More Info:

MQ brokers should not be launched into public cloud. Unless there is a specific business requirement, MQ Brokers should not have a public endpoint and should be accessed from within a VPC only.

Risk Level

Medium

Address

Security

Compliance Standards

GDPR, HITRUST, SOC2

Triage and Remediation

Remediation

To remediate the misconfiguration of an MQ Broker being publicly accessible in AWS Security Groups, follow these steps using the AWS Management Console:

  1. Log in to the AWS Management Console: Go to https://aws.amazon.com/ and log in to your AWS account.

  2. Navigate to the Amazon MQ Service: Click on the “Services” dropdown menu at the top left corner of the console, then select “Amazon MQ” under the “Messaging” category.

  3. Select the MQ Broker: In the Amazon MQ dashboard, select the MQ Broker that is publicly accessible.

  4. Update Security Group Rules:

    • In the left-hand navigation pane, click on “Configuration” and then select the “Security groups” tab.
    • Click on the security group that is associated with the MQ Broker.
  5. Edit Inbound Rules:

    • In the “Inbound rules” tab, review the existing rules that allow public access to the MQ Broker.
    • Identify the rule(s) that allow access from any IP address (0.0.0.0/0) or from unauthorized IP ranges.
  6. Remove Public Access:

    • Select the rule(s) that allow public access to the MQ Broker.
    • Click on the “Actions” dropdown menu and choose “Edit inbound rules”.
    • Remove the rule(s) that allow access from any IP address or unauthorized IP ranges.
    • Add specific IP ranges or security groups that are allowed to access the MQ Broker if necessary.
  7. Save Changes: Click on the “Save rules” button to apply the changes to the security group.

  8. Verify Changes:

    • Go back to the Amazon MQ dashboard and check the security group settings for the MQ Broker to ensure that public access has been restricted.
    • Test the connectivity to the MQ Broker to ensure that it is only accessible from authorized sources.

By following these steps, you can remediate the misconfiguration of an MQ Broker being publicly accessible in AWS Security Groups and restrict access to authorized entities only.

Additional Reading: