Aqua Vulnerability Database

    Get Demo

    Vulnerabilities
    Misconfiguration
    Runtime Security
    Compliance
    AWS >

    EC2

    Add Description To Security Group
    Add Description To Security Group Rule
    Allowed Custom Ports
    Amazon EBS Public Snapshots
    AMI Has Tags
    App-Tier EC2 Instance IAM Role
    Automate EBS Snapshot Lifecycle
    Cross Organization VPC Peering Connections
    Cross VPC Public Private Communication
    Default Security Group
    Default Security Group In Use
    Default VPC Exists
    Default VPC In Use
    Detect EC2 Classic Instances
    EBS Backup Enabled
    EBS Encrypted Snapshots
    EBS Encryption Enabled By Default
    EBS Snapshot Has Tags
    EBS Volume has tags
    EBS Volume Snapshot Public
    EBS Volumes Recent Snapshots
    EBS Volumes Too Old Snapshots
    EC2 CPU Alarm Threshold Exceeded
    EC2 has Tags
    EC2 Instance Key Based Login
    EC2 LaunchWizard Security Groups
    EC2 Max Instances
    Elastic IP Limit
    Enable At Rest Encryption
    Enable Launch Config At Rest Encryption
    Enable Volume Encryption
    Encrypted AMI
    Enforce Http Token Imds
    Enforce Launch Config Http Token Imds
    Excessive Security Groups
    Instance Detailed Monitoring
    Instance IAM Role
    Instance Limit
    Instance vCPU On-Demand Based Limits
    Internet Exposure
    Internet Gateways In VPC
    Managed NAT Gateway In Use
    NAT Multiple AZ
    Network ACL has Tags
    No Default Vpc
    No Excessive Port Access
    No Public Egress Sgr
    No Public Ingress Acl
    No Public Ingress Sgr
    No Public Ip
    No Public Ip Subnet
    No Secrets In Launch Template User Data
    No Secrets In User Data
    No Sensitive Info
    Open All Ports Protocols
    Open All Ports Protocols Egress
    Open Cassandra Client
    Open Cassandra Internode
    Open Cassandra Monitoring
    Open Cassandra Thrift
    Open CIFS
    Open Custom Ports
    Open DNS
    Open Docker
    Open Elasticsearch
    Open FTP
    Open Hadoop HDFS NameNode Metadata Service
    Open Hadoop HDFS NameNode WebUI
    Open HTTP
    Open HTTPS
    Open Internal Web
    Open Kibana
    Open LDAP
    Open LDAPS
    Open Memcached
    Open MongoDB
    Open MySQL
    Open NetBIOS
    Open Oracle
    Open Oracle Auto Data Warehouse
    Open PostgreSQL
    Open RDP
    Open Redis
    Open RFC 1918
    Open RPC
    Open Salt
    Open SMBoTCP
    Open SMTP
    Open SNMP
    Open SQL Server
    Open SSH
    Open Telnet
    Open VNC Client
    Open VNC Server
    Outdated Amazon Machine Images
    Overlapping Security Groups
    Privilege Analysis
    Public AMI
    Require Vpc Flow Logs For All Vpcs
    Restrict All In Default Sg
    Security Group Has Tags
    SSM Agent Active All Instances
    SSM Agent Auto Update Enabled
    SSM Agent Latest Version
    SSM Managed Instances
    SSM Session Duration
    Subnet IP Availability
    Unassociated Elastic IP Addresses
    Unrestricted Network ACL Inbound Traffic
    Unrestricted Network ACL Outbound Traffic
    Unused Amazon Machine Images
    Unused EBS Volumes
    Unused Elastic Network Interfaces
    Unused Security Groups
    Unused Virtual Private Gateway
    Unused VPC Internet Gateways
    Virtual Private Gateway In VPC
    Volume Encryption Customer Key
    VPC Elastic IP Limit
    VPC Endpoint Cross Account Access
    VPC Endpoint Exposed
    VPC Flow Logs Enabled
    VPC Has Tags
    VPC Multiple Subnets
    VPC PrivateLink Endpoint Acceptance Required
    VPC Subnet Instances Present
    VPN Tunnel State
    Web-Tier EC2 Instance IAM Role
    Next >>
    Aqua Container Security
    Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed.
    Copyright © 2025 Aqua Security Software Ltd.   Privacy Policy | Terms of Use