More Info:

Your Amazon EKS cluster API server endpoints should not be publicly accessible from the Internet in order to avoid exposing private data and minimizing security risks. The level of access to your Kubernetes API server endpoints depends on your EKS application use cases. It is recommended that the API server endpoints should be accessible only from within your AWS VPC.

Risk Level

Low

Address

Security

Compliance Standards

HITRUST, CISEKS, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

Sure, here are the step-by-step instructions on how to remediate the “Endpoints Should Not Be Publicly Accessible” misconfiguration in AWS using the AWS console:

  1. Log in to the AWS Management Console.
  2. Go to the Amazon VPC service.
  3. Click on “Endpoints” in the left navigation pane.
  4. Select the endpoint that you want to remediate.
  5. Click on the “Actions” button and select “Modify Endpoint”.
  6. In the “Modify Endpoint” dialog box, select the “Private” option for the endpoint.
  7. Click “Save Changes” to apply the changes.

After following these steps, the endpoint will no longer be publicly accessible and will only be accessible through the VPC.

Additional Reading: