Report AWS ElasticSearch domains which allows unknown cross account access.

Sends a report of AWS ElasticSearch domains which allows access to unauthorized cross users. Allowing untrustworthy cross account access to your AWS ES clusters can lead to unauthorized actions such as uploading, downloading and deleting documents without permission.

Adopt Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.

Resource

Select resources on which you want to work on.

Gets Domain Names in a specific AWS Region for ES service. Also inject data from ES Elasticsearch Domain

Filter

Enter parameters to filter resources in the workflow.

Filters the data

Report

Use this node to generate advanced reports

Generates the report and sends it via email.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.
Gets Domain Names in a specific AWS Region for ES service. Also inject data from ES Elasticsearch Domain

Resource

Select resources on which you want to work on.

Filter

Enter parameters to filter resources in the workflow.

Filters the data

Report

Use this node to generate advanced reports

Generates the report and sends it via email.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.
Adopt Template

Workflow Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.

Resource

Select resources on which you want to work on.

Gets Domain Names in a specific AWS Region for ES service. Also inject data from ES Elasticsearch Domain

Filter

Enter parameters to filter resources in the workflow.

Filters the data

Report

Use this node to generate advanced reports

Generates the report and sends it via email.

Create A Template

Thank you! Your submission has been received!
Oops! Something went wrong while submitting. Please Try Again.

Request for a template

You can publish templates created by you on this platform.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Similar Templates

Remove entries in Security Group which allow https access on public ip

It is AWS best practice to remove entries in security group which allows HTTPS access from public IP to reduce possibility of breach. Allowing unrestricted HTTPS access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data

Find missing alarms for in your AWS elasticSearch domains.

Send a report having information of which cloudwatch alarms are missing in your AWS elasticSearch domains.

Remove entries in security group which allows Oracle DB(TCP port 1521 ) access from public IP.

It is AWS best practice to remove entries in security group which allows Oracle DB access from public IP to reduce possibility of breach. Allowing unrestricted Oracle access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.