Performing a Basic Audit of your AWS Environment Reviews
6204 reviews
joyson f. · Reviewed больше 8 лет ago
Jeff H. · Reviewed больше 8 лет ago
Tim O. · Reviewed больше 8 лет ago
Hyobin A. · Reviewed больше 8 лет ago
Sai L. · Reviewed больше 8 лет ago
Stuart W. · Reviewed больше 8 лет ago
Randy D. · Reviewed больше 8 лет ago
simon t. · Reviewed больше 8 лет ago
R C. · Reviewed больше 8 лет ago
Chris R. · Reviewed больше 8 лет ago
John B. · Reviewed больше 8 лет ago
Cyrus A. · Reviewed больше 8 лет ago
5
Mukkante M. · Reviewed больше 8 лет ago
David P. · Reviewed больше 8 лет ago
Eugen S. · Reviewed больше 8 лет ago
Robin Y. · Reviewed больше 8 лет ago
David M. · Reviewed больше 8 лет ago
Andrew W. · Reviewed больше 8 лет ago
Timothy B. · Reviewed больше 8 лет ago
Landry N. · Reviewed больше 8 лет ago
Jeff K. · Reviewed больше 8 лет ago
great
Ulrick R. · Reviewed больше 8 лет ago
Good lab. I think offering some perspective on the questions you asked (e.g. do the inbound and outbound rules in the Security Group look appropriate?) would be valuable (e.g. unrestricted outbound access for all IP addresses, services, protocols, and ports is not needed in most cases and should be avoided). Otherwise, great overview, and I'm sure it just scratches the surface of what security professionals need to know.
Stephen R. · Reviewed больше 8 лет ago
George B. · Reviewed больше 8 лет ago
Robert S. · Reviewed больше 8 лет ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.