Supported Cortex XSOAR versions: 6.5.0 and later.
This playbook takes in some information about an EC2 instance (ID and public_ip) and with provided port and protocol, determines what security groups on the primary interface of an EC2 instance are over-permissive. It uses an automation to determine what interface on an EC2 instance has an over-permissive security group on, determine which security groups have over-permissive rules and to replace them with a copy of the security group that has only the over-permissive portion removed. Over-permissive is defined as sensitive ports (SSH, RDP, etc) being exposed to the internet via IPv4.
This playbook uses the following sub-playbooks, integrations, and scripts.
This playbook does not use any sub-playbooks.
This playbook does not use any integrations.
This playbook does not use any commands.
|InstanceID||ID of the AWS EC2 instance.||Required|
|Port||TCP/UDP port to be restricted.||alert.remoteport||Required|
|Protocol||Protocol of the port to be restricted.||Required|
|PublicIP||Public IP address of the EC2 instance.||alert.remoteip||Optional|
|AWSAssumeArn||Name of an AWS role to assume (should be the same for all organizations).||Optional|
There are no outputs for this playbook.