πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [DMS.1] Database Migration Service replication instances should not be public | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EC2.1] Amazon EBS snapshots should not be publicly restorable | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EC2.2] VPC default security groups should not allow inbound or outbound traffic | | | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EMR.1] Amazon EMR cluster primary nodes should not have public IP addresses | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ES.2] Elasticsearch domains should not be publicly accessible | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Lambda.1] Lambda function policies should prohibit public access | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Opensearch.1] OpenSearch domains should have encryption at rest enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Opensearch.2] OpenSearch domains should not be publicly accessible | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.1] RDS snapshot should be private | | 1 | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.2] RDS DB Instances should prohibit public access, as determined by the PubliclyAccessible configuration | | 1 | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Redshift.1] Amazon Redshift clusters should prohibit public access | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [S3.1] S3 general purpose buckets should have block public access settings enabled | | | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [S3.3] S3 general purpose buckets should block public write access | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [SageMaker.1] Amazon SageMaker AI notebook instances should not have direct internet access | | | | |