If no weak-password asset that is exposed to high security risks is detected, the evaluation result is Compliant.
Scenarios
This configuration can help identify your Elastic Compute Service (ECS) instances exposed to the Internet. This can enhance system security.
Risk level
Default risk level: high.
When you apply this rule, you can change the risk level based on your business requirements.
Compliance evaluation logic
- If no weak-password asset that is exposed to high security risks is detected, the evaluation result is Compliant.
- If a weak-password asset that is exposed to high security risks is detected, the evaluation result is Incompliant. For more information about how to remediate an incompliant configuration, see the "Incompliance remediation" section of this topic.
Rule details
Item | Description |
---|---|
Rule name | security-center-weak-password-check |
Rule identifier | security-center-weak-password-check |
Tag | SecurityCenter |
Automatic remediation | Not supported |
Trigger type | Periodic execution |
Evaluation frequency | Interval of 24 hours |
Supported resource type | All resources |
Input parameter | None |
Incompliance remediation
Modify the weak-password assets that are exposed to high security risks. For more information, see Asset exposure analysis.