DEV Community

Cover image for AWS - Access and Enforce Data Compliance Using AWS Config
Vignesh C
Vignesh C

Posted on • Edited on

AWS - Access and Enforce Data Compliance Using AWS Config

Your company’s Chief Information Security Officer (CISO) has called on you to investigate an AWS account. Router logs are showing large amounts of secure shell (SSH) traffic coming in from an unauthorized location. The CISO suspects that servers on the network are being used for crypto currency mining by someone from outside the company. They ask you to remediate any security groups that are allowing unauthorized SSH traffic and turn on detailed monitoring for each instance.

  • Set up AWS Config
  • Remediate the Noncompliant Security Group
  • Remediate the Noncompliant EC2 Instances

Details here:

GitHub logo IamVigneshC / AmazonWebServices

Amazon Web Services is a subsidiary of Amazon providing on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis. Build, Deploy, and Manage Websites, Apps or Processes On AWS' Secure, Reliable Network.







PS: Sorry, couldn't repost here since there are some incompatible MD codes. Thank you!

Top comments (0)

Billboard image

The Next Generation Developer Platform

Coherence is the first Platform-as-a-Service you can control. Unlike "black-box" platforms that are opinionated about the infra you can deploy, Coherence is powered by CNC, the open-source IaC framework, which offers limitless customization.

Learn more

👋 Kindness is contagious

Please leave a ❤️ or a friendly comment on this post if you found it helpful!

Okay