By Implementation

Service Control PoliciesConfig RulesAuto Remediation RulesConformance PacksAmazon GuardDutyAmazon InspectorAWS Security HubAWS Network FirewallRoute53 Resolver SecurityAmazon MacieS3 Bucket PoliciesCloudWatch Alarms and Event RulesAWS WAFAWS Secrets ManagerAWS Systems ManagerSecurity Groups & NACLsAWS KMSIAM PoliciesAmazon ECRRDS Event Subscriptions

By Service Protected

Configuration Packages

Strategy Guides

Other

EMR Security

A collection of AWS Security controls for Amazon EMR. Controls include EMR Security Settings and Config rules for monitoring compliance status of EMR Clusters. Configuration templates are available in AWS CloudFormation, AWS CLI and Terraform

EMR

Configure EMR Block Public Access on the AWS account level, for all EMR clusters in that region. This feature prevents a cluster from launching when any security group associated with the cluster has a rule that allows inbound traffic from IPv4 0.0.0.0/0 or IPv6 ::/0 (public access) on a port, unless the port has been specified as an exception.

CloudFormationAWS CLI

Create an EMR cluster security configuration to configure data encryption at-rest and in-transit as well as Kerberos authentication

CloudFormationAWS CLI
CloudWatch Alarms

A CloudWatch Alarm that triggers when changes are made EMR Security Configurations or Public Access Settings for EMR

CloudFormationTerraformAWS CLI
Config Rule

A config rule that checks that Amazon EMR clusters' security groups are not open to the world. This rule only checks clusters in RUNNING or WAITING state.

CloudFormationTerraformAWS CLI

A Config rule that checks whether Amazon Elastic MapReduce (EMR) clusters' master nodes have public IPs. The rule is NON_COMPLIANT if the master node has a public IP.

CloudFormationTerraformAWS CLI

A config rule that checks that EMR clusters have Kerberos Enabled

CloudFormationTerraformAWS CLI
Filter by source
 
EMR
CloudWatch Alarms
Config Rule