πΌ [EC2.19] Security groups should not allow unrestricted access to ports with high risk
-
Contextual name: πΌ [EC2.19] Security groups should not allow unrestricted access to ports with high risk
-
ID:
/frameworks/aws-fsbp-v1.0.0/ec2/19
-
Located in: πΌ Elastic Compute Cloud (EC2)
Descriptionβ
Security groups provide stateful filtering of ingress and egress network traffic to AWS resources. Unrestricted access (0.0.0.0/0) increases opportunities for malicious activity, such as hacking, denial-of-service attacks, and loss of data.
Similarβ
- AWS Security Hub
- Internal
- ID:
dec-c-b5998611
- ID:
Similar Sections (Give Policies To)β
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (10)β
Policy | Logic Count | Flags |
---|---|---|
π AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted CIFS traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted FTP traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted RPC traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted SMTP traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted traffic to MSSQL π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted traffic to MySQL π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted traffic to PostgreSQL π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted Telnet traffic π’ | 1 | π’ x6 |