nOps Rules – Unused Resources

Reading Time: 2 minutes Unused resources accumulate in AWS as your workflows change and evolve. We do not tend to think about tidying up loose ends every time a workflow change occurs. For example, when you stop an EC2 instance, your automation might not delete EBS volumes. These volumes pile up and continue to incur cost. ELB has a…

Read More
nOps Rules – Root-user MFA

Reading Time: 2 minutes Enabling root user multi-factor authentication is great security practice. Some companies go as far as enabling physical MFA and locking it down in vault somewhere. nOps provide easy overview which one of your projects don’t have root MFA enabled. You can also receive real-time notifications when root logs in the console with our without MFA….

Read More
nOps Rules – Unrestricted SSH

Reading Time: 2 minutes Allowing SSH access to everyone is not a secure practice. Once you configure Unrestricted SSH Monitoring, any time someone opens port 22 to all, you’ll receive real-time notification. Unrestricted SSH Rule To enable the rule, simply go to the “Available nOps Rules” tab in nOps Rules and click on the “Unrestricted SSH” rule. Unrestricted SSH…

Read More
nOps Rules – Users without MFA

Reading Time: 2 minutes Multi-factor authentication is hard to enforce in AWS, yet is it recommended through AWS Security best practices to have it enabled for all users. nOps allows you receive real time alerts when any of your users login to AWS console without MFA across all your projects. Users Without MFA Rule To enable the rule, simply…

Read More
nOps Rules – AWS CloudTrail

Reading Time: 2 minutes AWS CloudTrail provides audit trail for your cloud infrastructure. This is one of the services that should be enabled by default, but it’s not. Enabling AWS CloudTrail on all your AWS accounts is good security practice. nOps Rule allows you to monitor AWS CloudTrail across regions and projects. You receive real-time notification if AWS CloudTrail…

Read More
nOps Rules – Tag Violation

Reading Time: 2 minutes Monitoring for tag compliance is the most effective way to ensure compliance for your cloud environments. If your organization doesn’t enforce proper tagging policies, eventually, no one will know who originally launched the resources and for what purpose. With nOps’ flexible tag-violation configuration, you will receive real-time notification if newly launched resources violate the tag…

Read More