Cloudanix home page
Search...
⌘K
Ask AI
Community
Login
Login
Search...
Navigation
AWS Misconfigurations
Security Groups Audit
Overview
AWS
Azure
GCP
GitHub
On-Demand Scan
Kubernetes
Integrations
AWS Introduction
Security of your AWS Account
AWS Pricing
AWS Services which determine your cost
AWS Threats
Getting Started with AWS Realtime Events
AWS Misconfigurations
Getting Started with AWS Audit
Permissions required for Misconfigurations Detection
API Gateway Audit
Cloudformation Audit
CloudFront Audit
CloudTrail Audit
Cloudwatch Audit
DynamoDB Audit
EC2 Audit
Elastic Search Audit
ELB Audit
IAM Audit
KMS Audit
Kubernetes Audit
Lambda Audit
RDS Audit
Redshift Audit
Route53 Audit
S3 Audit
Security Groups Audit
SES Audit
SNS Audit
IAM Deep Dive
App Sync Audit
Code Build Audit
Open Search Audit
Shield Audit
SQS Audit
On this page
Checks performed
AWS Misconfigurations
Security Groups Audit
Checks performed
Default Security Group Should Not Be Publicly Accessible
Default Security Groups Should Block All Traffic
Excessive Number of Security Groups Should Not Be Present
Ports Should Not Be Open for Internal Traffic
Ports Should Not Be Open for External Traffic
EC2 Instance Should Not Have Open ICMP ports
EC2 instances Should Not Be Publicly Accessible
MQ Active Has Deployment Mode
MQ Has Automatic Minor Version Upgrades
MQ Broker Instance Should Not Be Public
MQ Brokers Has Cloudwatch Audit Logging
MQ Broker Should Not Be Publicly Accessible
MQ Rabbit Has Deployment Mode
Unused Network ACLs Should Be Removed
RDS Instances Should Not Be Publicly Accessible
Redshift Should Not Be Publicly Accessible
Unused Security Groups Should Be Removed
Flow Logs Should be Enabled on Subnet
Flow Logs on VPC Should Be Enabled
Unused Virtual Private Gateways Should Be Removed
S3 Audit
SES Audit
Assistant
Responses are generated using AI and may contain mistakes.