Rules Contributing to AWS High-Risk Ports Exposed to Internet Alert

The following rules are used to detect AWS security group rules that expose high-risk ports to the Internet. Any one or more of these will trigger the AWS High-Risk Ports Exposed to Internet Alert. Details for each rule can be viewed by clicking the More Details link in the description.
|
Title |
Description |
||||||||
|---|---|---|---|---|---|---|---|---|---|
|
AWS High-Risk Ports Exposed to Internet |
Identifies when a specified inbound (ingress) rule is added or adjusted for a VPC security group in AWS EC2 that allows traffic from any IP address to common remote access ports. More details
Rule IDQuery{'selection1': {'configResourceType': 'AWS::EC2::SecurityGroup'}, 'selection2': {'ipPermissions_fromPort': [22, 3389, 389, 445], 'ipPermissions_ipRanges': ['0.0.0.0/0', '::/0']}, 'condition': 'selection1 and selection2'} Log SourceStellar Cyber AWS configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferencesSeverity50 Suppression Logic Based On
Additional Information
|
