How to Find AWS EC2 security_group with Security group is configured wide open
Problem​
If Security groups are not properly configured the attack surface is increased.
info
This security check is part of the CIS Amazon Web Services Benchmarks and is rated severity high.
Prerequisites​
This guide assumes that you have already installed and configured Resoto to collect your AWS cloud resources.
Directions​
Execute the following
search
command in Resoto Shell or Resoto UI:> search is(aws_ec2_security_group) and group_ip_permissions[*].ip_ranges[*].{cidr_ip!="0.0.0.0/0" and cidr_ip!~"^192" and cidr_ip!~"^10" and cidr_ip~"\/(([1-9])|(1[0-9])|(2[0-3]))$"}
​kind=aws_ec2_security_group, ..., region=resoto-poweruser
​kind=aws_ec2_security_group, ..., account=poweruser-teamPipe the
search
command into thedump
command:> search is(aws_ec2_security_group) and group_ip_permissions[*].ip_ranges[*].{cidr_ip!="0.0.0.0/0" and cidr_ip!~"^192" and cidr_ip!~"^10" and cidr_ip~"\/(([1-9])|(1[0-9])|(2[0-3]))$"} | dump
​reported:
​ id: /aws/ec2/123
​ name: some-name
​ ctime: '2022-12-05T22:53:14Z'
​ kind: aws_ec2_security_group
​ age: 2mo28dThe command output will list the details of all non-compliant
aws_ec2_security_group
resources.Fix detected issues by following the remediation steps:
- Apply Zero Trust approach.
- Implement a process to scan and remediate unrestricted or overly permissive network acls.
- Recommended best practices is to narrow the definition for the minimum ports required.
notePlease refer to the AWS EC2 documentation for details.