Quick security checks
Check for common security issues
Check IAM roles and policies
- Risk: Lambda can perform any AWS action
- Action: Apply least privilege (only required permissions)
Network security
VPC security audit
Load balancer security
Data security
S3 bucket security
Fix S3 issues
RDS security
Compliance checks
Enable AWS Config
CloudTrail audit
Secrets management
Container and Kubernetes security
EKS security
ECR image scanning
Automated security scanning
Daily security check script
Compliance reports
Generate compliance report
Best practices
Automate audits
Run security scans daily via cron. Alert on any new issues.
Principle of least privilege
Review IAM policies monthly. Remove unused permissions.
Enable MFA everywhere
Require MFA for all IAM users and root account. No exceptions.
Encrypt everything
Enable encryption at rest for all data stores (S3, RDS, EBS).
Security checklist
Network security
Network security
- No security groups with 0.0.0.0/0 on sensitive ports
- No public RDS instances
- VPC flow logs enabled
- Load balancers use HTTPS with modern TLS policies
- Network ACLs properly configured
IAM security
IAM security
- All users have MFA enabled
- No IAM users with Administrator access
- Access keys rotated every 90 days
- No hardcoded credentials in code
- Service roles use least privilege
Data security
Data security
- All S3 buckets have Block Public Access enabled
- S3 buckets use default encryption
- RDS instances encrypted at rest
- EBS volumes encrypted
- Versioning enabled on critical buckets
Logging and monitoring
Logging and monitoring
- CloudTrail enabled in all regions
- CloudWatch Logs for all services
- AWS Config enabled
- GuardDuty enabled (threat detection)
- Security Hub enabled (centralized findings)
Kubernetes security
Kubernetes security
- EKS cluster endpoint not public
- RBAC enabled and configured
- Network policies defined
- Pod security standards enforced
- Secrets encrypted at rest
Next steps
Security best practices
Implement comprehensive security controls
Monitoring resources
Monitor for security events and anomalies
Multi-environment
Isolate dev, staging, and prod for security
Creating infrastructure
Generate secure infrastructure with maker mode