turbot/aws_compliance

Control: Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389

Description

This control checks if default ports for SSH/RDP ingress traffic for network access control lists (NACLs) is unrestricted. The rule fails if a NACL inbound entry allows a source CIDR block of '0.0.0.0/0' or '::/0' for ports 22 or 3389.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.vpc_network_acl_remote_administration

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.vpc_network_acl_remote_administration --share

SQL

This control uses a named query:

vpc_network_acl_remote_administration

Tags