Skip to content

Commit

Permalink
Fix titles for AWS Policy packs (#820)
Browse files Browse the repository at this point in the history
  • Loading branch information
madhushreeray30 authored Sep 4, 2024
1 parent 8e5a91a commit 69e5103
Show file tree
Hide file tree
Showing 185 changed files with 227 additions and 226 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,15 @@ categories: ["networking", "security"]
primary_category: "security"
---

# Enforce AWS DMS Replication Instances to Restrict Public Access
# Enforce AWS DMS Replication Instances Are Not Publicly Accessible

Enforcing AWS DMS Replication Instances to restrict public access is crucial to protect sensitive data during migration processes. This measure minimizes the risk of unauthorized access, potential data breaches, and ensures compliance with security best practices and regulatory requirements.

This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can help you configure the following settings for DMS replication instances:

- Stop/Terminate replication instances which have public access enabled

**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_dms_enforce_replication_instances_to_not_be_publicly_accessible/settings)**
**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_dms_enforce_replication_instances_are_not_publicly_accessible/settings)**

## Getting Started

Expand Down Expand Up @@ -51,7 +51,7 @@ Clone:

```sh
git clone https://github.com/turbot/guardrails-samples.git
cd guardrails-samples/policy_packs/aws/dms/enforce_replication_instances_to_not_be_publicly_accessible
cd guardrails-samples/policy_packs/aws/dms/enforce_replication_instances_are_not_publicly_accessible
```

Run the Terraform to create the policy pack in your workspace:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce AWS DMS Replication Instances to Restrict Public Access"
title = "Enforce AWS DMS Replication Instances Are Not Publicly Accessible"
description = "Mitigate the risk of unauthorized access, potential data breaches, and ensures compliance with security best practices and regulatory requirements."
akas = ["aws_dms_enforce_replication_instances_to_not_be_publicly_accessible"]
akas = ["aws_dms_enforce_replication_instances_are_not_publicly_accessible"]
}
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can

## Documentation

- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/enforce_point_in_time_recovery_is_enabled_for_tables/settings)**
- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_dynamodb_enforce_point_in_time_recovery_is_enabled_for_tables/settings)**

## Getting Started

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ categories: ["security"]
primary_category: "security"
---

# Enforce AWS EC2 AMIs to Be Shared With Trusted Accounts
# Enforce AWS EC2 AMIs Are Shared With Trusted Accounts

Enforcing EC2 AMIs to be shared only with trusted accounts is crucial for maintaining security and compliance, as it ensures that sensitive or proprietary configurations and data are only accessible to authorized users, reducing the risk of unauthorized access and potential data breaches. This control helps safeguard the integrity and confidentiality of the systems and data deployed in AWS environments.

Expand All @@ -14,7 +14,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can

## Documentation

- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/enforce_amis_to_be_shared_with_trusted_accounts/settings)**
- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_amis_are_shared_with_trusted_accounts/settings)**

## Getting Started

Expand Down Expand Up @@ -54,7 +54,7 @@ Clone:

```sh
git clone https://github.com/turbot/guardrails-samples.git
cd guardrails-samples/policy_packs/aws/ec2/enforce_amis_to_be_shared_with_trusted_accounts
cd guardrails-samples/policy_packs/aws/ec2/enforce_amis_are_shared_with_trusted_accounts
```

Run the Terraform to create the policy pack in your workspace:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce AWS EC2 AMIs to Be Shared With Trusted Accounts"
title = "Enforce AWS EC2 AMIs Are Shared With Trusted Accounts"
description = "Ensures that sensitive or proprietary configurations and data are only accessible to authorized users, reducing the risk of unauthorized access and potential data breaches."
akas = ["aws_ec2_enforce_amis_to_be_shared_with_trusted_accounts"]
akas = ["aws_ec2_enforce_amis_are_shared_with_trusted_accounts"]
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ categories: ["security", "storage"]
primary_category: "security"
---

# Enforce Encryption By Default is Enabled for AWS EC2 EBS Volumes
# Enforce Default Encryption Is Enabled for New AWS EBS Volumes

Enforcing encryption by default for AWS EC2 EBS volumes is essential for protecting sensitive data at rest. This measure ensures that all newly created EBS volumes are automatically encrypted, reducing the risk of unauthorized data access and breaches, and ensuring compliance with security best practices and regulatory requirements.

