AWS Security Hub - Detect EC2 Security groups allowing unrestricted high-risk ports

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query detects EC2 Security Groups that allow unrestricted (0.0.0.0/0 or ::/0) ingress to high-risk ports using AWS Security Hub control EC2.19 findings. Publicly exposed management, database, and service ports (e.g., RDP 3389, SSH 22, SQL 1433/3306) significantly increase the risk of brute-force attacks, exploitation, and lateral movement.

Attribute Value
Type Analytic Rule
Solution AWS Security Hub
ID d2b6fa0f-6a4c-4c48-8c64-5e2e1ac4e7b9
Severity High
Status Available
Kind Scheduled
Tactics InitialAccess, LateralMovement, Discovery
Techniques T1133, T1021, T1046
Required Connectors AWSSecurityHub
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
AWSSecurityHubFindings ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to AWS Security Hub