Severity : Medium
Description: This control ensures that security group for the VPC have traffic rules configured each with non overlap source or destination CIDR. When editing the security group to attempt to restrict security group rules, it may happen that old wider CIDR rules are not remove. This will give unintended access to resources from network addresses not allowed to access the resources. By following AWS Well-Architected framework guidelines and best security practice to prevent malicious access to resources rule with the wider CIDR must be removed.
Remediation Steps:
Perform following to update rules of the default security group :
Login to the AWS Management Console at https://console.aws.amazon.com.
Navigate to VPC console.
In the navigation pane, Under Security select Security Groups.
From the list of security groups, Select the reported security group for the VPC.
Choose Actions, Edit inbound rules to remove a rule for inbound traffic.
Click Delete for the rule to delete.
Choose Actions, Edit outbound rules to remove a rule for outbound traffic.
Click Delete for the rule to delete.
Choose Preview changes, Confirm.
Important:
Instances using the Security group may stop working when rules are updated for security group. So it's recommended to verify the CIDRs required to allow to access the resources.
Reference :