Expand All @@ -13,7 +13,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can

## Documentation

- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/enforce_encryption_by_default_is_enabled_for_ebs_volumes/settings)**
- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/enforce_default_encryption_is_enabled_for_new_ebs_volumes/settings)**

## Getting Started

Expand Down Expand Up @@ -53,7 +53,7 @@ Clone:

```sh
git clone https://github.com/turbot/guardrails-samples.git
cd guardrails-samples/policy_packs/aws/ec2/enforce_encryption_by_default_is_enabled_for_ebs_volumes
cd guardrails-samples/policy_packs/aws/ec2/enforce_default_encryption_is_enabled_for_new_ebs_volumes
```

Run the Terraform to create the policy pack in your workspace:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce Encryption By Default is Enabled for AWS EC2 EBS Volumes"
title = "Enforce Default Encryption Is Enabled for New AWS EBS Volumes"
description = "Ensure that all newly created EBS volumes are automatically encrypted, reducing the risk of unauthorized data access and breaches."
akas = ["aws_ec2_enforce_enforce_encryption_by_default_is_enabled_for_ebs_volumes"]
akas = ["aws_ec2_enforce_default_encryption_is_enabled_for_new_ebs_volumes"]
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ categories: ["security", "storage"]
primary_category: "security"
---

# Enforce Encryption at Rest is Enabled for AWS EBS Volumes
# Enforce Encryption at Rest Is Enabled for AWS EBS Volumes

Enforcing encryption at rest for AWS EBS volumes is critical to protect sensitive data from unauthorized access and potential breaches. This measure ensures that data stored on EBS volumes is encrypted, thereby enhancing data security and compliance with regulatory requirements.

Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce Encryption at Rest is Enabled for AWS EBS Volumes"
title = "Enforce Encryption at Rest Is Enabled for AWS EBS Volumes"
description = "Enforcing encryption at rest for AWS EBS volumes is critical to protect sensitive data from unauthorized access and potential breaches."
akas = ["aws_ec2_enforce_encryption_at_rest_is_enabled_for_ebs_volumes"]
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,15 @@ categories: ["compute", "cost controls"]
primary_category: "cost controls"
---

# Enforce AWS EC2 Instances to Not Be Older Than 90 Days
# Enforce AWS EC2 Instances Are Not Older Than 90 Days

Automatically deleting AWS EC2 instances that have been running for more than 90 days is crucial for resource optimization and cost management. This measure helps in ensuring that long-running instances are periodically reviewed and terminated if no longer needed, thereby reducing unnecessary costs and improving overall resource utilization.

This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can help you configure the following settings for EC2 instances:

- Terminate instances that are older than 90 days

**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_instances_to_not_be_older_than_90_days/settings)**
**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_instances_are_not_older_than_90_days/settings)**

## Getting Started

Expand Down Expand Up @@ -51,7 +51,7 @@ Clone:

```sh
git clone https://github.com/turbot/guardrails-samples.git
cd guardrails-samples/policy_packs/aws/ec2/enforce_instances_to_not_be_older_than_90_days
cd guardrails-samples/policy_packs/aws/ec2/enforce_instances_are_not_older_than_90_days
```

Run the Terraform to create the policy pack in your workspace:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce AWS EC2 Instances to Not Be Older Than 90 Days"
title = "Enforce AWS EC2 Instances Are Not Older Than 90 Days"
description = "Automatically delete AWS EC2 instances that have been running for more than 90 days to ensure resource optimization and cost management."
akas = ["aws_ec2_enforce_instances_to_not_be_older_than_90_days"]
akas = ["aws_ec2_enforce_instances_are_not_older_than_90_days"]
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ categories: ["networking", "security"]
primary_category: "networking"
---

# Enforce AWS EC2 Instances to Not Have Internet Access Via Subnets
# Enforce AWS EC2 Instances Do Not Have Internet Access via Subnets

Enforcing that AWS EC2 instances do not have internet access via subnets is critical for maintaining a secure and controlled network environment. This measure ensures that instances are isolated from the internet, reducing the risk of unauthorized access and potential data breaches, and enhancing security by restricting outbound traffic to approved and monitored channels.

