More Info:
Your AWS EC2 default security groups should restrict all inbound public traffic in order to enforce AWS users (EC2 administrators, resource managers, etc) to create custom security groups that exercise the rule of least privilege instead of using the default security groups.Risk Level
LowAddress
SecurityCompliance Standards
PCIDSS, MAS, APRARemediation
How to ensure default Security Group does not allow unrestricted inbound accessUsing AWS Console
- Open the AWS Management Console and navigate to the Amazon EC2 service.
- From the left navigation pane, click on “Security Groups” to view the list of security groups. (In the Cloudanix Console, navigate to “Misconfig” page and look for Affected Assets for “Default Security Groups Should Not Allow Unrestricted Inbound Access” Policy.)
- Look for the default security group in the list. By default, it is named “default” and should be associated with your VPC.
- Select the default security group by clicking on its name.
- In the “Inbound Rules” tab, review the existing inbound rules configured for the default security group.
- Identify any rules that allow unrestricted access (such as allowing all traffic from any source).
- To remove an unrestricted rule, click on the “X” button next to the rule to delete it.
- Alternatively, you can edit the rule by clicking on the “Edit” button and modifying the source IP range or protocol/port to restrict the access.
- Repeat the process for all unrestricted inbound rules until the default security group only allows the necessary and restricted inbound access.
- Once you have updated the rules, click on the “Save rules” button to apply the changes.