diff --git a/README.md b/README.md index cb1472c3c..8a64628fb 100644 --- a/README.md +++ b/README.md @@ -67,6 +67,7 @@ This repository is an extension of CloudSploit's [open-source scanning engine](h * [Open Telnet](en/aws/ec2/open-telnet.md) * [Open VNC Client](en/aws/ec2/open-vnc-client.md) * [Open VNC Server](en/aws/ec2/open-vnc-server.md) + * [Open HTTPS](en/aws/ec2/open-https.md) * [Overlapping Security Groups](en/aws/ec2/overlapping-security-groups.md) * [Public AMI](en/aws/ec2/public-ami.md) * [Subnet IP Availability](en/aws/ec2/subnet-ip-availability.md) diff --git a/en/aws/ec2/open-https.md b/en/aws/ec2/open-https.md new file mode 100644 index 000000000..818763284 --- /dev/null +++ b/en/aws/ec2/open-https.md @@ -0,0 +1,30 @@ +[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com) + +# AWS / EC2 / Open HTTPS + +## Quick Info + +| | | +|-|-| +| **Plugin Title** | Open HTTPS | +| **Cloud** | AWS | +| **Category** | EC2 | +| **Description** | Determine if TCP port 443 for HTTPS is open to the public | +| **More Info** | Network security groups should be periodically evaluated for port misconfigurations. Where certain ports and protocols may be exposed to the Internet, they should be evaluated for necessity and restricted wherever they are not explicitly required and narrowly configured. | +| **AWS Link** | http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/authorizing-access-to-an-instance.html | +| **Recommended Action** | Restrict TCP port 443 to known IP addresses. | + +## Detailed Remediation Steps +1. Log in to the AWS Management Console. +2. Select the "Services" option and search for EC2.
+3. Scroll down the left navigation panel and choose "Security Group" under "Network & Security".
+4. Select the "EC2 Security Group" that needs to be verified.
+5. Scroll down the bottom panel and choose "Inbound rules". Verify the value for "Source" column for "HTTPS" under "Type" for port "443" if the rule have value set to "0.0.0.0/0" or "::/0 " then the selected "Security Group" has "TCP" port for "HTTPS" open to the public.
+6. Repeat step number 2 - 5 to verify other "Security Groups" in the selected AWS region.
+7. Navigate to "Security Groups" under "Network & Security" and select the "Security Group" that needs to be modified to restrict the access of "TCP" port "443" for "HTTPS" to specific IP address.
+8. Scroll down the page and select the "Inbound rules" and click on the "Edit inbound rules" button to the right.
+9. In the "Edit inbound rules" tab select either the "MyIP" or "Custom" from the "Source" column.
+10. In the "Edit inbound rules" tab select the "MyIP" or any CIDR Block from the "Source" column to allow "HTTPS" inbound traffic only from your IP address.
+11. Click on the "Save rules" button to make the necessary changes.
+12. Repeat step number 7 - 12 to restrict TCP port "443" for "HTTPS".
+ diff --git a/resources/aws/ec2/open-https/step10.png b/resources/aws/ec2/open-https/step10.png new file mode 100644 index 000000000..70c5ff6fb Binary files /dev/null and b/resources/aws/ec2/open-https/step10.png differ diff --git a/resources/aws/ec2/open-https/step11.png b/resources/aws/ec2/open-https/step11.png new file mode 100644 index 000000000..943ae135f Binary files /dev/null and b/resources/aws/ec2/open-https/step11.png differ diff --git a/resources/aws/ec2/open-https/step2.png b/resources/aws/ec2/open-https/step2.png new file mode 100644 index 000000000..a741a67a8 Binary files /dev/null and b/resources/aws/ec2/open-https/step2.png differ diff --git a/resources/aws/ec2/open-https/step3.png b/resources/aws/ec2/open-https/step3.png new file mode 100644 index 000000000..4e2075815 Binary files /dev/null and b/resources/aws/ec2/open-https/step3.png differ diff --git a/resources/aws/ec2/open-https/step4.png b/resources/aws/ec2/open-https/step4.png new file mode 100644 index 000000000..ab930c694 Binary files /dev/null and b/resources/aws/ec2/open-https/step4.png differ diff --git a/resources/aws/ec2/open-https/step5.png b/resources/aws/ec2/open-https/step5.png new file mode 100644 index 000000000..ff6583392 Binary files /dev/null and b/resources/aws/ec2/open-https/step5.png differ diff --git a/resources/aws/ec2/open-https/step7.png b/resources/aws/ec2/open-https/step7.png new file mode 100644 index 000000000..93f35fcec Binary files /dev/null and b/resources/aws/ec2/open-https/step7.png differ diff --git a/resources/aws/ec2/open-https/step8.png b/resources/aws/ec2/open-https/step8.png new file mode 100644 index 000000000..818e7d0af Binary files /dev/null and b/resources/aws/ec2/open-https/step8.png differ diff --git a/resources/aws/ec2/open-https/step9.png b/resources/aws/ec2/open-https/step9.png new file mode 100644 index 000000000..2a01e158c Binary files /dev/null and b/resources/aws/ec2/open-https/step9.png differ