Checks/Aws/Test-Ec2SecuritygroupWithManyIngressEgressRules.ps1
|
function Test-Ec2SecuritygroupWithManyIngressEgressRules { <# .SYNOPSIS Security group has 50 or fewer inbound rules and 50 or fewer outbound rules .DESCRIPTION **EC2 security groups** are evaluated for excessive rule counts, flagging groups where `ingress` or `egress` entries exceed the configured threshold (default `50`). This targets groups with unusually large rule sets that complicate access control. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: ec2_securitygroup_with_many_ingress_egress_rules [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check ec2_securitygroup_with_many_ingress_egress_rules for reference.', 'N/A', 'ec2 Resources') } |