Check your Amazon EC2 security groups for inbound rules that allow unrestricted access (i.e., 0.0.0.0/0 or ::/0) on TCP port 6379 in order to reduce the exposure to security risks and protect the Redis cache server instances associated with your security groups. Redis is an open-source, in-memory data structure store, used as a database, cache server, and message broker.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
Allowing unrestricted inbound/ingress access on TCP port 6379 (Redis) to your Amazon EC2 instances can increase opportunities for malicious activities such as cross-site scripting, remote code executions, brute-force, and cryptojacking attacks (e.g. RedisWannaMine attacks). The associated security groups should be configured so that the communication to specific resources is restricted to only those hosts or networks that have a legitimate requirement for access.
Audit
To determine if your Amazon EC2 security groups allow unrestricted Redis access, perform the following operations:
Remediation / Resolution
To update the inbound rule configuration for your Amazon EC2 security groups in order to restrict Redis Cache access to trusted networks only, perform the following operations:
References
- AWS Documentation
- Amazon EC2 security groups for Linux instances
- Security group rules reference
- Consolidate and manage network CIDR blocks with managed prefix lists
- AWS Command Line Interface (CLI) Documentation
- describe-security-groups
- revoke-security-group-ingress
- authorize-security-group-ingress
- Redis Documentation
- Redis