Mods
AWS

Control: AWS > PCI v3.2.1 > Lambda > 2 Lambda functions should be in a VPC

This control checks whether a Lambda function is in a VPC.

It does not evaluate the VPC subnet routing configuration to determine public reachability.

Note that if Lambda@Edge is found in the account, then this control generates failed findings. To prevent these findings, you can disable this control.

Remediation

To configure a function to connect to private subnets in a virtual private cloud (VPC) in your account

  1. Open the AWS Lambda console.
  2. Navigate to Functions and then select your Lambda function.
  3. Scroll to Network and then select a VPC with the connectivity requirements of the function.
  4. To run your functions in high availability mode, Security Hub recommends that you choose at least two subnets.
  5. Choose at least one security group that has the connectivity requirements of the function.
  6. Choose Save.

PCI requirement(s): 1.2.1, 1.3.1, 1.3.2, 1.3.4

Resource Types

This control targets the following resource types:

Category

In Your Workspace

Developers