This rule ensures that EBS snapshots are not set to be publicly restorable, maintaining data security and privacy.
Rule | EBS snapshots should not be publicly restorable |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description
The rule "EBS snapshots should not be publicly restorable for NIST 800-53 Revision 5" ensures that Elastic Block Store (EBS) snapshots within an Amazon Web Services (AWS) environment are not publicly accessible for restoration. This rule aligns with the security control requirements specified in National Institute of Standards and Technology (NIST) Special Publication 800-53 Revision 5.
Troubleshooting Steps
If EBS snapshots are found to be publicly restorable, follow these troubleshooting steps:
Rule Remediation
To remediate the issue of publicly restorable EBS snapshots, perform the following steps:
Login to the AWS Management Console or use the AWS Command Line Interface (CLI).
Identify the EBS snapshots that are publicly restorable.
For each affected snapshot, proceed with the following:
CLI Command
aws ec2 modify-snapshot-attribute --snapshot-id <snapshot-id> --create-volume-permission "{\"Add\":[]}"
Replace
<snapshot-id>
with the identifier of the affected EBS snapshot.Console Guide
Verify that the modified snapshots are no longer publicly restorable.
Note: Regular monitoring and auditing of EBS snapshots should be performed to ensure compliance with the rule and promptly address any misconfigurations or unintended exposure.
References