshot:
aws ec2 modify-snapshot-attribute --snapshot-id <snapshot-id> --attribute createVolumePermission --group-names all
Replace
<snapshot-id>
with the actual ID of the EBS snapshot that needs to be modified.Remediation Steps
Follow these step-by-step guides to remediate the issue of publicly restorable EBS snapshots:
Identify publicly restorable EBS snapshots:
Update snapshot permissions:
<snapshot-id>
with the ID of each publicly restorable snapshot):
aws ec2 modify-snapshot-attribute --snapshot-id <snapshot-id> --attribute createVolumePermission --group-names all
Verify permissions update:
Conclusion
Following the NIST 800-53 Revision 5 recommendation, it is important to ensure that EBS snapshots are not publicly restorable. By following the provided troubleshooting steps, necessary codes, and remediation guides, you can mitigate the risk of unauthorized access to sensitive data stored in EBS snapshots and maintain the security of your AWS resources.