Search result for 'VPC'
- Most recent
- Most popular
- Most linked
- Most download
- Favorited
List all Amazon VPCs.The script lists all VPCs in the us-east-2 region using boto3 with credentials. |
|
Check each VPC in the list to verify if VPC Flow Logs are enabled.The script checks each VPC in the list to verify if VPC Flow Logs are enabled and returns their compliance status. |
|
Determine compliance status for each VPC based on whether Flow Logs are enabled. Mark as NON_COMPLIANT if Flow Logs are not enabled.The script determines the overall compliance status for each VPC based on whether Flow Logs are enabled and marks as NON_COMPLIANT if any VPC does not have Flow Logs enabled. |
|
Tabulate the compliance results for all VPCs.The script tabulates the compliance results for all VPCs based on their Flow Logs status. |
|
Evaluate all Amazon VPCs and verify that VPC Flow Logs are enabled; return NON_COMPLIANT if at least one VPC does not have Flow Logs enabled. Tabulate these results.The script evaluates all VPCs in the us-east-2 region to check if VPC Flow Logs are enabled and tabulates the compliance status. |
|
|
For each VPC, list all default security groups.Lists all default security groups for each VPC across all regions. |
|
Evaluate each default security group to verify that they do not allow any inbound or outbound traffic.Evaluates each default security group to verify that they do not allow any inbound or outbound traffic and tabulates the compliance results. |
|
Evaluate all default security groups in every Amazon VPC and verify that they do not allow any inbound or outbound traffic; return NON_COMPLIANT if any default security group has one or more inbound or outbound rules. Tabulate the results.Evaluates default security groups in all VPCs across all regions for compliance and tabulates the results. |
|
List and Identify AWS security groups where incoming SSH traffic (port 22) is open to 0.0.0.0/0 or ::/0 and flag them as NON_COMPLIANT, while marking others as COMPLIANT.The script lists AWS security groups and checks if SSH access is open to the world, marking them as NON_COMPLIANT or COMPLIANT. |
|
Compliance Check for VPC Flow Logs in AWS RegionThe workflow involves evaluating all Amazon VPCs within the AWS region us-east-2 to ensure that VPC Flow Logs are enabled. Each VPC is checked for compliance, and if any VPC lacks Flow Logs, it is marked as NON_COMPLIANT. The results of this compliance check are then tabulated for further analysis. This process helps in maintaining security and monitoring standards across the network infrastru... |
|
Security Compliance Evaluation of Amazon VPC Default Security GroupsThe workflow involves assessing all default security groups within each Amazon VPC to ensure they do not permit any inbound or outbound traffic. If any default security group is found to have one or more inbound or outbound rules, it is marked as NON_COMPLIANT. The results of this evaluation are then organized into a tabulated format for easy review and analysis. This process helps maintain th... |
|
Audit and Compliance Check for AWS Security Groups with Open SSH PortsThe workflow involves identifying AWS security groups that have incoming SSH traffic (port 22) open to the public, specifically to IP addresses 0.0.0.0/0 or ::/0. These security groups are flagged as NON_COMPLIANT due to the potential security risk of unrestricted access. Conversely, security groups that do not have such open access are marked as COMPLIANT. This process ensures that security g... |
|
Audit of AWS Security Groups for Compliance with Inbound Traffic RestrictionsThe workflow involves analyzing AWS security groups across different regions to identify those that are non-compliant with security policies. Specifically, it focuses on security groups that allow inbound TCP traffic from unrestricted sources, such as 0.0.0.0/0 or ::/0. The process includes listing these non-compliant security groups along with the open ports and CIDR ranges that pose a securi... |
|
Give me the number of AWS security groups by region and identify non-compliant groups where inbound TCP traffic is allowed from unrestricted sources (0.0.0.0/0 or ::/0), listing non-compliant security groups, open ports, and CIDR ranges.This script lists the number of AWS security groups by region and identifies non-compliant groups allowing unrestricted inbound TCP traffic. |
|
Tabulate non-compliant security groups based on their regions and complianceThis script tabulates non-compliant security groups by region, listing their details. |
|
Detecting and Marking Non-Compliant VPC Security Groups: SOC2 ComplianceThis task focuses on scrutinizing default security groups in AWS VPCs to identify and flag those allowing unauthorized traffic. It serves as a critical measure to pinpoint security groups that deviate from the no-traffic policy, ensuring adherence to stringent network security protocols in VPC environments. |
|
Implementing No-Traffic Policy in VPC Default Security GroupsThis task involves configuring the default security groups within AWS VPCs to strictly enforce a no-traffic policy. It entails systematically updating the security group rules to block all inbound and outbound traffic, ensuring compliance with stringent network security protocols. |
|
List All VPCs in AWSThis task enumerates all Virtual Private Clouds across every AWS region in an account. This task is essential for network management, security audits, and resource tracking, especially in large-scale environments. It provides details like VPC IDs, CIDR blocks, and associated resources for each VPC. |
|
Default Security Group Audit and Remediation in AWS VPCs: SOC2 ComplianceThis runbook conducts a thorough audit of default security groups in all AWS VPCs, ensuring they disallow any inbound or outbound traffic. It identifies and automatically remediates non-compliant groups to enforce stringent network security standards. The process enhances overall VPC security by adhering to a strict no-traffic policy in default security groups. |
|