diff --git a/en/aws/ec2/open-postgresql.md b/en/aws/ec2/open-postgresql.md index 0336588d0..6862398a3 100644 --- a/en/aws/ec2/open-postgresql.md +++ b/en/aws/ec2/open-postgresql.md @@ -15,17 +15,16 @@ | **Recommended Action** | Restrict TCP port 5432 to known IP addresses | ## Detailed Remediation Steps -1. Log into the AWS Management Console. +1. Log in to the AWS Management Console. 2. Select the "Services" option and search for EC2.
3. Scroll down the left navigation panel and choose "Security Group" under "Network & Security".
4. Select the "EC2 Security Group" that needs to be verified.
-5. Scroll down the bottom panel and choose "Inbound". Verify the value for "Source" column for "PostgreSQL" under "Type" for port "5432" and if any rule have value set to "0.0.0.0/0" or "::/0 " then the selected "Security Group" has "TCP" port for "PostgreSQL" open to the public.
-6. Repeat steps number 2 - 5 to verify other "Security Groups" in the selected AWS region.
-7. Navigate to "Security Groups" under "Network & Security" and select the "Security Group" that needs to modify to restrict the access of "TCP" port 5432 for "PostgreSQL" to specific ip address.
-8. Scroll down the page and select the "Inbound" and click on the "Edit" button.
+5. Scroll down the bottom panel and choose "Inbound rules". Verify the value for "Source" column for "PostgreSQL" under "Type" for port "5432" and if any rule have value set to "0.0.0.0/0" or "::/0 " then the selected "Security Group" has "TCP" port for "PostgreSQL" open to the public.
+6. Repeat step number 2 - 5 to verify other "Security Groups" in the selected AWS region.
+7. Navigate to "Security Groups" under "Network & Security" and select the "Security Group" that needs to be modified to restrict the access of "TCP" port 5432 for "PostgreSQL" to specific IP address.
+8. Scroll down the page and select the "Inbound rules" and click on the "Edit inbound rules" button.
9. In the "Edit inbound rules" tab select either the "MyIP" or "Custom" from the "Source" column.
-10. In the "Edit inbound rules" tab select the "MyIP" from the "Source" column to allow "PostgreSQL" inbound traffic only from specific IP address.
+10. In the "Edit inbound rules" tab select the "MyIP" from the "Source" column to allow "PostgreSQL" inbound traffic only from your IP address.
11. In the "Edit inbound rules" tab select the "Custom" from the "Source" column as per the requirements for "PostgreSQL" and specify static IP/Elastic IP address along with "Description" for the "Security Group" rule.
-12. Click on the "Save" button to make the necessary changes.
-13. Repeat steps number 7 - 12 to restrict TCP port 5432 for "PostgreSQL" to known IP address.
- +12. Click on the "Save rules" button to make the necessary changes.
+13. Repeat step number 7 - 12 to restrict TCP port 5432 for "PostgreSQL" to known IP address.
diff --git a/resources/aws/ec2/open-postgresql/step10.png b/resources/aws/ec2/open-postgresql/step10.png index 4d8ce8365..1befefe0f 100644 Binary files a/resources/aws/ec2/open-postgresql/step10.png and b/resources/aws/ec2/open-postgresql/step10.png differ diff --git a/resources/aws/ec2/open-postgresql/step11.png b/resources/aws/ec2/open-postgresql/step11.png index f526d7d3f..2bf6a9ade 100644 Binary files a/resources/aws/ec2/open-postgresql/step11.png and b/resources/aws/ec2/open-postgresql/step11.png differ diff --git a/resources/aws/ec2/open-postgresql/step12.png b/resources/aws/ec2/open-postgresql/step12.png index 366c96232..72dd6eaf0 100644 Binary files a/resources/aws/ec2/open-postgresql/step12.png and b/resources/aws/ec2/open-postgresql/step12.png differ diff --git a/resources/aws/ec2/open-postgresql/step2.png b/resources/aws/ec2/open-postgresql/step2.png index 2343198f3..a741a67a8 100644 Binary files a/resources/aws/ec2/open-postgresql/step2.png and b/resources/aws/ec2/open-postgresql/step2.png differ diff --git a/resources/aws/ec2/open-postgresql/step3.png b/resources/aws/ec2/open-postgresql/step3.png index 93f831769..4bf2a756d 100644 Binary files a/resources/aws/ec2/open-postgresql/step3.png and b/resources/aws/ec2/open-postgresql/step3.png differ diff --git a/resources/aws/ec2/open-postgresql/step4.png b/resources/aws/ec2/open-postgresql/step4.png index ff783e3eb..d2eb4089b 100644 Binary files a/resources/aws/ec2/open-postgresql/step4.png and b/resources/aws/ec2/open-postgresql/step4.png differ diff --git a/resources/aws/ec2/open-postgresql/step5.png b/resources/aws/ec2/open-postgresql/step5.png index 73ba303d3..12ad361f9 100644 Binary files a/resources/aws/ec2/open-postgresql/step5.png and b/resources/aws/ec2/open-postgresql/step5.png differ diff --git a/resources/aws/ec2/open-postgresql/step7.png b/resources/aws/ec2/open-postgresql/step7.png index 6d6569036..31f7ffd58 100644 Binary files a/resources/aws/ec2/open-postgresql/step7.png and b/resources/aws/ec2/open-postgresql/step7.png differ diff --git a/resources/aws/ec2/open-postgresql/step8.png b/resources/aws/ec2/open-postgresql/step8.png index 324112f93..0aba34850 100644 Binary files a/resources/aws/ec2/open-postgresql/step8.png and b/resources/aws/ec2/open-postgresql/step8.png differ diff --git a/resources/aws/ec2/open-postgresql/step9.png b/resources/aws/ec2/open-postgresql/step9.png index b7b3d0c6e..9425f9407 100644 Binary files a/resources/aws/ec2/open-postgresql/step9.png and b/resources/aws/ec2/open-postgresql/step9.png differ