Skip to content

Commit

Permalink
Patch 388 (#410)
Browse files Browse the repository at this point in the history
* Update open-cifs.md

* Update step2.png

Updated image for step 2

* Update step3.png

Updated image in step 3

* Update step4.png

Updated image for step 4

* Update open-cifs.md

Updated step 3

* Update step5.png

Updated image in step 5

* Update open-cifs.md

Updated step 5

* Update step7.png

Updated image for step 7

* Update step8.png

Updated image in step 8

* Update open-cifs.md

Updated step 8

* Update step9.png

Updated image in step 9

* Update step10.png

Updated image for Step 10

* Update open-cifs.md

Updated step 10

* Update step11.png

Updated image for step 11

* Update step12.png

Updated image for step 12

* Update open-cifs.md

Updated step 12

* Update step10.png

Updated image for step 10

* Apply suggestions from code review

Co-authored-by: alphadev4 <[email protected]>
  • Loading branch information
shuklaalok87 and alphadev4 authored Oct 28, 2022
1 parent 87285ac commit 01a06dd
Show file tree
Hide file tree
Showing 11 changed files with 7 additions and 7 deletions.
14 changes: 7 additions & 7 deletions en/aws/ec2/open-cifs.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,16 +15,16 @@
| **Recommended Action** | Restrict UDP port 445 to known IP addresses |

## Detailed Remediation Steps
1. Log into the AWS Management Console.
1. Log in to the AWS Management Console.
2. Select the "Services" option and search for EC2. </br> <img src="/resources/aws/ec2/open-cifs/step2.png"/>
3. Scroll down the left navigation panel and choose "Security Group" under "Network & Security".</br> <img src="/resources/aws/ec2/open-cifs/step3.png"/>
3. Scroll down the left navigation panel and choose "Security Groups" under "Network & Security".</br> <img src="/resources/aws/ec2/open-cifs/step3.png"/>
4. Select the "EC2 Security Group" that needs to be verified. </br> <img src="/resources/aws/ec2/open-cifs/step4.png"/>
5. Scroll down the bottom panel and choose "Inbound". Verify the value for "Source" column for "Custom UDP Rule" for "CIFS" under "Type" and if any rule have value set to "0.0.0.0/0" or "::/0 " then the selected "Security Group" has "UDP" port for "CIFS" open to the public.</br> <img src="/resources/aws/ec2/open-cifs/step5.png"/>
5. Scroll down the bottom panel and choose "Inbound rules". Verify the value for "Source" column for "Custom UDP Rule" for "CIFS" under "Type" and if any rule have value set to "0.0.0.0/0" or "::/0 " then the selected "Security Group" has "UDP" port for "CIFS" open to the public.</br> <img src="/resources/aws/ec2/open-cifs/step5.png"/>
6. Repeat steps number 2 - 5 to verify other "Security Groups" in the selected AWS region.</br>
7. Navigate to "Security Groups" under "Network & Security" and select the "Security Group" that needs to modify to restrict the access of "UDP" port 445 for "CIFS" to specific ip address. </br> <img src="/resources/aws/ec2/open-cifs/step7.png"/>
8. Scroll down the page and select the "Inbound" and click on the "Edit" button. </br> <img src="/resources/aws/ec2/open-cifs/step8.png"/>
7. Navigate to "Security Groups" under "Network & Security" and select the "Security Group" that needs to be modified to restrict the access of "UDP" port 445 for "CIFS" to specific IP address. </br> <img src="/resources/aws/ec2/open-cifs/step7.png"/>
8. Scroll down the page and select the "Inbound rules" and click on the "Edit inbound rules" button to the right. </br> <img src="/resources/aws/ec2/open-cifs/step8.png"/>
9. In the "Edit inbound rules" tab select either the "MyIP" or "Custom" from the "Source" column.</br> <img src="/resources/aws/ec2/open-cifs/step9.png"/>
10. In the "Edit inbound rules" tab select the "MyIP" from the "Source" column to allow "CIFS" inbound traffic only from specific IP address.</br> <img src="/resources/aws/ec2/open-cifs/step10.png"/>
10. In the "Edit inbound rules" tab select the "MyIP" from the "Source" column to allow "CIFS" inbound traffic only from your specific IP address.</br> <img src="/resources/aws/ec2/open-cifs/step10.png"/>
11. In the "Edit inbound rules" tab select the "Custom" from the "Source" column as per the requirements for "CIFS" and specify static IP/Elastic IP address along with "Description" for the "Security Group" rule. </br> <img src="/resources/aws/ec2/open-cifs/step11.png"/>
12. Click on the "Save" button to make the necessary changes. </br> <img src="/resources/aws/ec2/open-cifs/step12.png"/>
12. Click on the "Save rules" button to make the necessary changes. </br> <img src="/resources/aws/ec2/open-cifs/step12.png"/>
13. Repeat steps number 7 - 12 to restrict UDP port 445 for "CIFS" to known IP address.</br>
Binary file modified resources/aws/ec2/open-cifs/step10.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-cifs/step11.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-cifs/step12.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-cifs/step2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-cifs/step3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-cifs/step4.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-cifs/step5.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-cifs/step7.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-cifs/step8.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-cifs/step9.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 01a06dd

Please sign in to comment.