All Products
Search
Document Center

Cloud Config:ecs-security-group-not-used

Last Updated:Nov 10, 2025

Checks whether the number of ECS instances that are added to each security group is greater than 0. If so, the configuration is considered compliant.

Scenarios

You must delete idle security groups on a regular basis. This helps prevent resource waste and reduces management costs.

Risk level

Default risk level: medium.

When you apply this rule, you can change the risk level based on your business requirements.

Compliance evaluation logic

  • If the number of ECS instances that are added to each security group is greater than 0, the configuration is considered compliant.
  • If the number of ECS instances that are added to each security group is equal to 0, the configuration is considered incompliant. For more information about how to remediate an incompliant configuration, see Incompliance remediation.

Rule details

ItemDescription
Rule nameecs-security-group-not-used
Rule identifierecs-security-group-not-used
TagECS and SecurityGroup
Automatic remediationNot supported
Trigger typeConfiguration change
Supported resource typeECS security group
Input parameterNone.

Incompliance remediation

Add an ECS instance to a security group. For more information, see Associate security groups with an instance (primary ENI).