1 Answer
- Newest
- Most votes
- Most comments
2
First of all, you must remove the access key and secret key from here immediately as you see and terminate the instance and disable this access and secret key. These keys have now been exposed and your AWS account/resources are at risk. Make sure you have blocked access to all resources and see if there is no unusual activity.
Follow this guide at earliest What to do, if I exposed long lived credentials accidentally
Check your subnet's route table and make sure it has a route to the Internet Gateway? Can you check if your subnet NACLs are fully allowing ephemeral ports?
Your subnet route table should have an entry like below:
"Destination" 0.0.0.0/0 "Target" igw-XXXXXXXXXX
Relevant content
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 12 days ago
- AWS OFFICIALUpdated 9 months ago
- AWS OFFICIALUpdated 10 months ago
Follow this guide at earliest What to do, if I exposed long lived credentials accidentally
Yes, the subnet route table shows these two routes:
"Destination" 0.0.0.0/0 "Target" igw-XXXXXXXXXX "Status" Active "Propagated" No
"Destination" 172.XX.X.X/16 "Target" local "Status" Active "Propagated" No
I had initially inserted XXXX at the end of the Access Key and Secret Key, but changed it to all X's on your advice. Thanks.