Thank you for your contributions to the CloudSploit Remediation Guide. This repository exists as an open source knowledge base of cloud (AWS and Azure) security guidelines to remediate common misconfigurations.
This repository uses the following layout:
|_remediations
|_langugage (e.g. en)
|_cloud (e.g. aws)
|_category (e.g acm)
|_guide.md
Please ensure that your contributions include the following:
- Each new guide should begin with the CloudSploit logo code:
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com)
- The title should follow the following format:
# Cloud / Category / Remediation Guide
For example:
# AWS / ACM / ACM Certificate Validation
- A
## Quick Info
section containing information on the CloudSploit plugin. - A
## Detailed Remediation Steps
section with steps that users can follow to remediate detected issues.
To ensure consistent quality, please follow the below steps when contributing new remediation steps:
- Steps should be clear and concise for users of AWS or Azure.
- Steps should include details such as "Log into the AWS console" and "navigate to the EC2 page".
- Describe the process to locate the detected misconfiguration or vulnerability.
- Include as many screenshots as possible.
- Describe how the user can verify the fix (e.g. "ensure the security group port list has changed to x").
Please submit each new guide or each change as a separate PR by forking this repository and using your own branches.