Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: VPC Internet Gateways Attached to Authorized VPC

This rule ensures VPC internet gateways are attached to authorized VPC for enhanced security.

RuleVPC internet gateways should be attached to authorized vpc
FrameworkNIST Cybersecurity Framework (CSF) v1.1
Severity
Medium

Rule Description

The rule requires that VPC (Virtual Private Cloud) internet gateways should only be attached to authorized VPCs in compliance with the NIST Cybersecurity Framework (CSF) v1. This ensures that network traffic to and from the VPC is managed and monitored within a secure and authorized environment.

Troubleshooting Steps

If there are any issues related to attaching the internet gateway to an authorized VPC, follow these troubleshooting steps:

  1. 1.

    Verify the VPC: Check if the VPC is authorized and compliant with the NIST CSF v1. Ensure it meets all the necessary requirements and security standards.

  2. 2.

    Verify internet gateway attachment: Confirm whether the internet gateway is correctly attached to the authorized VPC.

  3. 3.

    Review permissions: Ensure that the user or security group responsible for attaching the internet gateway has the necessary permissions to perform this action.

  4. 4.

    Check configuration settings: Review the configuration settings of the internet gateway and VPC to ensure that there are no conflicts or misconfigurations.

  5. 5.

    Review logs and error messages: Check system logs and error messages to identify any specific issues or error codes related to the internet gateway attachment.

  6. 6.

    Contact support: If the troubleshooting steps mentioned above do not resolve the issue, contact the appropriate support channels for further assistance.

Necessary Codes (if any)

No specific codes are required for this rule.

Step-by-step Guide for Remediation

To ensure VPC internet gateways are attached to authorized VPCs in compliance with the NIST Cybersecurity Framework (CSF) v1, follow these steps:

  1. 1.

    Identify the authorized VPC: Determine the VPC that is authorized and compliant with NIST CSF v1. This VPC should have all the necessary security controls and configurations in place.

  2. 2.

    Configure the internet gateway: Go to the AWS Management Console and navigate to the VPC service.

  3. 3.

    Create an internet gateway: If an internet gateway is not already created, create one by clicking on "Create internet gateway" and follow the on-screen instructions. Ensure that the internet gateway is associated with the correct AWS account and region.

  4. 4.

    Attach the internet gateway to the authorized VPC: Select the internet gateway and click on the "Attach to VPC" button. Choose the authorized VPC from the list provided.

  5. 5.

    Confirm attachment: Review the confirmations and ensure that the internet gateway is successfully attached to the authorized VPC.

  6. 6.

    Verify connectivity: Test the internet connectivity by launching an EC2 instance or accessing resources within the authorized VPC. Check if you can access the internet from the VPC and if incoming traffic is properly monitored within the authorized environment.

  7. 7.

    Monitor and audit: Regularly monitor and audit the internet gateway attachment to ensure continued compliance with the NIST CSF v1.

Conclusion

By strictly adhering to the rule and ensuring that VPC internet gateways are only attached to authorized VPCs, you can greatly enhance the security and compliance of your network infrastructure. Regularly verify the attachment and be proactive in monitoring and auditing to maintain a secure environment.

Is your System Free of Underlying Vulnerabilities?
Find Out Now