Public Policies

How to Use this Page

This page lists the AWS Public Policies that Bridgecrew helps you enforce. You can browse this page, or search for a specific policy ID or short title. For each policy, press the link for more details about a policy and its fix options.

Ensure AWS ECR repository is not exposed to public
Policy ID: BC_AWS_PUBLIC_1

Ensure AWS RDS database instance is not publicly accessible
Policy ID: BC_AWS_PUBLIC_2

Ensure Elasticsearch domains are not publicly accessible
Policy ID: BC_AWS_PUBLIC_3

Ensure SQS queue policy is not publicly accessible
Policy ID: BC_AWS_PUBLIC_4

Ensure SNS topic policy is not publicly accessible
Policy ID: BC_AWS_PUBLIC_5

Ensure API gateway methods are not publicly accessible
Policy ID: BC_AWS_PUBLIC_6

Ensure EBS snapshots are not publicly accessible
Policy ID: BC_AWS_PUBLIC_7

Ensure EC2 AMIs are not publicly accessible
Policy ID: BC_AWS_PUBLIC_8

Ensure AWS Redshift clusters should be publicly accessible
Policy ID: BC_AWS_PUBLIC_9

Ensure RDS instances are not publicly accessible
Policy ID: BC_AWS_PUBLIC_10

Ensure AWS MQ is not publicly accessible
Policy ID: BC_AWS_PUBLIC_11

Ensure AWS EC2 instances with public IP and associated with security groups do not have Internet access
Policy ID: BC_AWS_PUBLIC_12

Ensure DMS replication instance is not publicly accessible
Policy ID: BC_AWS_PUBLIC_13


Did this page help you?