
Summary
This rule monitors the creation of overly permissive Network Access Control List (ACL) entries within AWS environments, particularly those allowing access from the IP address range 0.0.0.0/0. Such entries can pose significant security risks by exposing resources to unwanted traffic. The rule is triggered when a Network ACL entry is created that permits traffic from any source, which could be exploited by malicious actors. The detection is backed by AWS CloudTrail logs, specifically focusing on events related to ACL modifications. A remediation action is suggested, which involves removing the overly permissive rule and replacing it with one that enforces stricter access controls. This aligns with best practices for cloud security, ensuring that only necessary traffic is allowed to the resources associated with the ACL. The severity level for this potential misconfiguration is marked as medium, indicating a noteworthy risk without immediate critical implications.
Categories
- Cloud
- AWS
- Network
Data Sources
- Cloud Storage
- Network Traffic
- Application Log
ATT&CK Techniques
- T1098
Created: 2022-09-02