Checks/Aws/Test-Ec2InstancePortKerberosExposedToInternet.ps1
|
function Test-Ec2InstancePortKerberosExposedToInternet { <# .SYNOPSIS EC2 instance does not allow ingress from the Internet to TCP ports 88, 464, 749, or 750 (Kerberos) .DESCRIPTION **EC2 instances** whose security groups allow public **inbound TCP** access to Kerberos ports `88`, `464`, `749`, or `750` (authentication, password change, admin). Rules permitting `0.0.0.0/0` or `::/0` are treated as Internet-exposed. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: ec2_instance_port_kerberos_exposed_to_internet [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check ec2_instance_port_kerberos_exposed_to_internet for reference.', 'N/A', 'ec2 Resources') } |