Back Solutions
Solutions by
Back About
Back Resources
Back Research
Recommended Mitigation
It is recommended to associate Redshift clusters with security groups that allow inbound traffic only from authorized IP addresses. More information can be found here: https://docs.aws.amazon.com/redshift/latest/mgmt/working-with-security-groups.html
Get a free Security Risk Assessment. Start today