Unrestricted RPC Access

It is AWS best practice to get aware of Security Groups which allows RPC access from public IP to reduce possibility of breach. Allowing unrestricted RPC access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

Adopt Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs Everyday.

Resource

Select resources on which you want to work on.

Gets Security Groups in a specific AWS Region for EC2 service.

Filter

Enter parameters to filter resources in the workflow.

Filters the Security Groups which allows RPC (TCP port 135 ) access from public IP.

Report

Use this node to generate advanced reports

Generates the report and sends it via email.
Adopt Template

Workflow Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs Everyday.

Resource

Select resources on which you want to work on.

Gets Security Groups in a specific AWS Region for EC2 service.

Filter

Enter parameters to filter resources in the workflow.

Filters the Security Groups which allows RPC (TCP port 135 ) access from public IP.

Report

Use this node to generate advanced reports

Generates the report and sends it via email.

Create A Template

Thank you! Your submission has been received!
Oops! Something went wrong while submitting. Please Try Again.

Request for a template

You can publish templates created by you on this platform.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Similar Templates

CloudFront distributions

CloudFront
None

CloudFront distributions (Inventory)

AutoScaling Groups

None
AWS Auto Scaling

AutoScaling Groups (Inventory)

Route53 hosted zones

None

Route53 hosted zones (Inventory)

ElastiCache Clusters

None
ElastiCache

ElastiCache Clusters (Inventory)