Cloudanix home page
Search...
⌘K
Ask AI
Community
Login
Login
Search...
Navigation
AWS Misconfigurations
DynamoDB Audit
Overview
AWS
Azure
GCP
GitHub
On-Demand Scan
Kubernetes
Integrations
AWS Introduction
Security of your AWS Account
AWS Pricing
AWS Services which determine your cost
AWS Threats
Getting Started with AWS Realtime Events
AWS Misconfigurations
Getting Started with AWS Audit
Permissions required for Misconfigurations Detection
API Gateway Audit
Cloudformation Audit
CloudFront Audit
CloudTrail Audit
Cloudwatch Audit
DynamoDB Audit
EC2 Audit
Elastic Search Audit
ELB Audit
IAM Audit
KMS Audit
Kubernetes Audit
Lambda Audit
RDS Audit
Redshift Audit
Route53 Audit
S3 Audit
Security Groups Audit
SES Audit
SNS Audit
IAM Deep Dive
App Sync Audit
Code Build Audit
Open Search Audit
Shield Audit
SQS Audit
On this page
Checks Performed
AWS Misconfigurations
DynamoDB Audit
Checks Performed
DynamoDB Accelerator (DAX) Cluster Should Be Encrypted
AWS DynamoDB Tables Should Use KMS CMKs for Encryption
DynamoDB Tables Should Have Autoscaling Enabled
DynomDB Tables Should Have Continuous Backup Enabled
AWS Account Should Not Have Any Unused DynamoDB Tables
VPC Endpoint Should Be Enabled For DynamoDB
Firehose Delivery Stream Destination Encryption
Enable Firehose Delivery Stream Server-Side Encryption
Kinesis Server Side Encryption
Kinesis Stream Encrypted With CMK
Kinesis Stream Shard Level Metrics
Sagemaker Endpoint Should Have KMS Key Configured
Notebook Data Encrypted With KMS Customer Master Keys
Notebook Data Encrypted
Notebook Direct Internet Access
Sagemaker Notebook Instance Should Have KMS Key Configured
Sagemaker Notebook Instance Should Not Have Root Access Enabled
Amazon SageMaker Notebook Instance In VPC
Cloudwatch Audit
EC2 Audit
Assistant
Responses are generated using AI and may contain mistakes.