Expand All @@ -13,7 +13,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can

## Documentation

- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_instances_to_not_have_internet_access_via_subnets/settings)**
- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_instances_do_not_have_internet_access_via_subnets/settings)**

## Getting Started

Expand Down Expand Up @@ -53,7 +53,7 @@ Clone:

```sh
git clone https://github.com/turbot/guardrails-samples.git
cd guardrails-samples/policy_packs/aws/ec2/enforce_instances_to_not_have_internet_access_via_subnets
cd guardrails-samples/policy_packs/aws/ec2/enforce_instances_do_not_have_internet_access_via_subnets
```

Run the Terraform to create the policy pack in your workspace:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce AWS EC2 Instances to Not Have Internet Access Via Subnets"
title = "Enforce AWS EC2 Instances Do Not Have Internet Access via Subnets"
description = "Ensure that instances are isolated from the internet, reducing the risk of unauthorized access and potential data breaches, and enhancing security by restricting outbound traffic to approved and monitored channels."
akas = ["aws_ec2_enforce_instances_to_not_have_internet_access_via_subnets"]
akas = ["aws_ec2_enforce_instances_do_not_have_internet_access_via_subnets"]
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ categories: ["cost controls", "security", "tagging"]
primary_category: "tagging"
---

# Enforce AWS EC2 AMIs Used By Instances to Use Specific Approved Tags
# Enforce AWS EC2 Instances Use AMIs With Approved Tags

Enforcing that AWS EC2 AMIs used by instances have specific approved tags is vital for maintaining resource organization, compliance, and effective management. This practice ensures that all instances are easily identifiable based on their purpose, environment, and other criteria, facilitating cost tracking, security management, and adherence to organizational policies and best practices.

Expand All @@ -14,7 +14,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can

## Documentation

- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_amis_used_by_instances_to_use_specific_approved_tags/settings)**
- **[Review Policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_instances_use_amis_with_approved_tags/settings)**

## Getting Started

Expand Down Expand Up @@ -54,7 +54,7 @@ Clone:

```sh
git clone https://github.com/turbot/guardrails-samples.git
cd guardrails-samples/policy_packs/aws/ec2/enforce_amis_used_by_instances_to_use_specific_approved_tags
cd guardrails-samples/policy_packs/aws/ec2/enforce_instances_use_amis_with_approved_tags
```

Run the Terraform to create the policy pack in your workspace:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce AWS EC2 AMIs Used By Instances to Use Specific Approved Tags"
title = "Enforce AWS EC2 Instances Use AMIs With Approved Tags"
description = "Ensure that all instances are easily identifiable based on their purpose, environment, and other criteria, facilitating cost tracking, security management, and adherence to organizational policies."
akas = ["aws_ec2_enforce_amis_used_by_instances_to_use_specific_approved_tags"]
akas = ["aws_ec2_enforce_instances_use_amis_with_approved_tags"]
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ categories: ["compute", "security"]
primary_category: "security"
---

# Enforce AWS EC2 Instances to Use Approved AMIs and/or Publisher Accounts
# Enforce AWS EC2 Instances Use Approved AMIs and Publisher Accounts

Enforcing AWS EC2 instances to use approved AMIs and/or publisher accounts is vital for maintaining a secure and standardized environment. This practice ensures that only trusted, validated images are used, reducing the risk of security vulnerabilities and ensuring compliance with organizational policies and security standards.

