AWS Config Rules vs Resmo Rules
A list of AWS Config managed rules supported by Resmo
The following table lists managed rules on AWS Config, supported by Resmo. Mind that the exact queries/rules on Resmo may vary.
AWS Config Rule | Supported by Resmo query/rule |
---|---|
ec2-instances-in-vpc | Yes |
encrypted-volumes | Yes |
restricted-ssh | Yes |
autoscaling-group-elb-healthcheck-required | Yes |
autoscaling-launch-config-public-ip-disabled | Yes |
cloudfront-associated-with-waf | Yes |
cloudfront-origin-access-identity-enabled | Yes |
cloudfront-origin-failover-enabled | Yes |
dynamodb-table-encrypted-kms | Yes |
dynamodb-table-encryption-enabled | Yes |
ec2-instance-detailed-monitoring-enabled | Yes |
ec2-instance-multiple-eni-check | Yes |
iam-policy-in-use | Yes |
iam-user-no-policies-check | Yes |
iam-user-unused-credentials-check | Yes |
internet-gateway-authorized-vpc-only | Yes |
lambda-dlq-check | Yes |
lambda-inside-vpc | Yes |
mfa-enabled-for-iam-console-access | Yes |
multi-region-cloudtrail-enabled | Yes |
opensearch-audit-logging-enabled | Yes |
opensearch-encrypted-at-rest | Yes |
opensearch-https-required | Yes |
rds-instance-deletion-protection-enabled | Yes |
rds-instance-iam-authentication-enabled | Yes |
rds-instance-public-access-check | Yes |
s3-bucket-public-read-prohibited | Yes |
s3-bucket-public-write-prohibited | Yes |
s3-bucket-server-side-encryption-enabled | Yes |
s3-bucket-versioning-enabled | Yes |
vpc-flow-logs-enabled | Yes |
Find more details on our AWS integration scope and capabilities on the AWS Integration page. For further inquiries, please contact us via live chat or email us at [email protected]
Last modified 11mo ago