This rule ensures that VPC Elastic IPs are properly linked with an EC2 instance or Elastic Network Interface (ENI) for security.
Rule | VPC EIPs should be associated with an EC2 instance or ENI |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ High |
Rule Description
This rule is designed to adhere to the NIST Cybersecurity Framework (CSF) version 1 guidelines. As per this rule, all Elastic IP Addresses (EIPs) within a Virtual Private Cloud (VPC) should be associated with either an EC2 instance or an Elastic Network Interface (ENI). This ensures proper control and visibility of the network resources within the VPC and enhances the overall security posture.
Remediation Steps
To remediate this issue, you will need to associate the unassigned EIPs with either an EC2 instance or an ENI within your VPC. Depending on your specific use case, you can follow the steps below to associate the EIP:
If you want to associate the EIP with an existing EC2 instance:
Identify the unused EIPs within your VPC:
Choose an EC2 instance to associate the EIP with:
Associate the EIP with the EC2 instance:
Verify the association:
If you want to associate the EIP with a new EC2 instance or an ENI:
Create a new EC2 instance or ENI within your VPC:
Associate the EIP with the newly created resource:
Verify the association:
Troubleshooting Steps
In case you encounter any issues while performing the above remediation steps, consider the following troubleshooting steps:
Incorrect EIP association:
Insufficient permissions:
Resource limits:
Networking issues:
If the troubleshooting steps above do not resolve the issue, you may need to seek further assistance from AWS Support or consult relevant documentation for specific error messages encountered.