Performing a Basic Audit of your AWS Environment Reviews

6204 reviews

joyson f. · Reviewed over 8 years ago

Jeff H. · Reviewed over 8 years ago

Tim O. · Reviewed over 8 years ago

Hyobin A. · Reviewed over 8 years ago

Sai L. · Reviewed over 8 years ago

Stuart W. · Reviewed over 8 years ago

Randy D. · Reviewed over 8 years ago

simon t. · Reviewed over 8 years ago

R C. · Reviewed over 8 years ago

Chris R. · Reviewed over 8 years ago

John B. · Reviewed over 8 years ago

Cyrus A. · Reviewed over 8 years ago

5

Mukkante M. · Reviewed over 8 years ago

David P. · Reviewed over 8 years ago

Eugen S. · Reviewed over 8 years ago

Robin Y. · Reviewed over 8 years ago

David M. · Reviewed over 8 years ago

Andrew W. · Reviewed over 8 years ago

Timothy B. · Reviewed over 8 years ago

Landry N. · Reviewed over 8 years ago

Jeff K. · Reviewed over 8 years ago

great

Ulrick R. · Reviewed over 8 years ago

Good lab. I think offering some perspective on the questions you asked (e.g. do the inbound and outbound rules in the Security Group look appropriate?) would be valuable (e.g. unrestricted outbound access for all IP addresses, services, protocols, and ports is not needed in most cases and should be avoided). Otherwise, great overview, and I'm sure it just scratches the surface of what security professionals need to know.

Stephen R. · Reviewed over 8 years ago

George B. · Reviewed over 8 years ago

Robert S. · Reviewed over 8 years ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.