Performing a Basic Audit of your AWS Environment Reviews
6204 reviews
joyson f. · Reviewed over 8 years ago
Jeff H. · Reviewed over 8 years ago
Tim O. · Reviewed over 8 years ago
Hyobin A. · Reviewed over 8 years ago
Sai L. · Reviewed over 8 years ago
Stuart W. · Reviewed over 8 years ago
Randy D. · Reviewed over 8 years ago
simon t. · Reviewed over 8 years ago
R C. · Reviewed over 8 years ago
Chris R. · Reviewed over 8 years ago
John B. · Reviewed over 8 years ago
Cyrus A. · Reviewed over 8 years ago
5
Mukkante M. · Reviewed over 8 years ago
David P. · Reviewed over 8 years ago
Eugen S. · Reviewed over 8 years ago
Robin Y. · Reviewed over 8 years ago
David M. · Reviewed over 8 years ago
Andrew W. · Reviewed over 8 years ago
Timothy B. · Reviewed over 8 years ago
Landry N. · Reviewed over 8 years ago
Jeff K. · Reviewed over 8 years ago
great
Ulrick R. · Reviewed over 8 years ago
Good lab. I think offering some perspective on the questions you asked (e.g. do the inbound and outbound rules in the Security Group look appropriate?) would be valuable (e.g. unrestricted outbound access for all IP addresses, services, protocols, and ports is not needed in most cases and should be avoided). Otherwise, great overview, and I'm sure it just scratches the surface of what security professionals need to know.
Stephen R. · Reviewed over 8 years ago
George B. · Reviewed over 8 years ago
Robert S. · Reviewed over 8 years ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.