INFO
Source
CloudSploit
ID
privilege-analysis

Privilege Analysis

Check if EC2 instances are overly permissive.

EC2 instances exposed to the internet are at a higher risk of unauthorized access, data breaches, and cyberattacks. It’s crucial to limit exposure by securing access through proper configuration of security groups, NACLs, and route tables.

Secure EC2 instances by restricting access with properly configured security groups and NACLs.