Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 200+ predefined templates to automate all your AWS actions

Security

24 Times Used
22 MAY 2019
ElastiCache Redis Multi-AZ

Ensure that your ElastiCache Redis Cache clusters are using a Multi-AZ deployment configuration to enhance High Availability (HA). To determine if your ElastiCache Redis Cache clusters are using a Multi-AZ configuration.

IAM User Present

To determine if there are any IAM users created in your AWS account, Ensure that the access to your AWS services and resources is made only through individual IAM users instead of the root account.

ElastiCache Engine Version - Memcached

Sends a report if ElastiCache Memcached Engine is not upgraded to the latest version

ElastiCache Engine Version - Redis

Sends a report if your ElastiCache Redis Engine is not updated to the latest version

ElasticSearch Node to Node Encryption

Sends a report if ElasticSearch Node to Node Encryption is not enabled. This helps to significantly increase data security.

ElasticSearch Version

Send a report if the latest version of ElasticSearch is not being used

Redshift Cluster in VPC

Sends a report if the Redshift Clusters are not in a VPC. Having it in a VPC ensures that you have a better networking infrastructure and improved control over your access security.

Redshift Cluster Allow Version Upgrade

Sends a report if Version Upgrade is not enabled for Redshift Clusters. Having it enabled ensures that your Clusters remain up to date with the latest patches and upgrades.

VPC Endpoint Exposed

Sends a report of all exposed VPC endpoints. Exposed endpoints could lead to security issues due to unauthorised requests made to the supported services.

IAM Group With Inline Policies

Sends a report of IAM groups that are using inline policies. Using managed policies is a better practice and they ensure better control and access management to your account.

IAM Access Keys Rotated 90 Days

Sends a report if your IAM user access keys are not changed in the past 90 days. Rotating the keys minimises the chance of malicious users gaining access to your account.

IAM Access Keys Rotated 45 Days

Sends a report if the IAM user access keys have not been changed in the past 45 days. Rotating the keys minimises the chance that your account can be accessed by malicious users.