A-EC2-20

VPCs without Private Zones

Risk:
Low

VPCs should utilise a private hosted zone for each VPC to allow for contextual DNS for ease of use and standardized addressing across environments.


Details

Route 53 private hosted zones are a resource which provides private DNS services within a VPC. This service is exceptionally useful because it allows a VPC to resolve local network traffic using domain names instead of private IP addresses. A VPC already comes configured with a DNS service that AWS uses to provide contextual responses for endpoints such as VPC Gateways and RDS Endpoints. By configuring a private hosted zone, you can utilise the same service to create standardised records for your own services.

Remediation

To set up a private hosted zone, simply create a Route 53 hosted zone that is configured to attach to your VPC. It’s important to pay attention to the naming conventions for domains. Since this will be a private DNS service, you should only use a domain name intended for internal use that doesn’t carry historical issues, such as the .private TLD. However, the best approach is to utilise a subdomain of a domain owned by your organisation which will be reserved for private use, such as private.yourdomain.com. This avoids inconsistency issues with some of the private TLDs such as .local which have a number of disparate hard-coded behaviours across various software applications as well as provides a simpler distribution and management of TLS certificates that can be used to provide TLS Everywhere infrastructure.

Identify networks missing private DNS and visualize a TLS-everywhere environment for your organization by purchasing a SkySiege Cloud Assessment with included consultation today:

Discover if you're vulnerable

SkySiege Cloud Security Assessments scan for this issue and provide same-day reports..
Available for individual projects or organisations.

Related Tests