Skip to content

Latest commit

 

History

History

ec2_close_port_3389

Close Port 3389 for all Security Groups associated with an EC2 Instance

This job blocks public access to port 3389 for both IPv4 and IPv6 for all security groups associated with an EC2 instance by removing all the ingress security group rules containing port 3389 in the port range and source as "0.0.0.0/0" or "::/0".

Applicable Rule

Rule ID:

5c8c26437a550e1fb6560c42

Rule Name:

An EC2 instance's Remote Desktop port (3389) is accessible from the public Internet for any source address

Getting Started

Prerequisites

The provided AWS credential must have access to ec2:DescribeInstances, ec2:RevokeSecurityGroupIngress, ec2:DescribeSecurityGroupRules.

You may find the latest example policy file here

Running the script

You may run this script using following commands:

  pip install -r ../../requirements.txt
  python3 ec2_close_port_3389.py

Running the tests

You may run test using following command under vss-remediation-worker-job-code-python directory:

    python3 -m pytest

Contributing

The VMware Aria Automation for Secure Clouds team welcomes welcomes contributions from the community. If you wish to contribute code and you have not signed our contributor license agreement (CLA), our bot will update the issue when you open a Pull Request. For any questions about the CLA process, please refer to our FAQ. All contributions to this repository must be signed as described on that page. Your signature certifies that you wrote the patch or have the right to pass it on as an open-source patch.

For more detailed information, refer to CONTRIBUTING.md.

Versioning

We use SemVer for versioning. For the versions available, see the tags on this repository.

Authors

  • VMware VMware Aria Automation for Secure Clouds - Initial work

See also the list of contributors who participated in this project.

License

This project is licensed under the Apache License - see the LICENSE file for details