<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Security-Group — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/security-group/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/security-group/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS Network ACL Created with All Ports Open</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-nacls-all-open/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-nacls-all-open/</guid><description>The analytic detects the creation or replacement of AWS Network Access Control Lists (ACLs) with rules that allow all traffic from a specified CIDR block, potentially exposing the network to unauthorized access and increasing the risk of data breaches.</description><content:encoded><![CDATA[<p>This detection focuses on identifying misconfigured AWS Network ACLs (NACLs) that permit unrestricted traffic. AWS NACLs act as a firewall for controlling traffic in and out of subnets within a Virtual Private Cloud (VPC). When an NACL is configured to allow all ports and protocols from any IP address (0.0.0.0/0), it effectively bypasses security controls and exposes resources to potential threats. The activity is detected by monitoring AWS CloudTrail events for <code>CreateNetworkAclEntry</code> or <code>ReplaceNetworkAclEntry</code> API calls. This configuration error can be introduced by administrators during initial setup or through misconfiguration during updates. Defenders should ensure that NACLs follow the principle of least privilege to limit the attack surface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a target AWS environment.</li>
<li>The attacker scans for publicly accessible services or resources.</li>
<li>An administrator, either maliciously or accidentally, creates or modifies a Network ACL using the AWS Management Console, CLI, or API with overly permissive rules (allowing all traffic: <code>ruleAction=allow AND egress=false AND aclProtocol=-1 AND cidrBlock=0.0.0.0/0</code>).</li>
<li>The misconfigured NACL is applied to one or more subnets within the VPC.</li>
<li>The attacker exploits the open ports and protocols to gain unauthorized access.</li>
<li>The attacker attempts to move laterally within the AWS environment.</li>
<li>The attacker exfiltrates sensitive data or disrupts services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A misconfigured Network ACL that allows all traffic can have severe consequences. It can lead to unauthorized access to sensitive data, potential data breaches, service disruption, and further compromise of the AWS environment. The impact is particularly high if critical resources are located within the affected subnets. This type of misconfiguration violates security best practices and compliance requirements.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>AWS Network ACL Created with All Ports Open</code> to your SIEM to detect this specific misconfiguration (logsource: <code>ASL AWS CloudTrail</code>, category: <code>network_connection</code>).</li>
<li>Review existing Network ACL configurations to identify and remediate any overly permissive rules (check AWS console or use AWS CLI/API).</li>
<li>Implement automated checks to validate Network ACL configurations against security best practices.</li>
<li>Ensure that NACLs follow the principle of least privilege by only allowing necessary traffic (review NACL <code>ruleAction</code>, <code>egress</code>, <code>aclProtocol</code>, and <code>cidrBlock</code> settings in CloudTrail logs).</li>
<li>Investigate any identified instances of overly permissive NACL configurations to determine the root cause and potential impact (analyze CloudTrail logs for <code>CreateNetworkAclEntry</code> or <code>ReplaceNetworkAclEntry</code> events).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>network-acl</category><category>misconfiguration</category><category>cloud</category><category>security-group</category></item></channel></rss>