AWS Introduction
AWS Pricing
AWS Threats
AWS Misconfigurations
- Getting Started with AWS Audit
- Permissions required for Misconfigurations Detection
- API Gateway Audit
- Cloudformation Audit
- CloudFront Audit
- CloudTrail Audit
- Cloudwatch Audit
- DynamoDB Audit
- EC2 Audit
- Elastic Search Audit
- ELB Audit
- IAM Audit
- KMS Audit
- Kubernetes Audit
- Lambda Audit
- RDS Audit
- Redshift Audit
- Route53 Audit
- S3 Audit
- Security Groups Audit
- SES Audit
- SNS Audit
- IAM Deep Dive
- App Sync Audit
- Code Build Audit
- Open Search Audit
- Shield Audit
- SQS Audit
Unrestricted MySQL Access Should Not Be Allowed
More Info:
No security group should allow unrestricted inbound access to TCP port 3306 (MySQL).
Risk Level
Medium
Address
Security
Compliance Standards
SOC2, GDPR, HITRUST, AWSWAF, NISTCSF, PCIDSS, FedRAMP
Triage and Remediation
Remediation
To remediate the unrestricted MySQL access issue in AWS, you can follow the below steps:
- Login to AWS console.
- Go to the RDS service.
- Select the DB instance with unrestricted MySQL access.
- Click on the “Modify” button.
- Scroll down to the “Network & Security” section.
- In the “Security Group” section, select the security group associated with the DB instance.
- Click on the “Remove” button to remove the inbound rule that allows unrestricted access to MySQL.
- Add a new inbound rule to the security group that allows access only from specific IP addresses or CIDR blocks.
- Click on the “Save Changes” button to apply the changes.
By following the above steps, you can remediate the unrestricted MySQL access issue in AWS and ensure that your database is secure.
To remediate the unrestricted MySQL access issue in AWS using AWS CLI, follow the below steps:
Step 1: Open the AWS CLI and run the following command to list all the security groups in your AWS account:
aws ec2 describe-security-groups
Step 2: Identify the security group that has unrestricted MySQL access. You can filter the results using the following command:
aws ec2 describe-security-groups --filters Name=ip-permission.protocol,Values=tcp Name=ip-permission.to-port,Values=3306 Name=ip-permission.cidr,Values='0.0.0.0/0'
This command will list all the security groups that have unrestricted MySQL access.
Step 3: Once you have identified the security group, run the following command to revoke the MySQL access:
aws ec2 revoke-security-group-ingress --group-id <security-group-id> --protocol tcp --port 3306 --cidr 0.0.0.0/0
Replace <security-group-id>
with the ID of the security group that you want to remediate.
Step 4: Verify that the MySQL access has been revoked by running the following command:
aws ec2 describe-security-groups --group-ids <security-group-id>
This command will list the details of the security group that you have remediated.
That’s it. You have successfully remediated the unrestricted MySQL access issue in AWS using AWS CLI.
To remediate unrestricted MySQL access in AWS using Python, you can follow these steps:
- Import the necessary libraries:
import boto3
from botocore.exceptions import ClientError
- Create an AWS client for the RDS service:
rds = boto3.client('rds')
- Get a list of all RDS instances:
try:
response = rds.describe_db_instances()
instances = response['DBInstances']
except ClientError as e:
print(e)
exit(1)
- Loop through each RDS instance and modify its security group to remove unrestricted MySQL access:
for instance in instances:
db_instance_identifier = instance['DBInstanceIdentifier']
db_security_groups = instance['DBSecurityGroups']
for security_group in db_security_groups:
if security_group['DBSecurityGroupName'] == 'default':
try:
response = rds.revoke_db_security_group_ingress(
DBSecurityGroupName='default',
EC2SecurityGroupId=security_group['EC2SecurityGroups'][0]['EC2SecurityGroupId'],
CIDRIP='0.0.0.0/0',
DBProtocol='tcp',
DBPortNumber=3306
)
print(f"Revoked unrestricted MySQL access for {db_instance_identifier}")
except ClientError as e:
print(e)
exit(1)
This code will loop through each RDS instance and its associated security groups. If the default security group is found, it will revoke any inbound rules that allow unrestricted MySQL access (i.e. from any IP address). The code will print a message for each instance where unrestricted MySQL access was revoked.