Performing a Basic Audit of your AWS Environment Reviews

6204 reviews

joyson f. · Reviewed מעל 8 שנים ago

Jeff H. · Reviewed מעל 8 שנים ago

Tim O. · Reviewed מעל 8 שנים ago

Hyobin A. · Reviewed מעל 8 שנים ago

Sai L. · Reviewed מעל 8 שנים ago

Stuart W. · Reviewed מעל 8 שנים ago

Randy D. · Reviewed מעל 8 שנים ago

simon t. · Reviewed מעל 8 שנים ago

R C. · Reviewed מעל 8 שנים ago

Chris R. · Reviewed מעל 8 שנים ago

John B. · Reviewed מעל 8 שנים ago

Cyrus A. · Reviewed מעל 8 שנים ago

5

Mukkante M. · Reviewed מעל 8 שנים ago

David P. · Reviewed מעל 8 שנים ago

Eugen S. · Reviewed מעל 8 שנים ago

Robin Y. · Reviewed מעל 8 שנים ago

David M. · Reviewed מעל 8 שנים ago

Andrew W. · Reviewed מעל 8 שנים ago

Timothy B. · Reviewed מעל 8 שנים ago

Landry N. · Reviewed מעל 8 שנים ago

Jeff K. · Reviewed מעל 8 שנים ago

great

Ulrick R. · Reviewed מעל 8 שנים ago

Good lab. I think offering some perspective on the questions you asked (e.g. do the inbound and outbound rules in the Security Group look appropriate?) would be valuable (e.g. unrestricted outbound access for all IP addresses, services, protocols, and ports is not needed in most cases and should be avoided). Otherwise, great overview, and I'm sure it just scratches the surface of what security professionals need to know.

Stephen R. · Reviewed מעל 8 שנים ago

George B. · Reviewed מעל 8 שנים ago

Robert S. · Reviewed מעל 8 שנים ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.