Performing a Basic Audit of your AWS Environment Reviews

6204 reviews

joyson f. · Reviewed больше 8 лет ago

Jeff H. · Reviewed больше 8 лет ago

Tim O. · Reviewed больше 8 лет ago

Hyobin A. · Reviewed больше 8 лет ago

Sai L. · Reviewed больше 8 лет ago

Stuart W. · Reviewed больше 8 лет ago

Randy D. · Reviewed больше 8 лет ago

simon t. · Reviewed больше 8 лет ago

R C. · Reviewed больше 8 лет ago

Chris R. · Reviewed больше 8 лет ago

John B. · Reviewed больше 8 лет ago

Cyrus A. · Reviewed больше 8 лет ago

5

Mukkante M. · Reviewed больше 8 лет ago

David P. · Reviewed больше 8 лет ago

Eugen S. · Reviewed больше 8 лет ago

Robin Y. · Reviewed больше 8 лет ago

David M. · Reviewed больше 8 лет ago

Andrew W. · Reviewed больше 8 лет ago

Timothy B. · Reviewed больше 8 лет ago

Landry N. · Reviewed больше 8 лет ago

Jeff K. · Reviewed больше 8 лет ago

great

Ulrick R. · Reviewed больше 8 лет ago

Good lab. I think offering some perspective on the questions you asked (e.g. do the inbound and outbound rules in the Security Group look appropriate?) would be valuable (e.g. unrestricted outbound access for all IP addresses, services, protocols, and ports is not needed in most cases and should be avoided). Otherwise, great overview, and I'm sure it just scratches the surface of what security professionals need to know.

Stephen R. · Reviewed больше 8 лет ago

George B. · Reviewed больше 8 лет ago

Robert S. · Reviewed больше 8 лет ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.