AWS Misconfigurations
Security Groups Audit
Checks performed
- Default Security Group Should Not Be Publicly Accessible
- Default Security Groups Should Block All Traffic
- Excessive Number of Security Groups Should Not Be Present
- Ports Should Not Be Open for Internal Traffic
- Ports Should Not Be Open for External Traffic
- EC2 Instance Should Not Have Open ICMP ports
- EC2 instances Should Not Be Publicly Accessible
- MQ Active Has Deployment Mode
- MQ Has Automatic Minor Version Upgrades
- MQ Broker Instance Should Not Be Public
- MQ Brokers Has Cloudwatch Audit Logging
- MQ Broker Should Not Be Publicly Accessible
- MQ Rabbit Has Deployment Mode
- Unused Network ACLs Should Be Removed
- RDS Instances Should Not Be Publicly Accessible
- Redshift Should Not Be Publicly Accessible
- Unused Security Groups Should Be Removed
- Flow Logs Should be Enabled on Subnet
- Flow Logs on VPC Should Be Enabled
- Unused Virtual Private Gateways Should Be Removed