This rule ensures VPC security groups are associated with at least one Elastic Network Interface.
Rule | VPC security groups should be associated with at least one ENI |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ High |
Rule Description:
The rule ensures that all VPC security groups are associated with at least one Elastic Network Interface (ENI) in accordance with the NIST Cybersecurity Framework (CSF) v1. This requirement enhances the security posture of the Amazon Virtual Private Cloud (VPC) environment by enforcing network traffic controls through the use of security groups.
Troubleshooting Steps:
If a VPC security group is not associated with any ENI, it could indicate a misconfiguration or oversight. To troubleshoot this issue, follow these steps:
Necessary Code:
There is no specific code required for this rule; it is purely a configuration and association requirement within the AWS environment.
Remediation Steps:
To remediate this issue and ensure that VPC security groups are associated with at least one ENI, follow these steps:
Ensure that the security group contains the appropriate rules that align with your desired network traffic control and security objectives.
Monitor the security group and associated network traffic to verify that the remediation has been successful and that the security group is now properly associated with an ENI.
Conclusion:
Following this rule helps to maintain a secure VPC environment by enforcing the association of VPC security groups with at least one ENI. By ensuring proper network traffic control, you can mitigate the risk of unauthorized access or malicious activities within your AWS infrastructure.