turbot/aws_compliance

Control: VPC route table should restrict public access to IGW

Description

Ensure that there are public routes in the route table to an Internet Gateway (IGW). The rule is non-compliant if a route to an IGW has a destination CIDR block of '0.0.0.0/0' or '::/0'.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.vpc_route_table_restrict_public_access_to_igw

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.vpc_route_table_restrict_public_access_to_igw --share

SQL

This control uses a named query:

vpc_route_table_restrict_public_access_to_igw

Tags