Checks/Aws/Test-Ec2NetworkaclAllowIngressTcpPort3389.ps1
|
function Test-Ec2NetworkaclAllowIngressTcpPort3389 { <# .SYNOPSIS Network ACL does not allow ingress from the Internet to TCP port 3389 (RDP) .DESCRIPTION **VPC network ACLs** with inbound rules allowing **RDP** on `TCP 3389` from `0.0.0.0/0` are identified. Assessment focuses on subnet-level ACL entries that permit this traffic. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: ec2_networkacl_allow_ingress_tcp_port_3389 [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check ec2_networkacl_allow_ingress_tcp_port_3389 for reference.', 'N/A', 'ec2 Resources') } |