Identify fully accessible Amazon VPC endpoints and update their access policy in order to stop any unsigned requests initiated for the supported AWS cloud services and resources.
This rule can help you with the following compliance standards:
- PCI
- GDPR
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
When the "Principal" element value is set to "*" within the VPC endpoint access policy, the endpoint allows full access (i.e. allow access by any user or service within the VPC using credentials from any AWS accounts to any resources in this AWS service). Allowing access in this manner is considered a bad practice and can lead to data exposure, data loss and/or unexpected charges on your AWS bill.
Audit
To determine if your Amazon VPC endpoints are exposed to everyone, perform the following operations:
Remediation / Resolution
To restrict access for your exposed Amazon VPC endpoints, perform the following operations:
References
- AWS Documentation
- Amazon VPC FAQs
- AWS PrivateLink concepts
- Identity and access management for Amazon VPC
- AWS Policy Generator
- AWS Blog
- New – VPC Endpoint for Amazon S3
- AWS Command Line Interface (CLI) Documentation
- ec2
- describe-vpc-endpoints
- modify-vpc-endpoint
- CloudFormation Documentation
- AWS::EC2::VPCEndpoint
- Terraform Documentation
- AWS Provider