Ensure that your Amazon API Gateway REST APIs are configured to allow access only to trusted AWS accounts in order to protect against unauthorized cross-account access. Before running this rule by the Trend Micro Cloud One™ – Conformity engine, you must define the account ID of each trusted AWS entity that can access your REST APIs within the rule settings, on your Conformity account console.
This rule can help you work with the AWS Well-Architected Framework.
Allowing untrustworthy cross-account access to your Amazon API Gateway APIs can lead to unauthorized API invocation. To prevent API exposure, you can use the Amazon API Gateway resource policies to allow your REST APIs to be securely invoked only by trusted entities, such as IAM users and IAM roles from other AWS cloud accounts.
Audit
To determine if there are any Amazon API Gateway REST APIs that allow unknown cross-account access available within your AWS account, perform the following actions:
Remediation / Resolution
To update the resource-based policies associated with your Amazon API Gateway REST APIs in order to allow cross-account access only from trusted AWS entities, perform the following actions:
References
- AWS Documentation
- Controlling and managing access to a REST API in API Gateway
- Controlling access to an API with API Gateway resource policies
- API Gateway resource policy examples
- AWS Command Line Interface (CLI) Documentation
- apigateway
- get-rest-apis
- get-rest-api
- update-rest-api
Unlock the Remediation Steps
Free 30-day Trial
Automatically audit your configurations with Conformity
and gain access to our cloud security platform.
You are auditing:
Check for Unknown Cross Account API Access
Risk Level: High