Skip to main content

💼 5.3 Ensure no security groups allow ingress from ::/0 to remote server administration ports - Level 1 (Automated)

  • Contextual name: 💼 5.3 Ensure no security groups allow ingress from ::/0 to remote server administration ports - Level 1 (Automated)
  • ID: /frameworks/cis-aws-v2.0.0/05/03
  • Located in: 💼 5 Networking

Description

Security groups provide stateful filtering of ingress and egress network traffic to AWS resources. It is recommended that no security group allows unrestricted ingress access to remote server administration ports, such as SSH to port 22 and RDP to port 3389.

Similar

  • Sections
    • /frameworks/cis-aws-v3.0.0/05/03
    • /frameworks/cis-aws-v1.5.0/05/03
  • Internal
    • ID: dec-c-d213e8bd

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.5.0 → 💼 5.3 Ensure no security groups allow ingress from ::/0 to remote server administration ports - Level 1 (Automated)11
💼 CIS AWS v3.0.0 → 💼 5.3 Ensure no security groups allow ingress from ::/0 to remote server administration ports - Level 1 (Automated)11

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.5.0 → 💼 5.3 Ensure no security groups allow ingress from ::/0 to remote server administration ports - Level 1 (Automated)11
💼 CIS AWS v3.0.0 → 💼 5.3 Ensure no security groups allow ingress from ::/0 to remote server administration ports - Level 1 (Automated)11

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟢1🟢 x6

Internal Rules

RulePoliciesFlags
✉️ dec-x-bcae85fb2