Expand All @@ -15,7 +15,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can

## Documentation

- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_approved_amis_publishers_for_instances/settings)**
- **[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_instances_use_approved_amis_and_publisher_accounts/settings)**

## Getting Started

Expand Down Expand Up @@ -55,7 +55,7 @@ Clone:

```sh
git clone https://github.com/turbot/guardrails-samples.git
cd guardrails-samples/policy_packs/aws/ec2/enforce_approved_amis_publishers_for_instances
cd guardrails-samples/policy_packs/aws/ec2/enforce_instances_use_approved_amis_and_publisher_accounts
```

Run the Terraform to create the policy pack in your workspace:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce AWS EC2 Instances to Use Approved AMIs and/or Publisher Accounts"
title = "Enforce AWS EC2 Instances Use Approved AMIs and Publisher Accounts"
description = "Ensure that only trusted, validated images are used, reducing the risk of security vulnerabilities and ensuring compliance with organizational policies and security standards."
akas = ["aws_ec2_enforce_approved_amis_publishers_for_instances"]
akas = ["aws_ec2_enforce_instances_use_approved_amis_and_publisher_accounts"]
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ categories: ["cost controls", "security"]
primary_category: "cost controls"
---

# Enforce AWS EC2 Instances to Use Specific Instance Types
# Enforce AWS EC2 Instances Use Approved Instance Types

Enforcing specific AWS EC2 instance types ensures that deployed resources align with performance, cost, and compliance requirements. This control helps optimize resource utilization, manage expenses, and maintain consistent security and operational standards across the cloud environment.

Expand All @@ -12,7 +12,7 @@ This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can
- Set a list of specific instance types that are approved for use
- Stop/Terminate instances that do not belong to the list of approved instance types

**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/enforce_instances_to_use_specific_instance_types/settings)**
**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_instances_use_approved_instance_types/settings)**

## Getting Started

Expand Down Expand Up @@ -52,7 +52,7 @@ Clone:

```sh
git clone https://github.com/turbot/guardrails-samples.git
cd guardrails-samples/policy_packs/aws/ec2/enforce_instances_to_use_specific_instance_types
cd guardrails-samples/policy_packs/aws/ec2/enforce_instances_use_approved_instance_types
```

Run the Terraform to create the policy pack in your workspace:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce AWS EC2 Instances to Use Specific Instance Types"
title = "Enforce AWS EC2 Instances Use Approved Instance Types"
description = "Ensure optimize resource utilization, manage expenses, and maintain consistent security and operational standards across the cloud environment."
akas = ["aws_ec2_enforce_instances_to_use_specific_instance_types"]
akas = ["aws_ec2_enforce_instances_use_approved_instance_types"]
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,15 @@ categories: ["cost controls", "storage"]
primary_category: "cost controls"
---

# Enforce AWS EC2 Snapshots to Not Be Older Than 60 Days
# Enforce AWS EC2 Snapshots Are Not Older Than 60 Days

Automatically deleting AWS EC2 snapshots that have been active for more than 60 days is crucial for resource optimization and cost management. This measure helps in ensuring that old snapshots are periodically reviewed and deleted if no longer needed, thereby reducing unnecessary storage costs and improving overall resource management.

This [policy pack](https://turbot.com/guardrails/docs/concepts/policy-packs) can help you configure the following settings for EC2 snapshots:

- Delete snapshots that are older than 60 days

**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_snapshots_to_not_be_older_than_60_days/settings)**
**[Review policy settings →](https://hub.guardrails.turbot.com/policy-packs/aws_ec2_enforce_snapshots_are_not_older_than_60_days/settings)**

## Getting Started

Expand Down Expand Up @@ -51,7 +51,7 @@ Clone:

```sh
git clone https://github.com/turbot/guardrails-samples.git
cd guardrails-samples/policy_packs/aws/ec2/enforce_snapshots_to_not_be_older_than_60_days
cd guardrails-samples/policy_packs/aws/ec2/enforce_snapshots_are_not_older_than_60_days
```

Run the Terraform to create the policy pack in your workspace:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
resource "turbot_policy_pack" "main" {
title = "Enforce AWS EC2 Snapshots to Not Be Older Than 60 Days"
title = "Enforce AWS EC2 Snapshots Are Not Older Than 60 Days"
description = "Automatically delete AWS EC2 snapshots that have been running for more than 60 days to ensure resource optimization and cost management."
akas = ["aws_ec2_enforce_snapshots_to_not_be_older_than_60_days"]
akas = ["aws_ec2_enforce_snapshots_are_not_older_than_60_days"]
}
Loading

0 comments on commit 69e5103

Please sign in to comment.