142 |
143 | Colors
144 |
145 | Red - This security group has ports open and contains instances with public IP
146 | addresses. Those instances can accept traffic on those ports, and it should be
147 | verified that this is intended.
148 |
149 |
150 | Yellow - This security
151 | group is not ideal, but does not present an immediate risk. It is
152 | worth examining to see if it can be further locked down or removed,
153 | if unused.
154 |
155 |
156 | Green - No recommendations
157 | for this security group.
158 |
159 |
160 |
161 | Assumptions
162 |
163 | Default security groups should not be used, and should be locked down.
164 | This prevents instances from accidentally inheriting open ports when
165 | created.
166 |
167 |
168 | Unused security groups should be removed, as they represent surface area
169 | that doesn't need to exist.
170 |
171 |
172 | While we do list IP addresses alongside ports that are open, we do not
173 | verify whether any of the instances are actually listening on those ports.
174 | We recommend not relying only on instances not actively listening
175 | on a port. The principle of defense-in-depth suggests that if an instance
176 | does not need a port open, the firewall should also enforce that.
177 |
178 |
179 |