- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-03-2020 08:53 AM - edited 03-03-2020 01:35 PM
Given the Prisma Cloud SaaS, I am trying to create my 1st custom policy to detect and remediate overly permissive SecurityGroupIngress rules in AWS cloud.
My RQL below is valid and returns a half-dozen or so results...
event where cloud.type = 'aws' AND cloud.account.group = 'Test' AND operation IN ('AuthorizeSecurityGroupIngress') AND json.rule = ( $.requestParameters.ipPermissions.items[*].ipRanges.items[*].cidrIp contains '0.0.0.0/0' OR $.requestParameters.ipPermissions.items[*].ipv6Ranges.items[*].cidrIpv6 contains '::/0' )
My AWS CLI remediation command looks like this...
aws ec2 revoke-security-group-ingress --group-id ${resourceId} --region ${region} --ip-permissions '[{"IpProtocol":"${protocol}", "FromPort":${fromPort}, "ToPort":${toPort}, "Ip${ipV4/6}Ranges":[{"CidrIp${ipV4/6}":"${cidr}"}]}]'
When I push the "Validate Syntax" button, the system renders a dialog box, "Unsupported Cloud Type For Remediation".
This policy closely resembles the Prisma Cloud Default Policy, AWS Security groups allows internet traffic
What am I doing wrong?
05-18-2020 01:22 PM
Customers are not allowed to use the parameters that the "out-of-the-box" remediation uses.
05-18-2020 01:22 PM
Customers are not allowed to use the parameters that the "out-of-the-box" remediation uses.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!