Control: Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389
Description
This control checks if default ports for SSH/RDP ingress traffic for network access control lists (NACLs) is unrestricted. The rule fails if a NACL inbound entry allows a source CIDR block of '0.0.0.0/0' or '::/0' for ports 22 or 3389.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.vpc_network_acl_remote_administration
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.vpc_network_acl_remote_administration --share
SQL
This control uses a named query:
vpc_network_acl_remote_administration