Skip to content

Commit

Permalink
Patch 387 (#409)
Browse files Browse the repository at this point in the history
* Update open-all-ports-protocols.md

* Update step2.png

Updated image in step 2

* Update step3.png

Updated image in step 3

* Update step4.png

Updated Image for step 4

* Update step5.png

Updated image for step 5

* Update step7.png

Updated Image for step 7

* Update step8.png

Updated image for step 8

* Update step8.png

Updated image for step 8

* Update step9.png

Updated image in step 9

* Update open-all-ports-protocols.md

* Update step8.png

Updated image for step 8

* Update open-all-ports-protocols.md

Updated step 8

* Update open-all-ports-protocols.md

Updated step 10

* Update step10.png

Updated image in step 10

* Update step9.png

Updated image for step 9

* Update step11.png

Updated image for step 11

* Update open-all-ports-protocols.md

Updated step 11

* Update step10.png

Updated image for step 10

* Update open-all-ports-protocols.md

* Update open-all-ports-protocols.md

* Apply suggestions from code review

Co-authored-by: alphadev4 <[email protected]>
  • Loading branch information
shuklaalok87 and alphadev4 authored Nov 2, 2022
1 parent 9fc15cb commit 9a8dfdf
Show file tree
Hide file tree
Showing 10 changed files with 9 additions and 9 deletions.
18 changes: 9 additions & 9 deletions en/aws/ec2/open-all-ports-protocols.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,15 +15,15 @@
| **Recommended Action** | Modify the security group to specify a specific port and protocol to allow. |

## Detailed Remediation Steps
1. Log into the AWS Management Console.
1. Log in to the AWS Management Console.
2. Select the "Services" option and search for EC2. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step2.png"/>
3. Scroll down the left navigation panel and choose "Security Group" under "Network & Security".</br> <img src="/resources/aws/ec2/open-all-ports-protocols/step3.png"/>
3. Scroll down the left navigation panel and choose "Security Groups" under "Network & Security".</br> <img src="/resources/aws/ec2/open-all-ports-protocols/step3.png"/>
4. Select the "EC2 Security Group" that needs to be verified. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step4.png"/>
5. Scroll down the bottom panel and choose "Inbound". Verify the value for "Source" column and if any rule have value set to "0.0.0.0/0" or "::/0 " then the selected "Security Group" has one or many ports open to the public.</br> <img src="/resources/aws/ec2/open-all-ports-protocols/step5.png"/>
5. Scroll down the bottom panel and choose "Inbound rules". Verify the value for "Source" column and if any rule have value set to "0.0.0.0/0" or "::/0 " then the selected "Security Group" has one or many ports open to the public.</br> <img src="/resources/aws/ec2/open-all-ports-protocols/step5.png"/>
6. Repeat steps number 2 - 5 to verify other "Security Groups" in the selected AWS region.</br>
7. Navigate to "Security Groups" under "Network & Security" and select the "Security Group" that needs to modify to restrict the access to specific ip address. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step7.png"/>
8. Scroll down the "Security Group" page and select the "Inbound" and click on the "Edit" button. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step8.png"/>
9. In the "Edit inbound rules" tab select the "MyIP" from the "Source" column to allow inbound traffic only from specific IP address.</br> <img src="/resources/aws/ec2/open-all-ports-protocols/step9.png"/>
10. In the "Edit inbound rules" tab select the "Custom" from the "Source" column as per the requirements and specify the "static IP" address of the permitted host along with "Description" for the "Security Group" rule. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step10.png"/>
11. Click on the "Save" button to make the necessary changes. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step11.png"/>
12. Repeat steps number 7 - 11 to modify the security group to specify a specific port and protocol to allow.</br>
7. Navigate to "Security Groups" under "Network & Security" and select the "Security Group" that needs to be modified to restrict the access to specific IP address. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step7.png"/>
8. Scroll down the "Security Group" page and select the "Inbound rules" and click on the "Edit inbound rules" button to the right. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step8.png"/>
9. In the "Edit inbound rules" tab select the "MyIP" from the "Source" column of type "SSH" to allow inbound traffic only from your current IP address.</br> <img src="/resources/aws/ec2/open-all-ports-protocols/step9.png"/>
10. In the "Edit inbound rules" tab select the "Custom" from the "Source" column if you want to specify a "static IP" address of the permitted host along with "Description" for the "Security Group" rule. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step10.png"/>
11. Click on the "Save rules" button to make the necessary changes. </br> <img src="/resources/aws/ec2/open-all-ports-protocols/step11.png"/>
12. Repeat steps number 7 - 11 to modify the security group to add a specific port and protocol to allow.</br>
Binary file modified resources/aws/ec2/open-all-ports-protocols/step10.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-all-ports-protocols/step11.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-all-ports-protocols/step2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-all-ports-protocols/step3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-all-ports-protocols/step4.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-all-ports-protocols/step5.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-all-ports-protocols/step7.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-all-ports-protocols/step8.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified resources/aws/ec2/open-all-ports-protocols/step9.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 9a8dfdf

Please sign in to comment.