Checks if a Lambda function is allowed access to a virtual private cloud (VPC). The rule is NON_COMPLIANT if the Lambda function is not VPC enabled.
Identifier: LAMBDA_INSIDE_VPC
Resource Types: AWS::Lambda::Function
Trigger type: Configuration changes
AWS Region: All supported AWS regions except China (Ningxia) Region
Parameters:
Comma-separated list of Subnet IDs that Lambda functions can be associated with.
For steps on how to run this rule in proactive mode, see Evaluating Your Resources with AWS Config Rules. For this rule to return COMPLIANT in proactive mode, the resource configuration schema for the StartResourceEvaluation API needs to include the following inputs, encoded as a string:
"ResourceConfiguration":
...
{
"VpcConfig": {
"SubnetIds": "[SubnetId-1, SubnetId-2, SubnetId-3, ...]
"
}
}
...
For more information on proactive evaluation, see Evaluation Mode.
AWS CloudFormation templateTo create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4