Ensure Redshift cluster is not publicly accessible

24 Times Used
22 MAY 2019

It is an AWS best practice to keep your Redshift clusters private for security reasons. If your cluster is public, any machine on the internet can establish a connection to it which can lead to SQL injection or DDoS attack.

Workflow Template

Gets Clusters in a specific AWS Region for Redshift service.
Provide your details to emulate workflow
Fulfils organizational obligation(if any) before taking any action on an AWS resource.
Provide your details to emulate workflow

Trigger

Use this to initiate a workflow based on time, events or HTTP calls.

Resource

Select resources on which you want to work on.

Filter

Enter parameters to filter resources in the workflow.

User Approval

Use this to get approval from stakeholder to continue the workflow.

Action

Select action to be done on resources in the workflow.

Filters the clusters which are public
Provide your details to emulate workflow
Modify Cluster in a specific AWS Region for Redshift service to make them private.
Provide your details to emulate workflow
Use Template
AWS Automation Builder by TotalCloud - The easiest and fastest way to automate AWS | Product Hunt Embed