We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use Case - Is your feature request related to a problem? Please describe. This SCP will enforce IMDSv2 to access instance metadata for an EC2 instance
Expected Outcome - Describe the solution you'd like SCP Policy
Describe alternatives you've considered Detective controls using AWS Config rule "ec2-imdsv2-check"
Affected AWS resource AWS EC2
Impact Medium: Single feature which affects a single functionality which is optionally enabled in the AWS service
Supported material NA
I can contribute: Yes
Additional context NA
Pull Request number agopalun-enforce-IMDSv2-EC2 #36
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Use Case - Is your feature request related to a problem? Please describe.
This SCP will enforce IMDSv2 to access instance metadata for an EC2 instance
Expected Outcome - Describe the solution you'd like
SCP Policy
Describe alternatives you've considered
Detective controls using AWS Config rule "ec2-imdsv2-check"
Affected AWS resource
AWS EC2
Impact
Medium: Single feature which affects a single functionality which is optionally enabled in the AWS service
Supported material
NA
I can contribute: Yes
Additional context
NA
Pull Request number
agopalun-enforce-IMDSv2-EC2 #36
The text was updated successfully, but these errors were encountered: