Network ACLs should enforce inbound traffic restrictions

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Description

Investigate AWS Network Access Control Lists (NACLs) for rules that enable multiple open ports and limit ingress traffic access based on port range.

Rationale

Eliminate the threat of unauthorized access malicious activities, such as Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks, by opening only the ports that are required by your application.

Remediation

From the console

Follow the Adding and deleting rules docs to limit ingress traffic access based on port range.

From the command line

  1. Run replace-network-acl-entry to create a rule that only allows ingress traffic from a specific port range.

    replace-network-acl-entry.sh

        aws ec2 replace-network-acl-entry
            --network-acl-id id-01234567
            --ingress
            --rule-number 01
            --protocol tcp
            --port-range From=000,To=000
            --rule-action allow
        
PREVIEWING: brett.blue/embedded-collector-release