Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
AWS
Loading resources...

Resource Type: AWS > VPC > Network ACL

The Network Access Control List (Network ACL) resource type is part of the AWS Virtual Private Cloud (VPC) service. Each Network ACL is a virtual firewall for controlling traffic in and out of a VPC subnet. It can be used to create rules that allow or deny specific traffic to and from associated EC2 instances.

Resource Context

Network ACL is a part of the VPC service.

Each Network ACL lives under a VPC.

Controls

The primary controls for AWS > VPC > Network ACL are:

  • Active
  • Allowed
  • Approved
  • CMDB
  • Configured
  • Discovery
  • Ingress Rules
  • Intelligent Assessment
  • ServiceNow
  • Tags
  • Usage

It is also targeted by these controls:

  • AWS > CIS v1.4 > 5 - Networking > 5.01 - Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports (Automated)
  • AWS > CIS v2.0 > 5 - Networking > 5.01 - Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports
  • AWS > CIS v3.0 > 5 - Networking > 5.01 - Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports
  • AWS > CIS v4.0 > 5 - Networking > 5.02 - Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports
  • AWS > CIS v5.0 > 5 - Networking > 5.02 - Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports
  • AWS > CIS v6.0 > 6 - Networking > 6.02 - Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports

Quick Actions

  • Delete
  • Revoke Unapproved Rules
  • Router
  • Set Tags
  • Skip alarm for Active control
  • Skip alarm for Active control [90 days]
  • Skip alarm for Approved control
  • Skip alarm for Approved control [90 days]
  • Skip alarm for Tags control
  • Skip alarm for Tags control [90 days]
  • Update Tags

Category

  • Networking

In Your Workspace

  • Controls by Resource Type report
  • Policy Settings by Resource Type report
  • Resources by Resource Type report

Developers

    Resource Type URI
    • tmod:@turbot/aws-vpc-security#/resource/types/networkAcl
  • Category URI
    • tmod:@turbot/turbot#/resource/categories/networking
  • GraphQL
    • query resource(id: "tmod:@turbot/aws-vpc-security#/resource/types/networkAcl") { … }
    • query resourceActivities(filter: "resourceId:'tmod:@turbot/aws-vpc-security#/resource/types/networkAcl'") { … }
    • mutation createResource(input: { … })
    • mutation updateResource(input: { … })
  • CLI
    • Get Resource
    • turbot graphql resource --id "tmod:@turbot/aws-vpc-security#/resource/types/networkAcl"
  • Steampipe Query
    • Get Resource
    • select * from guardrails_resource where resource_type_uri = 'tmod:@turbot/aws-vpc-security#/resource/types/networkAcl';
    • Get Policy Settings (By Resource ID)
    • select * from guardrails_policy_setting where filter = 'resourceTypeId:"tmod:@turbot/aws-vpc-security#/resource/types/networkAcl"';
    • Get Resource Notification
    • select * from guardrails_notification where resource_type_uri = 'tmod:@turbot/aws-vpc-security#/resource/types/networkAcl' and notification_type in ('resource_updated', 'resource_created');
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
180
Mods
497
Resource Types
8,691
Policies
3,362
Controls
1,833
Quick Actions
540
IAM