Public Policies
How to Use this Page
This page lists the AWS Public Policies that Bridgecrew helps you enforce. You can browse this page, or search for a specific policy ID or short title. For each policy, press the link for more details about a policy and its fix options.
Ensure AWS ECR repository is not exposed to public
Policy ID: BC_AWS_PUBLIC_1
Ensure AWS RDS database instance is not publicly accessible
Policy ID: BC_AWS_PUBLIC_2
Ensure Elasticsearch domains are not publicly accessible
Policy ID: BC_AWS_PUBLIC_3
Ensure SQS queue policy is not publicly accessible
Policy ID: BC_AWS_PUBLIC_4
Ensure SNS topic policy is not publicly accessible
Policy ID: BC_AWS_PUBLIC_5
Ensure API gateway methods are not publicly accessible
Policy ID: BC_AWS_PUBLIC_6
Ensure EBS snapshots are not publicly accessible
Policy ID: BC_AWS_PUBLIC_7
Ensure EC2 AMIs are not publicly accessible
Policy ID: BC_AWS_PUBLIC_8
Ensure AWS Redshift clusters should be publicly accessible
Policy ID: BC_AWS_PUBLIC_9
Ensure RDS instances are not publicly accessible
Policy ID: BC_AWS_PUBLIC_10
Ensure AWS MQ is not publicly accessible
Policy ID: BC_AWS_PUBLIC_11
Ensure AWS EC2 instances with public IP and associated with security groups do not have Internet access
Policy ID: BC_AWS_PUBLIC_12
Ensure DMS replication instance is not publicly accessible
Policy ID: BC_AWS_PUBLIC_13
Updated almost 2 years ago