Medium
EC2
Regional
Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389
CISNISTISO 27001
Description
Checks whether Network ACLs allow ingress from 0.0.0.0/0 to port 22 or port 3389.
Remediation
To comply with this control, modify Network ACLs to ensure they do not allow ingress from 0.0.0.0/0 to port 22 (SSH) or port 3389 (RDP).
Steps
- Sign in to the AWS Management Console and open the VPC console at https://console.aws.amazon.com/vpc/.
- In the navigation pane, click on 'Network ACLs'.
- Select the Network ACL you want to modify.
- In the 'Inbound Rules' tab, look for rules that allow traffic from 0.0.0.0/0 to port 22 or port 3389.
- If such rules exist, click on 'Edit inbound rules' and either modify the source to a more restricted IP range or delete the rule.
- Click on 'Save' to apply the changes.
- Verify that the Network ACL no longer allows ingress from 0.0.0.0/0 to port 22 or port 3389.
Compliance
CISNISTISO 27001