Identity and Access Management | IAM-007 | Need Attention | - [consoleLastAccess90]
- [consoleLastAccess365]
- [unusedRole] - Review & remove inactive roles
- [GLOBAL]Role::AccessAnalyzerTrustedService, Role::aspnetecstaskroles, Role::AthenaCURdailyStack-AWSCURCrawlerComponentFunction-XX4CHL7H96MD, Role::AthenaCURdailyStack-AWSCURCrawlerLambdaExecutor-18PJXDZOQVUT8, Role::AthenaCURdailyStack-AWSS3CURLambdaExecutor-91GHL63BKDPJ, Role::AthenaCURMonthlyStack-AWSCURCrawlerComponentFuncti-1AJFUSIA0NX5X, Role::AthenaCURMonthlyStack-AWSS3CURLambdaExecutor-19ZYBIKM90TK9, Role::AVMContainersUserRole, Role::aws-ec2-spot-fleet-tagging-role, Role::aws-security-hub-automate-orchestratorRole12B410FD-1VFCRA5D658CQ, Role::aws-security-hub-automate-SNS2DeliveryStatusLoggin-1XB1ER18ZZ6IV, Role::awslogs.prod.kelex.molecule.toppatterns, Role::AWSReservedSSO_AWSPowerUserAccess_00098b9536c9ffa7, Role::AWSReservedSSO_AWSReadOnlyAccess_4426e61ec70ce688, Role::AWSReservedSSO_AWSServiceCatalogAdminFullAccess_c710ef77c5721888, Role::AWSReservedSSO_AWSServiceCatalogEndUserAccess_2f1286af87fe02c6, Role::AWSSupportPatchwork-ap-northeast-1-AutomationRole, Role::AWSSupportPatchwork-ap-northeast-2-AutomationRole, Role::AWSSupportPatchwork-ap-south-1-AutomationRole, Role::AWSSupportPatchwork-ap-southeast-2-AutomationRole, Role::AWSSupportPatchwork-ca-central-1-AutomationRole, Role::AWSSupportPatchwork-eu-central-1-AutomationRole, Role::AWSSupportPatchwork-eu-north-1-AutomationRole, Role::AWSSupportPatchwork-eu-west-1-AutomationRole, Role::AWSSupportPatchwork-eu-west-2-AutomationRole, Role::AWSSupportPatchwork-eu-west-3-AutomationRole, Role::AWSSupportPatchwork-sa-east-1-AutomationRole, Role::AWSSupportPatchwork-us-east-1-AutomationRole, Role::AWSSupportPatchwork-us-east-2-AutomationRole, Role::AWSSupportPatchwork-us-west-1-AutomationRole, Role::AWSVAPTAudit, Role::CID-CUR-Destination-CIDLambdaAnalyticsRole-4lnxU3a60sr4, Role::CidExecRole, Role::Cloud-Intelligence-Dashbo-ProcessPathLambdaExecutio-4v29TjzrvQTv, Role::Cloud-Intelligence-Dashboar-InitLambdaExecutionRole-ZassKR4B4CY8, Role::Cloud-Intelligence-Dashboards-CidCURCrawlerRole-6n5acUHm6w0r, Role::CloudSecAuditRole, Role::CloudSeerTrustedServiceRole, Role::CodeGuruProfilerForwardToAmazonProfiler, Role::CURathenaStack-AWSCURCrawlerComponentFunction-Y25X9I4YKV02, Role::CURathenaStack-AWSCURCrawlerLambdaExecutor-WYW3Y5BXZGA, Role::CURathenaStack-AWSS3CURLambdaExecutor-YH390THQNEJX, Role::EC2CapacityReservationService, Role::ecsAutoscaleRole, Role::ecsTaskExecutionRole, Role::MarketplaceFullAccess, Role::rds-monitoring-role, Role::SaltyTrustedService, Role::SecurityHub_CSV_Exporter, Role::ShadowTrooperRole, Role::SO0111-CloudTrailToCloudWatchLogs, Role::SO0111-ConfigureS3BucketLogging, Role::SO0111-ConfigureS3BucketPublicAccessBlock, Role::SO0111-ConfigureS3PublicAccessBlock, Role::SO0111-ConfigureSNSTopicForStack, Role::SO0111-CreateAccessLoggingBucket, Role::SO0111-CreateCloudTrailMultiRegionTrail, Role::SO0111-CreateIAMSupportRole, Role::SO0111-CreateLogMetricFilterAndAlarm, Role::SO0111-DisablePublicAccessForSecurityGroup, Role::SO0111-DisablePublicAccessToRDSInstance, Role::SO0111-DisablePublicAccessToRedshiftCluster, Role::SO0111-DisablePublicIPAutoAssign, Role::SO0111-EnableAutomaticSnapshotsOnRedshiftCluster, Role::SO0111-EnableAutomaticVersionUpgradeOnRedshiftCluster, Role::SO0111-EnableAutoScalingGroupELBHealthCheck, Role::SO0111-EnableAWSConfig, Role::SO0111-EnableCloudTrailEncryption, Role::SO0111-EnableCloudTrailLogFileValidation, Role::SO0111-EnableCloudTrailToCloudWatchLogging, Role::SO0111-EnableCopyTagsToSnapshotOnRDSCluster, Role::SO0111-EnableDefaultEncryptionS3, Role::SO0111-EnableDeliveryStatusLoggingForSNSTopic, Role::SO0111-EnableEbsEncryptionByDefault, Role::SO0111-EnableEncryptionForSNSTopic, Role::SO0111-EnableEncryptionForSQSQueue, Role::SO0111-EnableEnhancedMonitoringOnRDSInstance, Role::SO0111-EnableKeyRotation, Role::SO0111-EnableMinorVersionUpgradeOnRDSDBInstance, Role::SO0111-EnableMultiAZOnRDSInstance, Role::SO0111-EnableRDSClusterDeletionProtection, Role::SO0111-EnableRDSInstanceDeletionProtection, Role::SO0111-EnableRedshiftClusterAuditLogging, Role::SO0111-EnableVPCFlowLogs, Role::SO0111-EnableVPCFlowLogs-remediationRole, Role::SO0111-EncryptRDSSnapshot, Role::SO0111-MakeEBSSnapshotsPrivate, Role::SO0111-MakeRDSSnapshotPrivate, Role::SO0111-RDSMonitoring-remediationRole, Role::SO0111-RemoveLambdaPublicAccess, Role::SO0111-RemoveVPCDefaultSecurityGroupRules, Role::SO0111-ReplaceCodeBuildClearTextCredentials, Role::SO0111-RevokeUnrotatedKeys, Role::SO0111-RevokeUnusedIAMUserCredentials, Role::SO0111-S3BlockDenylist, Role::SO0111-SetIAMPasswordPolicy, Role::SO0111-SetSSLBucketPolicy, Role::SO0111-SHARR-Orchestrator-Member, Role::SpringClean-XUG3HH5R-AutoUpdateElevatedRole-1IM6AYMGMCA35, Role::SpringClean-XUG3HH5R-FeatureCheckerFunctionRole-1AH36Y9VYP822, Role::SpringClean-XUG3HH5R-SesVerifyEmailFunctionRole-1TXMG47957RRG, Role::SpringClean-XUG3HH5R-SpringCleanStackSetAdministra-QIMZ48DM5OFV, Role::SpringClean-XUG3HH5R-SpringCleanStackSetExecutionR-D9DWX0EX1ZOA, Role::testCarbonRole, Role::TurtleRoleManagement, Role::vpcflowCWrole, Role::wwRoleEC2SES, Role::wwRoleLambdaSES, Role::ww_augnhtrole
| AWS Blog |
Sensitive data | SDAT-003 | Need Attention | - [SGEncryptionInTransit] - Encryption in Transit
- [ap-northeast-1]SG::sg-0a9a9f1599f78e648
- [ap-northeast-2]SG::sg-0e2f6a031113c6c65
- [ap-northeast-3]SG::sg-0f1c015386fdeaef2
- [ap-south-1]SG::sg-0ce181aa24e2327a0
- [ap-southeast-1]SG::sg-0c82e152ce9347073, SG::sg-0442088071f74e66b
- [ap-southeast-2]SG::sg-06a87caeacb9bdc1c
- [ap-southeast-3]SG::sg-09c69789992976af0, SG::sg-07d450b94849d4deb
- [ap-southeast-5]SG::sg-0340a45e7f6dfdeef, SG::sg-0d56232f5bc4a6a0d, SG::sg-0cdece98aec7d1e6c
- [ca-central-1]SG::sg-0807269705e2a7bce
- [eu-central-1]SG::sg-061edeb40615f37d8
- [eu-north-1]SG::sg-0224dd542e0e0a188
- [eu-west-1]SG::sg-0ee2cf797712225c6
- [eu-west-2]SG::sg-0d712926de8d430e0
- [eu-west-3]SG::sg-0d057db4a24c667d8
- [sa-east-1]SG::sg-06a16f5c401b779ea
- [us-east-1]SG::sg-0f4d456d65b49cbcc, SG::sg-0562190d9d9c154da, SG::sg-0fe800a9602ab25ff
- [us-east-2]SG::sg-05b1211873efb1066
- [us-west-1]SG::sg-0ac2b6884d3c7f382
- [us-west-2]SG::sg-037dcb16366f739b8
- [TlsEnforced] - Enforce Encryption of Data in Transit
- [ap-southeast-1]Bucket::aws-athena-query-results-769655955296-ap-southeast-1, Bucket::aws-cloudtrail-logs-769655955296-b457067d, Bucket::cf-templates-axtacndawvmi-ap-southeast-1, Bucket::config-bucket-769655955296, Bucket::tgw-flow-log-s3, Bucket::wwcurbucket, Bucket::wws3inventory
- [us-east-1]Bucket::aws-athena-query-results-cid-769655955296-us-east-1, Bucket::cf-templates-axtacndawvmi-us-east-1, Bucket::cid-769655955296-shared, Bucket::cloudtrail-awslogs-769655955296-fhklab3h-isengard-do-not-delete, Bucket::sagemaker-studio-769655955296-hn1cxm2eq5, Bucket::sagemaker-studio-edt80ljq4, Bucket::sagemaker-studio-nifj1w84os, Bucket::sagemaker-us-east-1-769655955296, Bucket::security-hub-format-s3bucketname-7uxkruwhbbhe, Bucket::securityhubcsvmanagerstac-securityhubexportbucket0-a2e5yuo0rpvs, Bucket::testcurver2bucket, Bucket::wwsagemakerbucket
- [us-west-2]Bucket::do-not-delete-gatedgarden-audit-769655955296
| Data protection in Amazon EC2 AWS Docs |