Skip to content

Commit

Permalink
fix style tags
Browse files Browse the repository at this point in the history
  • Loading branch information
judell committed Jun 25, 2024
1 parent 69ee515 commit 9e162ac
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ Under `Policy Type` search for `aws s3 bucket versioning` and select that policy
Under `Setting` select `Skip`.

Click `Create`.
<p><img alt="aws_start_3_create_policy_setting_for_individual_bucket" style="width:70%" src="/images/docs/guardrails/runbook/aws_start_3_create_policy_setting_for_individual_bucket.png"/></p>
<p><img alt="aws_start_3_create_policy_setting_for_individual_bucket" style={{"width":"70%"}} src="/images/docs/guardrails/runbook/aws_start_3_create_policy_setting_for_individual_bucket.png"/></p>

On the ensuing `Policy Setting` page, select the `Hierarchy` tab.
<p><img alt="aws_start_3_new_policy_hierarchy_with_exception_for_individual_bucket" src="/images/docs/guardrails/runbook/aws_start_3_new_policy_hierarchy_with_exception_for_individual_bucket.png"/></p>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ Click the `Policies` tab to review the associated policy. The value is `Check` w
### Step 2: Put the control into Alarm

Go back to the AWS console and turn off `Block all public access`
<p><img alt="aws_start_1_console_unblock_public_access" style="width:60%" src="/images/docs/guardrails/runbook/aws_start_1_console_unblock_public_access.png"/></p>
<p><img alt="aws_start_1_console_unblock_public_access" style={{"width":"60%"}} src="/images/docs/guardrails/runbook/aws_start_1_console_unblock_public_access.png"/></p>

In Guardrails, go back to the `Control` tab. In a few minutes, the control will go to `Alarm`.
<p><img alt="aws_start_1_public_access_block_control_is_red" src="/images/docs/guardrails/runbook/aws_start_1_public_access_block_control_is_red.png"/></p>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ nav:
### Step 1: Observe a policy type and an S3 bucket unaffected by the policy

Check the properties of the bucket you created in [Review and test a Guardrails AWS control]().  Unless you changed the default, bucket versioning is disabled.
<p><img alt="aws_start_2_bucket_versioning_disabled" style="width:50%" src="/images/docs/guardrails/runbook/aws_start_2_bucket_versioning_disabled.png"/></p>
<p><img alt="aws_start_2_bucket_versioning_disabled" style={{"width":"50%"}} src="/images/docs/guardrails/runbook/aws_start_2_bucket_versioning_disabled.png"/></p>


Now, in Guardrails, search for `aws bucket versioning`.
Expand Down

0 comments on commit 9e162ac

Please sign in to comment.