More Info:

No EC2 security group should allow unrestricted inbound access to any Non-HTTP Ports.

Risk Level

Medium

Address

Security

Compliance Standards

SOC2, NIST, PCIDSS, AWSWAF

Triage and Remediation

Remediation

To remediate the misconfiguration of unrestricted inbound access on all Non-HTTP Ports in AWS, you can follow the below steps:

  1. Log in to your AWS console and navigate to the EC2 dashboard.
  2. Select the EC2 instance(s) for which you want to remediate the misconfiguration.
  3. Click on the “Security Groups” option under the “Description” tab.
  4. Identify the security group that is associated with the selected instance(s).
  5. Click on the “Inbound Rules” tab and identify the rule(s) that allow unrestricted inbound access on Non-HTTP Ports.
  6. Select the rule(s) and click on the “Edit” button.
  7. Change the “Source” field to limit the inbound access to specific IP addresses or CIDR blocks.
  8. Alternatively, you can also choose to restrict access to specific ports by changing the “Port Range” field.
  9. Click on the “Save” button to save the changes.

By following these steps, you can remediate the misconfiguration of unrestricted inbound access on all Non-HTTP Ports in AWS.

Additional Reading: