More Info:

This rule checks if an Amazon Elastic Compute Cloud (EC2) instance metadata has a specified token hop limit that is below the desired limit. The rule is NON_COMPLIANT for an instance if it has a hop limit value above the intended limit.

Risk Level

Low

Address

Configuration

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the EC2 Hop Limit Check misconfiguration for AWS EC2 using the AWS Management Console, follow these steps:

  1. Login to AWS Console: Visit the AWS Management Console (https://aws.amazon.com/console/) and log in with your credentials.

  2. Navigate to EC2 Service: Click on the “Services” dropdown menu at the top of the page and select “EC2” under the Compute section.

  3. Select the EC2 Instance: In the EC2 Dashboard, locate the EC2 instance for which you want to remediate the Hop Limit Check misconfiguration.

  4. Modify Security Group: Click on the “Security” link under the “Description” tab of the selected EC2 instance.

  5. Edit Inbound Rules: In the Security Group settings, locate the inbound rule that allows traffic to the EC2 instance.

  6. Update Inbound Rule: Edit the inbound rule to restrict the source IP addresses or CIDR range that can communicate with the EC2 instance. You can set the source IP address to a specific IP or CIDR block to limit the number of hops allowed.

  7. Save Changes: After updating the inbound rule, click on the “Save” or “Apply” button to apply the changes.

  8. Verify Configuration: Verify that the inbound rule has been updated successfully and that only authorized IP addresses or CIDR ranges can communicate with the EC2 instance.

By following these steps, you can remediate the EC2 Hop Limit Check misconfiguration for AWS EC2 using the AWS Management Console.