Why ECS services should not have public IP addresses assigned to them automatically?

0

SecurityHub generates following warning: "ECS.2 ECS services should not have public IP addresses assigned to them automatically".

But why? Our deamon that run on ECS must have access to internet and without public IP address and AssignPublicIp='ENABLED'. it is not possible access Internet. Am I right?

3回答
0

Ok, but what about ECS task like REST API server that should be visible to Internet? For such tasks I also got "you should not have public IP addresses" warning. In my opinion there we have to suppress "ECS.2 ECS services should not have public IP addresses assigned to them automatically" warning.

回答済み 1年前
  • In that case I think you should then front the api with an ALB or an public api gateway (protected with WAF, inspection of its the case, shield), which then is linked with a private backend in private subnet

0

Hi,

this is due to security reasons as a public IP is exploitable by anyone on the internet.

To mitigate this can follow "Use private subnet with Internet Access" section on this article: https://repost.aws/knowledge-center/ecs-fargate-tasks-private-subnet.

It is a pretty standard practice to place workloads on private subnets, and then use NAT Gateway to allow outbound internet.

Hope it clarifies ;)

profile picture
エキスパート
回答済み 1年前
0

ECS tasks can reside in private subnets that have a route to the internet via a NAT Gateway. This would allow outbound internet traffic without a direct inbound path. This would be the best practices method to reduce security risks associated with tasks having direct public IP addresses.

Here is a link that discussed VPCs with private subnets and NAT Gateway https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html

Hope that helps.

AWS
Ryan_S
回答済み 1年前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