Review the route tables configured for your peered Virtual Private Networks (VPCs) to determine if the VPC peering connection configuration is using least access routing policies. For example, a least access routing policy could be one that limits routing to specific subnets or hosts instead of allowing routing between the entire CIDR block of each VPC available within the peering connection.
Having the route tables associated with your VPC peering connection configured to allow traffic only between specific resources represents an effective way of minimizing the impact of security breaches as cloud resources outside of these routes become inaccessible to the peered VPC.
As an example, this guide uses a routing policy that limits peering traffic between two specific hosts running within the peered VPCs as the desired least access routing policy.
Audit
To determine if the route tables configured for your peered VPCs are using least access routing policies, perform the following operations:
Remediation / Resolution
To ensure that your VPC peering connections are using least access routing policies, perform the following operations:
References
- Alibaba Cloud Documentation
- Overview of VPC connections
- Create and manage a VPC peering connection
- Examples of VPC peering connections
- Create and manage a route table
- Alibaba Cloud CLI Documentation
- ListVpcPeerConnections
- DescribeRouteTableList
- DescribeRouteEntryList
- CreateRouteEntry
- DeleteRouteEntry