This rule ensures the VPC default security group does not allow inbound and outbound traffic.
Rule | VPC default security group should not allow inbound and outbound traffic |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Medium |
Rule Description:
The VPC (Virtual Private Cloud) default security group should not allow inbound and outbound traffic for NIST Cybersecurity Framework (CSF) v1. This rule ensures that network traffic associated with the CSF is restricted to specific security groups or network ACLs (Access Control Lists) within the VPC.
Policy Details:
By default, every VPC in AWS (Amazon Web Services) comes with a default security group. This security group allows all inbound and outbound traffic within the VPC. To comply with the NIST Cybersecurity Framework v1, it is recommended to restrict this default security group to prevent unauthorized access to network resources.
Troubleshooting Steps:
If the default security group is allowing inbound and outbound traffic for NIST CSF v1, follow these troubleshooting steps to resolve the issue:
Necessary Codes:
No specific code is required for this rule. The rule can be enforced through the AWS Management Console or the AWS Command Line Interface (CLI).
Step-by-Step Guide for Remediation:
Follow these step-by-step instructions to remediate the default security group and restrict inbound and outbound traffic for NIST Cybersecurity Framework v1:
Note: It is important to ensure that alternate security groups or network ACLs are properly configured to allow necessary communication related to NIST CSF, if applicable.
Remember to always review and plan changes before applying them in a production environment.