More Info:

Security groups associated with EKS clusters should allow inbound traffic only on TCP port 443 (HTTPS). This prevents any malicious activities such as brute-force attacks and also meets compliance requirements.

Risk Level

Medium

Address

Security

Compliance Standards

SOC2, GDPR, PCIDSS, NIST, HITRUST, NISTCSF

Triage and Remediation

Remediation

To remediate the misconfiguration in AWS, follow the steps below:

  1. Login to the AWS console and navigate to the Amazon EKS service.

  2. Select the EKS cluster that needs to be remediated.

  3. Click on the “Configuration” tab in the left-hand menu.

  4. Scroll down to the “Networking” section and click on the “Edit” button.

  5. In the “Security group rules” section, locate the security group that is associated with your EKS cluster.

  6. Click on the “Edit” button next to the security group.

  7. In the “Inbound rules” section, locate the rule that allows inbound traffic on port 443.

  8. If the rule is missing, click on the “Add rule” button and select “HTTPS” from the dropdown menu.

  9. If the rule is present but allows traffic from other ports as well, click on the “Edit” button next to the rule and change the port range to only allow traffic on port 443.

  10. Once the rule has been updated, click on the “Save rules” button to apply the changes.

  11. Verify that the inbound traffic is now restricted to port 443 by checking the security group rules.

Your EKS cluster should now only allow inbound traffic on port 443, which will remediate the misconfiguration.

Additional Reading: