You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: avd_docs/aws/ec2/AVD-AWS-0105/docs.md
+6-1
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,8 @@
1
1
2
-
Opening up ACLs to the public internet is potentially dangerous. You should restrict access to IP addresses or ranges that explicitly require it where possible.
2
+
The Network Access Control List (NACL) function provide stateless filtering of ingress and
3
+
egress network traffic to AWS resources. It is recommended that no NACL allows
4
+
unrestricted ingress access to remote server administration ports, such as SSH to port 22
5
+
and RDP to port 3389.
3
6
4
7
5
8
### Impact
@@ -11,4 +14,6 @@ Opening up ACLs to the public internet is potentially dangerous. You should rest
Copy file name to clipboardexpand all lines: avd_docs/aws/ec2/AVD-AWS-0107/docs.md
+7-1
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,7 @@
1
1
2
-
Opening up ports to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that explicitly require it where possible.
2
+
Security groups provide stateful filtering of ingress and egress network traffic to AWS
3
+
resources. It is recommended that no security group allows unrestricted ingress access to
4
+
remote server administration ports, such as SSH to port 22 and RDP to port 3389.
3
5
4
6
5
7
### Impact
@@ -11,4 +13,8 @@ Opening up ports to the public internet is generally to be avoided. You should r
Copy file name to clipboardexpand all lines: checks/cloud/aws/ec2/no_public_ingress_acl.rego
+18-6
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,29 @@
1
1
# METADATA
2
-
# title: An ingress Network ACL rule allows specific ports from /0.
2
+
# title: Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389.
3
3
# description: |
4
-
# Opening up ACLs to the public internet is potentially dangerous. You should restrict access to IP addresses or ranges that explicitly require it where possible.
4
+
# The Network Access Control List (NACL) function provide stateless filtering of ingress and
5
+
# egress network traffic to AWS resources. It is recommended that no NACL allows
6
+
# unrestricted ingress access to remote server administration ports, such as SSH to port 22
Copy file name to clipboardexpand all lines: checks/cloud/aws/ec2/no_public_ingress_sgr.rego
+13-6
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,24 @@
1
1
# METADATA
2
-
# title: An ingress security group rule allows traffic from /0.
2
+
# title: Security groups should not allow ingress from 0.0.0.0/0 or ::/0 to port 22 or port 3389.
3
3
# description: |
4
-
# Opening up ports to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that explicitly require it where possible.
4
+
# Security groups provide stateful filtering of ingress and egress network traffic to AWS
5
+
# resources. It is recommended that no security group allows unrestricted ingress access to
6
+
# remote server administration ports, such as SSH to port 22 and RDP to port 3389.
0 commit comments