UNKNOWN
Source
CloudSploit
ID
open-all-ports-protocols

Open All Ports Protocols

Determine if security group has all ports or protocols open to the public

Security groups should be created on a per-service basis and avoid allowing all ports or protocols.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log into the AWS Management Console.

  2. Select the “Services” option and search for EC2. Step

  3. Scroll down the left navigation panel and choose “Security Group” under “Network & Security”.Step

  4. Select the “EC2 Security Group” that needs to be verified. Step

  5. Scroll down the bottom panel and choose “Inbound”. Verify the value for “Source” column and if any rule have value set to “0.0.0.0/0” or “::/0 " then the selected “Security Group” has one or many ports open to the public.Step

  6. Repeat steps number 2 - 5 to verify other “Security Groups” in the selected AWS region.

  7. Navigate to “Security Groups” under “Network & Security” and select the “Security Group” that needs to modify to restrict the access to specific ip address. Step

  8. Scroll down the “Security Group” page and select the “Inbound” and click on the “Edit” button. Step

  9. In the “Edit inbound rules” tab select the “MyIP” from the “Source” column to allow inbound traffic only from specific IP address.Step

  10. In the “Edit inbound rules” tab select the “Custom” from the “Source” column as per the requirements and specify the “static IP” address of the permitted host along with “Description” for the “Security Group” rule. Step

  11. Click on the “Save” button to make the necessary changes. Step

  12. Repeat steps number 7 - 11 to modify the security group to specify a specific port and protocol to allow.