Skip to content

Commit

Permalink
s/vital/essential/g
Browse files Browse the repository at this point in the history
  • Loading branch information
KevinHock committed Nov 28, 2023
1 parent 4d11312 commit 1a9a7ef
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ title: "Preventing Accidental Internet-Exposure of AWS Resources (Part 1: VPC)"

There are many ways to make resources public in AWS. [github.com/SummitRoute/aws_exposable_resources](https://github.com/SummitRoute/aws_exposable_resources#aws-exposable-resources) was created specifically to maintain a list of all AWS resources that can be publicly exposed and how. Here, we will focus on network access.

Preventing public network access to AWS resources is vital because without network access – all an attacker can leverage is the AWS API – making this arguably the highest ROI attack surface reduction you can make.
Preventing public network access to AWS resources is essential because without network access – all an attacker can leverage is the AWS API – making this arguably the highest ROI attack surface reduction you can make.

This first post discusses resources exclusively in a VPC (EC2 instances, ELBs, RDS databases, etc.).

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -137,7 +137,7 @@ <h2 id="about-the-problem">About The Problem</h2>

<p>There are many ways to make resources public in AWS. <a href="https://github.com/SummitRoute/aws_exposable_resources#aws-exposable-resources">github.com/SummitRoute/aws_exposable_resources</a> was created specifically to maintain a list of all AWS resources that can be publicly exposed and how. Here, we will focus on network access.</p>

<p>Preventing public network access to AWS resources is vital because without network access – all an attacker can leverage is the AWS API – making this arguably the highest ROI attack surface reduction you can make.</p>
<p>Preventing public network access to AWS resources is essential because without network access – all an attacker can leverage is the AWS API – making this arguably the highest ROI attack surface reduction you can make.</p>

<p>This first post discusses resources exclusively in a VPC (EC2 instances, ELBs, RDS databases, etc.).</p>

Expand Down

0 comments on commit 1a9a7ef

Please sign in to comment.