Remove entries in Security Groups which allow CIFS (TCP 445) on public IP.

24 Times Used
22 MAY 2019

It is AWS best practice to remove entries in security group which allows CIFS access from public IP to reduce possibility of breach. Allowing unrestricted CIFS access can increase threats such as man-in-the-middle attacks (MITM), Denial of Service (DoS) attacks or the Windows Null Session Exploit.

Workflow Template

Gets Security Groups in a specific AWS Region for EC2 service.
Provide your details to emulate workflow
Fulfils organizational obligation(if any) before taking any action on an AWS resource.
Provide your details to emulate workflow

Trigger

Use this to initiate a workflow based on time, events or HTTP calls.

Resource

Select resources on which you want to work on.

Filter

Enter parameters to filter resources in the workflow.

User Approval

Use this to get approval from stakeholder to continue the workflow.

Action

Select action to be done on resources in the workflow.

Filters the Security Groups which allow CIFS (TCP 445) on public IP.
Provide your details to emulate workflow
Revoke Security Group Ingress in a specific AWS Region for EC2 service.
Provide your details to emulate workflow
Use Template