Skip to content

Commit 1bf79f7

Browse files
authored
Refactor Route 53 and VPC health check recommendations
Removed health check recommendations for Route 53 and Bedrock VPC configuration due to redundancy and updated focus on primary records and security groups.
1 parent 0f02141 commit 1bf79f7

1 file changed

Lines changed: 0 additions & 12 deletions

File tree

articles/defender-for-cloud/recommendations-reference-networking.md

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -466,12 +466,6 @@ Unless a port is specifically allowed, the port should deny unrestricted access.
466466

467467
**Severity**: Low
468468

469-
### Health Checks should be enabled for Route 53
470-
471-
**Description**: Defender for Cloud identified that health checks are not enabled on your Route 53 resources. Health checks are periodic tests that monitor the availability and performance of DNS endpoints, ensuring traffic is routed only to responsive servers. Without them, you risk directing traffic to unresponsive or underperforming endpoints, which could lead to service disruptions and extended downtime.
472-
473-
**Severity**: High
474-
475469
### Health checks should be enabled for primary records on Route53 Hosted zones
476470

477471
**Description**: Defender for Cloud identified a Route 53 failover PRIMARY record without an enabled health check. Health checks are required to validate endpoint availability during failover. Without these checks, traffic may be inadvertently routed to endpoints that are unresponsive or compromised, increasing the risk of service disruption and reduced reliability.
@@ -484,12 +478,6 @@ Unless a port is specifically allowed, the port should deny unrestricted access.
484478

485479
**Severity**: Medium
486480

487-
### Multiple subnets across different Availability Zones should be configured in the Bedrock VPC configuration
488-
489-
**Description**: Defender for Cloud identified that your Bedrock VPC configuration uses a single subnet in one Availability Zone. A subnet is a segment of a VPC and confining endpoints to one zone creates a single point of failure. This means that if the zone goes down, your Bedrock services become unreachable. Configuring multiple subnets in different Availability Zones is necessary to ensure high availability and protect against outages.
490-
491-
**Severity**: Low
492-
493481
### Network isolation should be enabled for AWS SageMaker models
494482

495483
**Description**: Defender for Cloud identified that AWS SageMaker models are not using network isolation. Network isolation confines models to a private network environment, preventing direct communication with public internet resources. Without this isolation, your models risk exposure to unauthorized access and potential data interception during training and inference activities.

0 commit comments

Comments
 (0)