More Info:

Default security groups should restrict all public traffic to follow AWS security best practices.

Risk Level

Low

Address

Security

Compliance Standards

CISAWS, CBP, NIST, SOC2, PCIDSS, GDPR, AWSWAF, NISTCSF, FedRAMP

Triage and Remediation

Remediation

To remediate the misconfiguration “Default Security Group Should Not Allow Unrestricted Public Traffic” for AWS using the AWS console, follow the steps below:

  1. Log in to the AWS Management Console.

  2. Navigate to the EC2 service.

  3. In the left-hand menu, click on “Security Groups”.

  4. Select the default security group.

  5. In the “Inbound Rules” tab, remove any rules that allow unrestricted public traffic (i.e. 0.0.0.0/0).

  6. Add specific rules for the required ports and protocols to allow traffic only from authorized sources.

  7. Review and save the changes.

By following these steps, you will remediate the misconfiguration and ensure that the default security group does not allow unrestricted public traffic.

Additional Reading: