This rule ensures VPC default security group does not allow inbound and outbound traffic.
Rule | VPC default security group should not allow inbound and outbound traffic |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description:
The VPC default security group should have inbound and outbound traffic disabled as per NIST 800-53 Revision 5 guidelines. This ensures that the default security group does not allow any unauthorized network traffic to enter or leave the VPC, enhancing the overall security posture of the environment.
Remediation Steps:
Disabling Inbound Traffic:
Disabling Outbound Traffic:
Troubleshooting Steps:
If the default security group rules are not properly configured or disabled, it may cause issues with connectivity or prevent necessary communication within the VPC. Here are some troubleshooting steps:
If the above troubleshooting steps do not resolve the connectivity issues, consult AWS support or consider seeking assistance from a networking expert.
Code Example:
No specific code examples are required for this rule as it involves using the AWS Management Console to modify security group configurations.