CloudWiki
Rules
Medium

Ensure SQS is not publicly accessible

Security & Compliance
Description

Amazon Simple Queue Service (SQS) is a message queuing service that enables decoupling of distributed systems by allowing applications to asynchronously send, store, and receive messages. By default, Amazon SQS is not publicly accessible, but if it is publicly accessible, it can pose a security risk to the organization. If SQS is publicly accessible, unauthorized users can access the queues, send or receive messages, and modify the messages. This can result in the theft of sensitive data, service disruption, and other security issues. By ensuring that SQS is not publicly accessible, organizations can help protect their data and prevent unauthorized access to their systems.‍

Remediation

If an organization identifies that their Amazon SQS is publicly accessible, they should take immediate remediation steps to prevent unauthorized access and protect their data and infrastructure. Here are some recommended steps to take:

  1. Restrict Access: Modify the IAM policies associated with the SQS queues to ensure that only authorized users and systems can access them. Use IAM policies to specify which users, groups, or roles can access the queues.
  2. Enable VPC Endpoints: Configure the Amazon VPC endpoints to provide secure and private connectivity between the VPC and SQS. Use VPC endpoints to ensure that the SQS queues are not exposed to the public internet.
  3. Use Encryption: Configure Amazon SNS/SQS encryption to protect sensitive data in transit and at rest. Use Amazon Key Management Service (KMS) to manage encryption keys.
  4. Use CloudTrail: Enable AWS CloudTrail to log all SQS API calls and capture the details of who made the call, from where, and when.
  5. Monitor Access: Regularly monitor access logs and other system logs for any suspicious activity. Use CloudWatch to set up alerts when there is a change to the security configuration or an unauthorized access attempt.

By taking these remediation steps, organizations can help ensure that their Amazon SQS is not publicly accessible, reduce the risk of unauthorized access and data breaches, and help ensure the overall security of their AWS infrastructure.

Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.