More Info:

This rule checks if internet gateways are attached to an authorized virtual private cloud (Amazon VPC). Internet gateways provide access to the internet for instances within a VPC. The rule is marked as non-compliant if internet gateways are attached to an unauthorized VPC.

Risk Level

Medium

Address

Security

Compliance Standards

CBP,RBI_MD_ITF,RBI_UCB

Triage and Remediation

Remediation

To remediate the misconfiguration of an Internet Gateway being attached to an unauthorized Virtual Private Cloud (VPC) in AWS, follow these steps using the AWS Management Console:

  1. Sign in to the AWS Management Console: Go to https://aws.amazon.com/ and sign in to your AWS account.

  2. Navigate to the VPC Dashboard:

    • In the AWS Management Console, under the “Services” tab, select “VPC” under the Networking & Content Delivery section.
  3. Identify the unauthorized VPC:

    • In the VPC Dashboard, locate the Internet Gateway that is attached to the unauthorized VPC. The unauthorized VPC will be the one that should not have the Internet Gateway attached to it.
  4. Detaching the Internet Gateway:

    • Click on the “Internet Gateways” option in the VPC Dashboard.
    • Select the Internet Gateway that is attached to the unauthorized VPC.
    • Click on the “Actions” dropdown menu and select “Detach from VPC”.
    • In the confirmation dialog box, click on “Detach”.
  5. Attach the Internet Gateway to the authorized VPC:

    • Click on the “Internet Gateways” option in the VPC Dashboard.
    • Select the Internet Gateway that you just detached.
    • Click on the “Actions” dropdown menu and select “Attach to VPC”.
    • Select the authorized VPC from the dropdown list.
    • Click on “Attach”.
  6. Verify the Configuration:

    • Go back to the VPC Dashboard and confirm that the Internet Gateway is now attached to the authorized VPC.

By following these steps, you have successfully remediated the misconfiguration of an Internet Gateway being attached to an unauthorized Virtual Private Cloud in AWS.