πΌ [EC2.21] Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389
-
Contextual name: πΌ [EC2.21] Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389
-
ID:
/frameworks/aws-fsbp-v1.0.0/ec2/21
-
Located in: πΌ Elastic Compute Cloud (EC2)
Descriptionβ
Access to remote server administration ports, such as port 22 (SSH) and port 3389 (RDP), should not be publicly accessible, as this may allow unintended access to resources within your VPC.
Similarβ
- AWS Security Hub
- Internal
- ID:
dec-c-5c49db5a
- ID:
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ NIST SP 800-53 Revision 5 β πΌ AC-4(21) Information Flow Enforcement _ Physical or Logical Separation of Information Flows | 35 | 39 | ||
πΌ NIST SP 800-53 Revision 5 β πΌ CA-9(1) Internal System Connections _ Compliance Checks | 15 | |||
πΌ NIST SP 800-53 Revision 5 β πΌ CM-2 Baseline Configuration | 7 | 13 | ||
πΌ NIST SP 800-53 Revision 5 β πΌ CM-2(2) Baseline Configuration _ Automation Support for Accuracy and Currency | 13 | |||
πΌ NIST SP 800-53 Revision 5 β πΌ CM-7 Least Functionality | 9 | 11 | ||
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7 Boundary Protection | 29 | 5 | 33 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(5) Boundary Protection _ Deny by Default β Allow by Exception | 5 | 19 | ||
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(21) Boundary Protection _ Isolation of System Components | 16 | |||
πΌ PCI DSS v4.0.1 β πΌ 1.3.1 Inbound traffic to the CDE is restricted. | 14 |
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (1)β
Policy | Logic Count | Flags |
---|---|---|
π AWS VPC Network ACL exposes admin ports to public internet ports π’ | 1 | π’ x6 |