Low

Cross peering connectivity is allowed by ECS Task

Security & Compliance
Description

When cross peering connectivity is allowed by ECS Task, it means that the task can communicate with resources in different VPCs or accounts via VPC peering, which can lead to security risks such as data exfiltration or unauthorized access.

Remediation

To remediate the issue of cross peering connectivity being allowed by ECS tasks, follow these steps:

  1. Open the Amazon ECS console.
  2. Select the cluster where the ECS task is running.
  3. Click on the task definition that is allowing cross peering connectivity.
  4. Under the "Network Mode" section, select "awsvpc" mode.
  5. Scroll down to the "Container Definitions" section and select the container that is allowing cross peering connectivity.
  6. Under the "Port mappings" section, specify the ports that the container should listen on and the protocol to be used (TCP or UDP).
  7. Under the "Networking" section, specify the VPC and subnets where the container should be deployed.
  8. Click on "Update" to apply the changes.

By following the above steps, the ECS task will be deployed in the "awsvpc" mode which enforces the task to run in a private network. This will help prevent cross peering connectivity and ensure that the task communicates only with the intended resources.

Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.

Step into the Future of SecOps