Checks whether each inbound rule in a security group allows access only from the ports in a specified range when the Authorization Object parameter of the inbound rule is set to 0.0.0.0/0. If so, the evaluation result is Compliant.

Scenarios

This rule applies when you need to configure a rule for a security group based on the principle of least privilege (PoLP). This helps you reduce network exposure and ensure the network security of cloud environments.

Risk level

Default risk level: high.

When you apply this rule, you can change the risk level based on your business requirements.

Compliance evaluation logic

  • If each inbound rule in a security group allows access only from the ports in a specified range when the Authorization Object parameter of the inbound rule is set to 0.0.0.0/0, the evaluation result is Compliant.
  • If an inbound rule allows access from a port that is not in a specified range when the Authorization Object parameter of the inbound rule is set to 0.0.0.0/0, the evaluation result is Incompliant. For more information about how to remediate an incompliant configuration, see Incompliance remediation.
  • This rule applies only to Elastic Compute Service (ECS). This rule does not apply to other Alibaba Cloud services, such as Cloud Firewall (CFW) and NAT Gateway, or security groups that are used by virtual network operators (VNOs).
    Note Security groups that are created by using Alibaba Cloud services except ECS in managed mode are called managed security groups. For more information about managed security groups, see Managed security groups.

Rule details

ItemDescription
Rule nameecs-security-group-white-list-port-check
Rule identifierecs-security-group-white-list-port-check
TagSecurityGroup
Automatic remediationNot supported
Trigger typeConfiguration change
Supported resource typeECS security group
Input parameterports
Note Separate multiple values with commas (,).

Incompliance remediation

Modify a security group rule. For more information, see Modify security group rules.