More Info:

No security group should allow unrestricted inbound access to TCP port 135 (RPC).

Risk Level

Medium

Address

Security

Compliance Standards

SOC2, GDPR, HITRUST, AWSWAF, NISTCSF, PCIDSS, FedRAMP

Triage and Remediation

Remediation

To remediate the issue of unrestricted RPC access in AWS, you can follow these steps:

  1. Open the AWS Management Console and go to the EC2 dashboard.
  2. Click on the “Security Groups” option in the left-hand menu.
  3. Select the security group that is allowing unrestricted RPC access.
  4. Click on the “Inbound Rules” tab and locate the rule that allows RPC access.
  5. Click on the “Edit” button next to the rule.
  6. Change the source IP address to a specific IP address or range of IP addresses that require access to RPC.
  7. If necessary, add a new rule to allow access to RPC from specific IP addresses or ranges.
  8. Click on the “Save” button to apply the changes.

Once the changes are saved, the security group will no longer allow unrestricted RPC access. It is important to regularly review and update security group rules to ensure that they are properly configured and do not leave any vulnerabilities open to attack.

Additional Reading: