More Info:

Ensure that security groups are attached to elastic network interface

Risk Level

Medium

Address

Operational Maturity, Reliability, Security

Compliance Standards

HITRUST

Triage and Remediation

Remediation

To remediate the misconfiguration “Non-Default Security Groups Should Be Attached To Elastic Network Interface” for AWS EC2 using the AWS Management Console, follow these step-by-step instructions:

  1. Sign in to the AWS Management Console: Go to https://aws.amazon.com/ and sign in to your AWS account.

  2. Navigate to EC2 Dashboard: Click on the “Services” dropdown menu at the top left corner, select “EC2” under the Compute section.

  3. Locate the Elastic Network Interface (ENI): In the EC2 Dashboard, click on “Network Interfaces” in the left-hand navigation pane to locate the relevant ENI that needs to be remediated.

  4. Identify the Security Group: Select the specific ENI that is associated with the non-default security group that needs to be attached.

  5. Modify the Security Group: Click on the “Actions” dropdown menu at the top, and select “Change Security Groups”.

  6. Select the Correct Security Group: In the “Change Security Groups” dialog box, select the correct security group(s) that you want to attach to the ENI. Ensure that you select at least one non-default security group.

  7. Apply the Changes: Click on the “Save” button to apply the changes and attach the selected security group(s) to the ENI.

  8. Verify the Configuration: After saving the changes, verify that the non-default security group has been successfully attached to the ENI by checking the details of the ENI.

By following these steps, you will be able to remediate the misconfiguration “Non-Default Security Groups Should Be Attached To Elastic Network Interface” for AWS EC2 using the AWS Management Console.