5.12 Ensure an AWS Managed Config Rule for EIPs attached to EC2 instances within VPC

Information

AWS Config provides you with a detailed inventory of your AWS resources and their current configuration, and continuously records configuration changes to these resources.

You can evaluate these configurations and changes for compliance with ideal configurations as defined by AWS Config Rules.
Evaluation of EC2 instance configuration to ensure there are no publicly addressable IP's attached which would violate the defence in depth model

Solution

Using the Amazon unified command line interface:

* Create locally a json file (similar with the below sample) with the configuration of the Config Rule, and save it as /tmp/ConfigRule.json:

"Description": "Checks whether all EIP addresses allocated to a VPC are attached to EC2 instances or in-use ENIs.",
"ConfigRuleName": "eip-attached",
"Source": {
"Owner": "AWS",
"SourceIdentifier": "EIP_ATTACHED"
},
"Scope": {
"ComplianceResourceTypes": [
"AWS::EC2::EIP"
]
}
}

* Create a Config Rule using the configuration saved earlier:

aws configservice put-config-rule --config-rule file:///tmp/ConfigRule.json

See Also

https://workbench.cisecurity.org/files/260

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7

Plugin: amazon_aws

Control ID: 816ef783f67db213196e08b1c34335de87e105f034042528e24dc9304f98241e