Ensures that Elasticsearch domains are hosted within a VPC and not publicly accessible, complying with PCI DSS and NIST directives for secure network configurations.
Rule | Elasticsearch domains should not be publicly accessible |
Framework | PCI v3.2.1 |
Severity | ✔ Critical |
Rule Description
Elasticsearch domains must not be publicly accessible for PCI v3 compliance. Exposing Elasticsearch to the public internet can pose a security risk and potentially lead to unauthorized access or data breaches, which could result in compliance violations.
Troubleshooting Steps
If Elasticsearch domains are found to be publicly accessible, follow the steps below to remediate the issue.
Remediation Steps
If Elasticsearch domains are publicly accessible, follow the steps below to secure the domain:
CLI Commands (if applicable)
If you prefer using the AWS Command Line Interface (CLI) for remediation, the following commands can be utilized:
aws es update-elasticsearch-domain-config --domain-name <domain_name> --access-policies '{"Version": "2012-10-17", "Statement": [{"Effect": "Allow", "Principal": {"AWS": "*"}, "Action": "es:*", "Resource": "arn:aws:es:region:account-id:domain/domain-name/*", "Condition": {"IpAddress": {"aws:SourceIp": "x.x.x.x/x"}}}]}'
aws ec2 modify-security-group-rules --group-id <security_group_id> --ip-permissions IpProtocol=tcp,FromPort=443,ToPort=443,IpRanges=[{CidrIp=<authorized_cidr_block>}]
By following these remediation steps and securing the Elasticsearch domain, you can ensure compliance with PCI v3 regulations and protect sensitive data from unauthorized access.