Conversation
Terraform Compliance ReportEC2
EC2 AMI copy should be encrypted with KMS CMKThis control checks whether EC2 AMI copy is encrypted with KMS CMK.
EC2 AMI copy should be encryptedThis control checks whether EC2 AMI copy has encryption enabled.
EC2 AMI should be encryptedThis control checks whether EC2 AMI has encryption enabled.
EC2 AMI image builder components should be encrypted with KMS CMKThis control checks whether EC2 AMI image builder components are encrypted with KMS CMK.
EC2 AMI image builder distribution configurations should be encrypted with KMS CMKThis control checks whether EC2 AMI image builder distribution configurations are encrypted with KMS CMK.
EC2 AMI image builder image recipes should be encrypted with KMS CMKThis control checks whether EC2 AMI image builder image recipes are encrypted with KMS CMK.
EC2 AMI launch permission should be restrictedThis control checks whether EC2 AMI launch permission is restrictive in nature.
EBS default encryption should be enabledTo help protect data at rest, ensure that encryption is enabled for your Amazon Elastic Block Store (Amazon EBS) volumes.
EC2 instance detailed monitoring should be enabledEnable this rule to help improve Amazon Elastic Compute Cloud (Amazon EC2) instance monitoring on the Amazon EC2 console, which displays monitoring graphs with a one minute period for the instance.
EC2 instance EBS encryption should be enabledThis control checks whether EC2 instances have EBS encryption enabled.
EC2 instance should have EBS optimization enabledAn optimized instance in Amazon Elastic Block Store (Amazon EBS) provides additional, dedicated capacity for Amazon EBS I/O operations.
EC2 instances should not have a public IP addressManage access to the AWS Cloud by ensuring Amazon Elastic Compute Cloud (Amazon EC2) instances cannot be publicly accessed.
Ensure EC2 instances do not use default VPCOne of the best practices when using EC2s in AWS is not to deploy any resources to the default VPC.
EC2 instances should not use multiple ENIsThis control checks whether an EC2 instance uses multiple Elastic Network Interfaces (ENIs) or Elastic Fabric Adapters (EFAs). This control passes if a single network adapter is used. The control includes an optional parameter list to identify the allowed ENIs.
EC2 instances termination protection should be enabledTo prevent your instance from being accidentally terminated using Amazon EC2, you can enable termination protection for the instance.
EC2 instances should not contain secrets in user dataTo help protect sensitive information, ensure that Amazon Elastic Compute Cloud (Amazon EC2) instances do not contain secrets in user data.
EC2 instances should use IMDSv2Ensure the Instance Metadata Service Version 2 (IMDSv2) method is enabled to help protect access and control of Amazon Elastic Compute Cloud (Amazon EC2) instance metadata.
EC2 launch configuration EBS encryption should be enabledThis control checks whether EC2 launch configurations have EBS encryption enabled.
EC2 launch configuration should not have a metadata response hop limit greater than 1This control checks whether EC2 launch configurations have a metadata response hop limit less than 1.
EC2 launch template should not have a metadata response hop limit greater than 1This control checks whether EC2 launch templates have a metadata response hop limit less than 1.
|
Terraform Compliance ReportEC2
EC2 AMI copy should be encrypted with KMS CMKThis control checks whether EC2 AMI copy is encrypted with KMS CMK.
EC2 AMI copy should be encryptedThis control checks whether EC2 AMI copy has encryption enabled.
EC2 AMI should be encryptedThis control checks whether EC2 AMI has encryption enabled.
EC2 AMI image builder components should be encrypted with KMS CMKThis control checks whether EC2 AMI image builder components are encrypted with KMS CMK.
EC2 AMI image builder distribution configurations should be encrypted with KMS CMKThis control checks whether EC2 AMI image builder distribution configurations are encrypted with KMS CMK.
EC2 AMI image builder image recipes should be encrypted with KMS CMKThis control checks whether EC2 AMI image builder image recipes are encrypted with KMS CMK.
EC2 AMI launch permission should be restrictedThis control checks whether EC2 AMI launch permission is restrictive in nature.
EBS default encryption should be enabledTo help protect data at rest, ensure that encryption is enabled for your Amazon Elastic Block Store (Amazon EBS) volumes.
EC2 instance detailed monitoring should be enabledEnable this rule to help improve Amazon Elastic Compute Cloud (Amazon EC2) instance monitoring on the Amazon EC2 console, which displays monitoring graphs with a one minute period for the instance.
EC2 instance EBS encryption should be enabledThis control checks whether EC2 instances have EBS encryption enabled.
EC2 instance should have EBS optimization enabledAn optimized instance in Amazon Elastic Block Store (Amazon EBS) provides additional, dedicated capacity for Amazon EBS I/O operations.
EC2 instances should not have a public IP addressManage access to the AWS Cloud by ensuring Amazon Elastic Compute Cloud (Amazon EC2) instances cannot be publicly accessed.
Ensure EC2 instances do not use default VPCOne of the best practices when using EC2s in AWS is not to deploy any resources to the default VPC.
EC2 instances should not use multiple ENIsThis control checks whether an EC2 instance uses multiple Elastic Network Interfaces (ENIs) or Elastic Fabric Adapters (EFAs). This control passes if a single network adapter is used. The control includes an optional parameter list to identify the allowed ENIs.
EC2 instances termination protection should be enabledTo prevent your instance from being accidentally terminated using Amazon EC2, you can enable termination protection for the instance.
EC2 instances should not contain secrets in user dataTo help protect sensitive information, ensure that Amazon Elastic Compute Cloud (Amazon EC2) instances do not contain secrets in user data.
EC2 instances should use IMDSv2Ensure the Instance Metadata Service Version 2 (IMDSv2) method is enabled to help protect access and control of Amazon Elastic Compute Cloud (Amazon EC2) instance metadata.
EC2 launch configuration EBS encryption should be enabledThis control checks whether EC2 launch configurations have EBS encryption enabled.
EC2 launch configuration should not have a metadata response hop limit greater than 1This control checks whether EC2 launch configurations have a metadata response hop limit less than 1.
EC2 launch template should not have a metadata response hop limit greater than 1This control checks whether EC2 launch templates have a metadata response hop limit less than 1.
|
oioeioei