Performing a Basic Audit of your AWS Environment Reviews
6204 reviews
joyson f. · Reviewed מעל 8 שנים ago
Jeff H. · Reviewed מעל 8 שנים ago
Tim O. · Reviewed מעל 8 שנים ago
Hyobin A. · Reviewed מעל 8 שנים ago
Sai L. · Reviewed מעל 8 שנים ago
Stuart W. · Reviewed מעל 8 שנים ago
Randy D. · Reviewed מעל 8 שנים ago
simon t. · Reviewed מעל 8 שנים ago
R C. · Reviewed מעל 8 שנים ago
Chris R. · Reviewed מעל 8 שנים ago
John B. · Reviewed מעל 8 שנים ago
Cyrus A. · Reviewed מעל 8 שנים ago
5
Mukkante M. · Reviewed מעל 8 שנים ago
David P. · Reviewed מעל 8 שנים ago
Eugen S. · Reviewed מעל 8 שנים ago
Robin Y. · Reviewed מעל 8 שנים ago
David M. · Reviewed מעל 8 שנים ago
Andrew W. · Reviewed מעל 8 שנים ago
Timothy B. · Reviewed מעל 8 שנים ago
Landry N. · Reviewed מעל 8 שנים ago
Jeff K. · Reviewed מעל 8 שנים ago
great
Ulrick R. · Reviewed מעל 8 שנים ago
Good lab. I think offering some perspective on the questions you asked (e.g. do the inbound and outbound rules in the Security Group look appropriate?) would be valuable (e.g. unrestricted outbound access for all IP addresses, services, protocols, and ports is not needed in most cases and should be avoided). Otherwise, great overview, and I'm sure it just scratches the surface of what security professionals need to know.
Stephen R. · Reviewed מעל 8 שנים ago
George B. · Reviewed מעל 8 שנים ago
Robert S. · Reviewed מעל 8 שנים ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.