The Log4shell (log4j) vulnerability (CVE-2021-44228) emphasized more than ever the importance of setting network controls & policies not only on inbound traffic but also on outbound traffic.
In this blog we will go through:
- What are the requirements for log4j exploitability?
- What are the possible ways to expose different AWS resources to the internet via outbound access?.
- How to find resources unrestricted outbound with CloudQuery open-source cloud asset inventory. This will help both to prioritize updates in the current situation as well as help apply network best practices in general.