Ensure there is no unrestricted inbound access to TCP port 80 (HTTP)

Security & Compliance

TCP port 80 is the standard port used for web traffic and is commonly used for HTTP (Hypertext Transfer Protocol) traffic. If this port is open and accessible to the internet without any restrictions, it can be a major security vulnerability as attackers can exploit it to gain unauthorized access to your web server and sensitive data.


Here are the steps to remediate the issue of unrestricted inbound access to TCP port 80 (HTTP):

  1. Identify open ports: Identify any open TCP ports in your security groups or network access control lists (ACLs) that allow inbound traffic to port 80 (HTTP).
  2. Restrict access: Restrict access to TCP port 80 (HTTP) by modifying the security group rules and network ACLs to allow inbound traffic only from trusted sources. This can be done by adding specific IP addresses or IP address ranges to the allowed list.
  3. Implement HTTPS: Implement HTTPS to encrypt web traffic and prevent interception. HTTPS uses the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols to provide secure communication between clients and servers.
  4. Implement web application firewalls (WAFs): Implement WAFs to protect against common web application attacks, such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF).
  5. Test and validate: Test your new security group rules and network ACLs to ensure that they are functioning as expected and that only authorized sources are able to access port 80 (HTTP).
  6. Monitor and update: Regularly monitor your security group rules and network ACLs for changes and update them as needed to ensure that your systems are always protected against unauthorized access through TCP port 80 (HTTP).

By following these remediation steps, you can help to ensure that there is no unrestricted inbound access to TCP port 80 (HTTP), which can help to prevent security breaches and protect your sensitive data.

Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.