Log in to the AWS Management Console and navigate to the API Gateway service.
In the API Gateway dashboard, select the API you want to inspect.
In the API details page, select the “Resources” option from the left-hand side menu. This will display all the resources and methods associated with the selected API.
For each method, click on the method request to view its settings. Under the “Settings” tab, check the “Endpoint Type” field. If it is set to “Edge Optimized” or “Regional”, it means the API is publicly accessible. If it is set to “Private”, it means the API can only be accessed from within your VPC or via a VPC endpoint.
Using CLI
First, you need to install and configure AWS CLI on your local machine. You can do this by following the instructions provided by AWS. Make sure you have the necessary permissions to access the API Gateway.
Once the AWS CLI is set up, you can list all the APIs in the API Gateway by using the following command:
aws apigateway get-rest-apis
This command will return a list of all the APIs in the API Gateway.
To check the endpoint configuration of each API, you can use the following command:
Replace {rest-api-id} with the ID of the API you want to check. This command will return the details of the API, including its endpoint configuration.
To check if only private endpoints can access the API, look at the endpointConfiguration field in the output. If the types field under endpointConfiguration contains “PRIVATE”, then only private endpoints can access the API. If it contains “EDGE” or “REGIONAL”, then the API can be accessed from public endpoints.
Using Python
Import the necessary AWS SDK for Python (Boto3) modules and initialize a new client for the API Gateway service.
For each API, get the endpoint configuration and check if it’s a private endpoint.
for api in apis: endpoint_type = api['endpointConfiguration']['types'][0] if endpoint_type != 'PRIVATE': print(f"API {api['name']} is not a private endpoint.")
The above script will print out the names of all APIs that are not private endpoints. If no APIs are printed, then all APIs are private endpoints. If some APIs are printed, then those APIs are not private endpoints and are misconfigured.
Note: This script assumes that you have configured your AWS credentials correctly, either by setting the AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, and AWS_SESSION_TOKEN environment variables, or by using the AWS CLI or AWS SDKs to configure your credentials.
To remediate the misconfiguration “Only Private End-Points Should Access APIs” in AWS using Python, you can follow the below steps:Step 1: Identify the APIs which are not restricted to private endpoints only.Step 2: For each API, check if it is currently accessible from a public endpoint.Step 3: If the API is accessible from a public endpoint, restrict its access to private endpoints only.Step 4: To restrict the access of an API to private endpoints only, you can use the following Python code:
import boto3# Create a boto3 client for the API Gateway serviceapigateway = boto3.client('apigateway')# Get the ID of the API which you want to restrict to private endpoints onlyapi_id = 'your_api_id'# Get the current settings of the APIresponse = apigateway.get_rest_api(restApiId=api_id)# Check if the API is currently accessible from a public endpointif response['endpointConfiguration']['types'][0] == 'EDGE': # If the API is accessible from a public endpoint, restrict its access to private endpoints only apigateway.update_rest_api( restApiId=api_id, patchOperations=[ { 'op': 'replace', 'path': '/endpointConfiguration/types/0', 'value': 'PRIVATE' } ] )
Step 5: Run this code for all the APIs which are not restricted to private endpoints only.By following these steps, you can remediate the misconfiguration “Only Private End-Points Should Access APIs” in AWS using Python.