If no weak-password asset that is exposed to high security risks is detected, the evaluation result is Compliant.

Scenarios

This configuration can help identify your Elastic Compute Service (ECS) instances exposed to the Internet. This can enhance system security.

Risk level

Default risk level: high.

When you apply this rule, you can change the risk level based on your business requirements.

Compliance evaluation logic

  • If no weak-password asset that is exposed to high security risks is detected, the evaluation result is Compliant.
  • If a weak-password asset that is exposed to high security risks is detected, the evaluation result is Incompliant. For more information about how to remediate an incompliant configuration, see the "Incompliance remediation" section of this topic.

Rule details

ItemDescription
Rule namesecurity-center-weak-password-check
Rule identifiersecurity-center-weak-password-check
TagSecurityCenter
Automatic remediationNot supported
Trigger typePeriodic execution
Evaluation frequencyInterval of 24 hours
Supported resource typeAll resources
Input parameterNone

Incompliance remediation

Modify the weak-password assets that are exposed to high security risks. For more information, see Asset exposure analysis.