Unrestricted CIFS Access

It is AWS best practice to remove entries in security group which allows CIFS access from public IP to reduce possibility of breach. Allowing unrestricted CIFS access can increase threats such as man-in-the-middle attacks (MITM), Denial of Service (DoS) attacks or the Windows Null Session Exploit.

Adopt Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.

Resource

Select resources on which you want to work on.

Gets Security Groups in a specific AWS Region for EC2 service.

Filter

Enter parameters to filter resources in the workflow.

Filters the Security Groups which allow CIFS (TCP 445) on public IP.

Report

Use this node to generate advanced reports

Generates the report and sends it via email.
Adopt Template

Workflow Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everyday.

Resource

Select resources on which you want to work on.

Gets Security Groups in a specific AWS Region for EC2 service.

Filter

Enter parameters to filter resources in the workflow.

Filters the Security Groups which allow CIFS (TCP 445) on public IP.

Report

Use this node to generate advanced reports

Generates the report and sends it via email.

Create A Template

Thank you! Your submission has been received!
Oops! Something went wrong while submitting. Please Try Again.

Request for a template

You can publish templates created by you on this platform.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Similar Templates

Create Alarms based on previous data

EC2
CloudWatch
Operational Excellence

Takes all the EC2 server and calculates the average CPUUtilization of last one month for all the Servers. Using this average CPUUtilization as threshold, new alarms are being created for the servers that doesn't have an alarm already.

Stop RDS DB Instance - Create And Close Jira Ticket

Remediation
Automation
RDS

Create a Jira ticket with DB Instance Identifiers of all Instances that will be stopped, stop the DB Instance, and then close the Jira ticket

Create an EKS Cluster and Node Group (Part 2)

Automation
Release and Deployment
EC2

Automated Deployment of a Container application in a Kubernetes cluster in AWS, including logging and monitoring attributes. Part 2 of 2.

Create a 3-Tier Application (Part 3)

Automation
Release and Deployment
EC2

Provision a 3 tier application in AWS Cloud involving a CDN, DNS, Load Balancer, VPC, Web Server, Application and Database layer, Integrated with AWS Logging and Auditing services like Cloudwatch and CloudTrail. Part 3 of 3.