-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ensure no security groups allow ingress from wide-open non-RFC1918 address. False positive #4936
Comments
Hi @mikkoc , thanks for using Prowler 🚀 ! The Lines 41 to 53 in d8d348f
For many organizations, public egress is a security concern. If you want to accept this finding, you can use the Prowler Mutelist feature: https://docs.prowler.com/projects/prowler-open-source/en/latest/tutorials/mutelist/ . This should keep Prowler from reporting the finding to Security Hub. Does this make sense? |
Hello, @thejaywhy. In this case I suggest changing the title to As a matter of fact, we have other Security Groups which allow egress and ingress to/from 0.0.0.0/0 on 443 but they are not flagged by Prowler. Is 443 considered OK? The SG in question allows egress 443 and 22 on a /20 CIDR range, and it gets flagged. Very confusing. |
Hi! @mikkoc how are you? Regarding to the SG not flagged by Prowler, are these SG in use? We check this inside the check, and if not used, it won't be flagged by Prowler. You can find more info related with this here. Btw, we will change this check metadata to explain that currently, we are checking ingress and egress rules. I created this issue-> #4945 so you can track the progress on these tasks |
Hello @pedrooot, I'm fine thanks and you? The SGs are definitely in use. One is attached to our public ALB, and it allows ingress on 443 from 0.0.0.0/0 |
Checking this! Thanks for the info, I'll ping you with the solution for this issue. |
Hi! @mikkoc This check had a bad metadata, it only ensures that the netmask from the IPs are between 0 and 24 but both are not included. This is the reason why Prowler is not raising Failed findings for your SG configuration related with |
Steps to Reproduce
Running prowler on AWS, sending findings to aggregate to SecHub.
The following finding is triggered with HIGH.
Ensure no security groups allow ingress from wide-open non-RFC1918 address.
The Security Group in question does not have any ingress rule. It has however 60 outbound rules.
Expected behavior
No finding should be triggered at all.
Actual Result with Screenshots or Logs
How did you install Prowler?
From pip package (pip install prowler)
Environment Resource
CodeBuild
OS used
AL 2023
Prowler version
4.3.3
Pip version
24.0
Context
The Security group is created via Terraform:
The text was updated successfully, but these errors were encountered: