agent: |
Security Compliance Evaluation of Amazon VPC Default Security Groups
The workflow involves assessing all default security groups within each Amazon VPC to ensure they do not permit any inbound or outbound traffic. If any default security group is found to have one or more inbound or outbound rules, it is marked as NON_COMPLIANT. The results of this evaluation are then organized into a tabulated format for easy review and analysis. This process helps maintain the security integrity of the network by ensuring that default security groups adhere to strict traffic control policies.
- 1uhtOq9R9lMgiCbUpoQRAEvaluate all default security groups in every Amazon VPC and verify that they do not allow any inbound or outbound traffic; return NON_COMPLIANT if any default security group has one or more inbound or outbound rules. Tabulate the results.
1
There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.Evaluates default security groups in all VPCs across all regions for compliance and tabulates the results.
inputsoutputs1- 1.1p9Dzht4LoQjZs5SAhLaGList all VPCs in the AWS account.
1.1
List all VPCs in the AWS account.
There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.Lists all VPCs in the AWS account across all regions.
inputsoutputsimport boto3 import json # Retrieve AWS credentials from environment variables aws_access_key_id = getEnvVar('AWS_ACCESS_KEY_ID') aws_secret_access_key = getEnvVar('AWS_SECRET_ACCESS_KEY') # Initialize a session using Amazon EC2 session = boto3.Session( aws_access_key_id=aws_access_key_id, aws_secret_access_key=aws_secret_access_key, region_name='us-east-2' ) ec2_client = session.client('ec2') # Retrieve all regions regions = [region['RegionName'] for region in ec2_client.describe_regions()['Regions']] # List to store all VPCs vpcs = [] # Iterate over each region for region in regions: ec2_client = session.client('ec2', region_name=region) # Describe all VPCs vpcs_in_region = ec2_client.describe_vpcs()['Vpcs'] vpcs.extend(vpcs_in_region) # Print all VPCs print(json.dumps(vpcs, indent=4, default=str))copied1.1 - 1.2qYk9cupRDMmHW4xlrVqhFor each VPC, list all default security groups.
1.2
For each VPC, list all default security groups.
There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.Lists all default security groups for each VPC across all regions.
inputsoutputsimport boto3 import json # Retrieve AWS credentials from environment variables aws_access_key_id = getEnvVar('AWS_ACCESS_KEY_ID') aws_secret_access_key = getEnvVar('AWS_SECRET_ACCESS_KEY') # Initialize a session using Amazon EC2 session = boto3.Session( aws_access_key_id=aws_access_key_id, aws_secret_access_key=aws_secret_access_key, region_name='us-east-2' ) ec2_client = session.client('ec2') # Retrieve all regions regions = [region['RegionName'] for region in ec2_client.describe_regions()['Regions']] # List to store all default security groups default_security_groups = [] # Iterate over each region for region in regions: ec2_client = session.client('ec2', region_name=region) # Describe all VPCs vpcs = ec2_client.describe_vpcs()['Vpcs'] # Iterate over each VPC for vpc in vpcs: # Describe security groups for the VPC security_groups = ec2_client.describe_security_groups(Filters=[{'Name': 'vpc-id', 'Values': [vpc['VpcId']]}])['SecurityGroups'] # Filter default security groups for sg in security_groups: if sg['GroupName'] == 'default': default_security_groups.append(sg) # Print all default security groups print(json.dumps(default_security_groups, indent=4, default=str))copied1.2 - 1.3q3PLAaLey1Ft3YFfwTmTEvaluate each default security group to verify that they do not allow any inbound or outbound traffic.
1.3
There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.Evaluates each default security group to verify that they do not allow any inbound or outbound traffic and tabulates the compliance results.
inputsoutputsimport boto3 import json # Retrieve AWS credentials from environment variables aws_access_key_id = getEnvVar('AWS_ACCESS_KEY_ID') aws_secret_access_key = getEnvVar('AWS_SECRET_ACCESS_KEY') # Initialize a session using Amazon EC2 session = boto3.Session( aws_access_key_id=aws_access_key_id, aws_secret_access_key=aws_secret_access_key, region_name='us-east-2' ) ec2_client = session.client('ec2') # Retrieve all regions regions = [region['RegionName'] for region in ec2_client.describe_regions()['Regions']] # List to store compliance results compliance_results = [] # Iterate over each region for region in regions: ec2_client = session.client('ec2', region_name=region) # Describe all VPCs vpcs = ec2_client.describe_vpcs()['Vpcs'] # Iterate over each VPC for vpc in vpcs: # Describe security groups for the VPC security_groups = ec2_client.describe_security_groups(Filters=[{'Name': 'vpc-id', 'Values': [vpc['VpcId']]}])['SecurityGroups'] # Filter default security groups for sg in security_groups: if sg['GroupName'] == 'default': # Check if there are any inbound or outbound rules if sg['IpPermissions'] or sg['IpPermissionsEgress']: compliance_results.append({ 'VpcId': vpc['VpcId'], 'SecurityGroupId': sg['GroupId'], 'Compliance': 'NON_COMPLIANT' }) else: compliance_results.append({ 'VpcId': vpc['VpcId'], 'SecurityGroupId': sg['GroupId'], 'Compliance': 'COMPLIANT' }) # Print compliance results print(json.dumps(compliance_results, indent=4, default=str))copied1.3