This rule ensures VPC route table restricts public access to Internet Gateway (IGW).
Rule | VPC route table should restrict public access to IGW |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description
This rule ensures that the VPC route table restricts public access to the Internet Gateway (IGW) as per the security guidelines outlined in NIST 800-53 Revision 5. By implementing this rule, you can enhance the security posture of your VPC by preventing unauthorized access from the public internet.
Troubleshooting Steps (if applicable)
If you encounter any issues while implementing this rule, you can follow these troubleshooting steps:
Necessary Codes (if applicable)
In order to implement this rule, no specific code is required. Instead, you can utilize the AWS Management Console or command line interface (CLI) to configure the VPC route table.
Step-by-Step Guide for Remediation
Follow these steps to remediate and restrict public access to the Internet Gateway within your VPC route table:
Ensure that you review and test the modified route table configuration to confirm that public access to the IGW is restricted as intended. Monitor the VPC network traffic and consult the AWS documentation for any further customization or optimization requirements based on your specific use case.
Note: It is essential to thoroughly review and test the modified configuration to avoid any unintended disruption to your application or connectivity requirements.