Checks/Aws/Test-Ec2SecuritygroupAllowWideOpenPublicIpv4.ps1
|
function Test-Ec2SecuritygroupAllowWideOpenPublicIpv4 { <# .SYNOPSIS Security group has no ingress or egress rules with public IPv4 CIDR ranges from /1 to /23 .DESCRIPTION **EC2 security groups** with rules that permit non-RFC1918 IPv4 ranges wider than `/24` are identified across both **ingress** and **egress**. The focus is on public CIDRs (`/1`-`/23`) that broadly expose sources or destinations, not on private networks. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: ec2_securitygroup_allow_wide_open_public_ipv4 [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check ec2_securitygroup_allow_wide_open_public_ipv4 for reference.', 'N/A', 'ec2 Resources') } |