Ensure that the Amazon MQ brokers provisioned in your AWS account are not publicly accessible from the Internet in order to avoid exposing sensitive data and minimize security risks. The level of access to your MQ brokers depends on their use cases, however, for most use cases Trend Cloud One™ – Conformity recommends that the MQ brokers should be privately accessible only from within your AWS Virtual Private Cloud (VPC).
This rule can help you with the following compliance standards:
- PCI
- HIPAA
- GDPR
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
Public Amazon MQ brokers can be accessed directly, outside of a Virtual Private Cloud (VPC), therefore every machine on the Internet can reach your brokers through their public endpoints and this can increase the opportunity for malicious activity such as cross-site scripting (XSS) and clickjacking attacks.
Audit
To determine if your Amazon MQ brokers are publicly accessible, perform the following actions:
Remediation / Resolution
To disable public accessibility for your existing Amazon MQ brokers, you must re-create your brokers with a different configuration so that the brokers endpoints can be reachable only within your VPC. To relaunch your MQ brokers, perform the following actions:
References
- AWS Documentation
- Amazon MQ
- Amazon MQ Basic Elements
- Getting Started with Amazon MQ
- Tutorial: Creating and Configuring an Amazon MQ Broker
- Tutorial: Deleting an Amazon MQ Broker
- AWS Command Line Interface (CLI) Documentation
- list-brokers
- describe-broker
- create-broker