This rule ensures VPC default security group restricts all traffic for enhanced security measures.
Rule | VPC default security group should not allow inbound and outbound traffic |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Medium |
Rule Description
The default security group in a VPC should not allow inbound and outbound traffic for NIST Cybersecurity Framework (CSF) v1. This rule is intended to enhance the security of the VPC by restricting access to and from the VPC based on the NIST CSF v1 guidelines.
Troubleshooting Steps
If the default security group allows inbound and outbound traffic for NIST CSF v1, follow these troubleshooting steps to remediate the issue:
Necessary Codes (if applicable)
If necessary, here are the commands for modifying security group rules in AWS:
To modify inbound rules:
aws ec2 authorize-security-group-ingress --group-id <security-group-id> --protocol <protocol> --port <port> --cidr <cidr-range>
To modify outbound rules:
aws ec2 authorize-security-group-egress --group-id <security-group-id> --protocol <protocol> --port <port> --cidr <cidr-range>
Replace
<security-group-id>
with the actual ID of the default security group, <protocol>
with the desired protocol (e.g., TCP, UDP), <port>
with the relevant port number or range, and <cidr-range>
with the appropriate CIDR range.Step-by-Step Guide for Remediation
Follow these steps to remediate the default security group to disallow inbound and outbound traffic for NIST CSF v1:
By following these steps and eliminating inbound and outbound traffic for NIST CSF v1 in the default security group, you can enhance the security of your VPC and ensure compliance with relevant security guidelines.