DEV Community

loading...
Cover image for AWS - Access and Enforce Data Compliance Using AWS Config

AWS - Access and Enforce Data Compliance Using AWS Config

iamvigneshc profile image Vignesh C Updated on ・1 min read

Your company’s Chief Information Security Officer (CISO) has called on you to investigate an AWS account. Router logs are showing large amounts of secure shell (SSH) traffic coming in from an unauthorized location. The CISO suspects that servers on the network are being used for crypto currency mining by someone from outside the company. They ask you to remediate any security groups that are allowing unauthorized SSH traffic and turn on detailed monitoring for each instance.

  • Set up AWS Config
  • Remediate the Noncompliant Security Group
  • Remediate the Noncompliant EC2 Instances

Details here:

GitHub logo IamVigneshC / AmazonWebServices

Amazon Web Services is a subsidiary of Amazon providing on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis. Build, Deploy, and Manage Websites, Apps or Processes On AWS' Secure, Reliable Network.

aws










PS: Sorry, couldn't repost here since there are some incompatible MD codes. Thank you!

Discussion (0)

pic
Editor guide