Control: AWS > CIS v3.0 > 5 - Networking
Covers recommendations for configuring AWS networking features.
Primary Policies
The following policies can be used to configure this control:
- 5 - Networking > 5.01 - Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports
- 5 - Networking > 5.02 - Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports
- 5 - Networking > 5.03 - Ensure no security groups allow ingress from ::/0 to remote server administration ports
- 5 - Networking > 5.04 - Ensure the default security group of every VPC restricts all traffic
- 5 - Networking > 5.05 - Ensure routing tables for VPC peering are 'least access'
- 5 - Networking > 5.05 - Ensure routing tables for VPC peering are 'least access' > Attestation
- 5 - Networking > 5.06 - Ensure that EC2 Metadata Service only allows IMDSv2
- 5 - Networking
- 5 - Networking > Maximum Attestation Duration
Category
In Your Workspace
Developers
- tmod:@turbot/aws-cisv3-0#/control/types/s05
- tmod:@turbot/cis#/control/categories/cis
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-cisv3-0#/control/types/s05"
Get Controls
Control Type URI
Category URI
GraphQL
CLI