Critical

Ensure default security groups are not in use by ELB

Security & Compliance
Description

An Elastic Load Balancer (ELB) is a service provided by Amazon Web Services (AWS) that distributes incoming traffic across multiple EC2 instances. When you create an ELB, AWS automatically creates a set of default security groups that control the network traffic to and from your load balancer. These default security groups are intended to be used for testing and development purposes only.It is important to ensure that default security groups are not used by ELB in a production environment because they may not be configured with the appropriate security rules and could lead to security vulnerabilities or unauthorized access to your load balancer. Therefore, it is recommended that you create and use custom security groups instead of default security groups for your ELB.‍

Remediation

Here are the steps to remediate the issue of default security groups being used by Elastic Load Balancer (ELB):

  1. Identify ELB: Identify the ELB(s) in your AWS account that are using default security groups.
  2. Create new security groups: Create new security groups with appropriate rules for your production environment. For example, you might create a security group that only allows traffic from specific IP addresses or that allows traffic only on specific ports.
  3. Update ELB security groups: Update the security groups associated with your ELB to use the newly created security groups. You can do this by modifying the ELB settings in the AWS Management Console or by using AWS CLI.
  4. Test and validate: Test your new security groups to ensure they are functioning as expected and that your ELB is accessible only to authorized resources.
  5. Remove default security groups: Once you have updated the security groups for all of your ELBs, you should remove the default security groups that were created by AWS. This will help to ensure that the default security groups are not accidentally used in the future.

By following these remediation steps, you can help to ensure that default security groups are not used by ELB in your production environment, which can help to prevent security vulnerabilities and unauthorized access to your load balancer.

Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.