Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: VPC Security Groups Should Restrict Ingress SSH Access from 0.0.0.0/0

This rule ensures that VPC security groups restrict the ingress SSH access from the specified IP address.

RuleVPC security groups should restrict ingress SSH access from 0.0.0.0/0
FrameworkNIST Cybersecurity Framework (CSF) v1.1
Severity
High

Rule Description

The VPC security groups should restrict ingress SSH (Secure Shell) access from IP addresses within the 0.0.0.0/0 CIDR block to comply with the NIST Cybersecurity Framework (CSF) version 1.

Troubleshooting Steps

  1. 1.
    Check the existing inbound rules of the security group.
  2. 2.
    Ensure that there is no SSH rule allowing access from 0.0.0.0/0.

Necessary Codes

No additional codes are required for this rule. The existing security group settings need to be modified.

Remediation Steps

Follow the step-by-step guide below to restrict SSH access from the 0.0.0.0/0 CIDR block for NIST CSF compliance:

  1. 1.
    Log in to the AWS Management Console.
  2. 2.
    Go to the EC2 service dashboard.
  3. 3.
    Select the desired region.
  4. 4.
    Click on the "Security Groups" link in the left navigation pane.
  5. 5.
    Locate the security group that needs modification and click on its ID.
  6. 6.
    In the "Inbound Rules" tab, locate the SSH rule (port 22) allowing access from 0.0.0.0/0.
  7. 7.
    Select the rule and click on the "Actions" button.
  8. 8.
    From the dropdown menu, choose "Edit inbound rules."
  9. 9.
    Modify the source IP address for the SSH rule to a specific CIDR block or IP range that complies with your organization's security policies.
  10. 10.
    If necessary, click on the "Add rule" button to allow SSH access from specific IP addresses or ranges as required.
  11. 11.
    Review the changes and click on the "Save rules" button to apply the modified security group configuration.
  12. 12.
    Verify that the SSH access from 0.0.0.0/0 has been restricted.
  13. 13.
    Repeat the steps for any additional security groups that require this modification.

By following these steps, you will ensure that the VPC security groups restrict SSH access to comply with the NIST CSF v1.

Is your System Free of Underlying Vulnerabilities?
Find Out Now