CCSS (Common Configuration Scoring System) is a set of measures used to determine the severity of the rule.
Each rule is associated with a high-level category. For example IAM, Container, Monitoring, Logging, Network, etc.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsRemoving unfettered connectivity to remote console services, such as Remote Desktop Protocol, reduces a server's exposure to risk.
Remove any invalid ingress
block from the aws_security_group
.
An ingress
block is invalid if it contains both of the following:
0.0.0.0/0
in the cidr_blocks
field3389
is within the port range defined from from_port
to to_port
, OR from_port
and to_port
are both set to 0
Example configuration:
resource "aws_security_group" "example" {
ingress {
cidr_blocks = [10.0.0.0/16]
from_port = 3389
to_port = 3389
# other required fields here
}
}
Remove any invalid SecurityGroupIngress
block from the AWS::EC2::SecurityGroup
.
A SecurityGroupIngress
block is invalid if it contains both of the following:
0.0.0.0/0
in the CidrIp field3389
is within the port range defined from FromPort to ToPort, OR FromPort and ToPort are both set to 0
Example configuration:
JSON example configuration:
{
"ValidSecurityGroup02": {
"Type": "AWS::EC2::SecurityGroup",
"Properties": {
"SecurityGroupIngress": [
{
"CidrIp": "10.0.0.0/16",
"FromPort": 3389,
"ToPort": 3389,
"IpProtocol": "tcp"
}
]
}
# other required fields here
}
}
YAML example configuration:
ValidSecurityGroup02:
Type: AWS::EC2::SecurityGroup
Properties:
SecurityGroupIngress:
- CidrIp: '10.0.0.0/16'
FromPort: 3389
ToPort: 3389
IpProtocol: "tcp"
# other required fields here