Apply new rules to AWS Security Group

Create or authorize a specific rule based on your security practice, to regulate inbound and outbound traffic effectively.

Adopt Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs At 09:00 AM, only on Monday, Tuesday, Wednesday, Thursday, and Friday

Resource

Select resources on which you want to work on.

Picks EC2 Security Groups launched in a specific AWS Region and attributes.

Filter

Enter parameters to filter resources in the workflow.

Parameters: Key: GroupName Operator: == Value: "YourSGName"

User Approval

Use this to get approval from stakeholder to continue the workflow.

Action

Select action to be done on resources in the workflow.

Creates EC2 Security Group ingress rule in a particular AWS Region.

Notification

Send notification with a custom message.

Notifies workflow's successful execution details via Slack or email.
Adopt Template

Workflow Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs At 09:00 AM, only on Monday, Tuesday, Wednesday, Thursday, and Friday

Resource

Select resources on which you want to work on.

Picks EC2 Security Groups launched in a specific AWS Region and attributes.

Filter

Enter parameters to filter resources in the workflow.

Parameters: Key: GroupName Operator: == Value: "YourSGName"

User Approval

Use this to get approval from stakeholder to continue the workflow.

Action

Select action to be done on resources in the workflow.

Creates EC2 Security Group ingress rule in a particular AWS Region.

Create A Template

Thank you! Your submission has been received!
Oops! Something went wrong while submitting. Please Try Again.

Request for a template

You can publish templates created by you on this platform.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Similar Templates

RDS DB Instances

Reporting
RDS

Sends report of RDS DB instances CPU Utilization.

EC2 Instances

EC2
Reporting

Sends report for EC2 instances CPU utilization.

IAM user has console login allowed without MFA

IAM
Security

Sends report of IAM users that has control access but MFA is not enabled

EC2 Desired Instance Type

Security
EC2
Security

Determine if the EC2 instances provisioned in your AWS account have the desired instance type(s) established by your organization based on the workload deployed.