This job blocks public access to port 3389 for both IPv4 and IPv6 for all security groups associated with an EC2 instance by removing all the ingress security group rules containing port 3389 in the port range and source as "0.0.0.0/0" or "::/0".
5c8c26437a550e1fb6560c42
An EC2 instance's Remote Desktop port (3389) is accessible from the public Internet for any source address
The provided AWS credential must have access to ec2:DescribeInstances
, ec2:RevokeSecurityGroupIngress
, ec2:DescribeSecurityGroupRules
.
You may find the latest example policy file here
You may run this script using following commands:
pip install -r ../../requirements.txt
python3 ec2_close_port_3389.py
You may run test using following command under vss-remediation-worker-job-code-python directory:
python3 -m pytest
The VMware Aria Automation for Secure Clouds team welcomes welcomes contributions from the community. If you wish to contribute code and you have not signed our contributor license agreement (CLA), our bot will update the issue when you open a Pull Request. For any questions about the CLA process, please refer to our FAQ. All contributions to this repository must be signed as described on that page. Your signature certifies that you wrote the patch or have the right to pass it on as an open-source patch.
For more detailed information, refer to CONTRIBUTING.md.
We use SemVer for versioning. For the versions available, see the tags on this repository.
- VMware VMware Aria Automation for Secure Clouds - Initial work
See also the list of contributors who participated in this project.
This project is licensed under the Apache License - see the LICENSE file for details