Checks whether the access control whitelists of the listeners of each Application Load Balancer (ALB) instance exclude specified IP addresses or CIDR blocks. If so, the evaluation result is Compliant.

Scenarios

This rule applies when you need to add specific IP addresses or CIDR blocks to the access control whitelist of a listener of an ALB instance. This helps reduce network exposure and ensures the network security of cloud environments.

Risk level

Default risk level: high.

When you configure this rule, you can change the risk level based on your business requirements.

Compliance evaluation logic

  • If the access control whitelists of the listeners of each ALB instance exclude specified IP addresses or CIDR blocks, the evaluation result is Compliant.
  • If an access control whitelist of a listener of an ALB instance includes a specified IP address or CIDR block, the evaluation result is Incompliant. For more information about how to remediate an incompliant configuration, see Incompliance remediation.

Rule details

Item Description
Rule name alb-acl-no-has-specified-ip
Rule identifier alb-acl-no-has-specified-ip
Tag ALB and LoadBalancer
Automatic remediation Not supported
Trigger type Periodic execution
Evaluation frequency Interval of 24 hours
Supported resource type ALB instances
Input parameter IpAddress

Incompliance remediation

Modify the access control whitelists of all listeners of an ALB instance. Make sure that the IP addresses or CIDR blocks in the access control whitelists are different from the IP addresses or CIDR blocks that are specified in Cloud Config. For more information, see Access control.