Ensure Amazon Simple Queue Service (SQS) is not exposed to public

HIGH

Description

Allowing unrestricted, public access to cloud services could open an application up to external attack. Disallowing this access is typically considered best practice.

Remediation

In AWS Console -

  1. Sign in to the AWS console and go to the SQS console.
  2. In the list of Queues, select the Queue to edit.
  3. Select the Access policy tab.
  4. Select Edit and then edit the policy accordingly.
  5. Select Save.

In Terraform -

  1. Review the policy attached to the aws_sqs_queue resource and ensure necessary changes are made.

References:
https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-configure-add-permissions.html
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sqs_queue

Policy Details

Rule Reference ID: AC_AWS_0365
CSP: AWS
Remediation Available: Yes
Resource: aws_sqs_queue
Resource Category: Messaging

Frameworks