Plugins
Loading...

Query: Flow logs should be configured for every network security group

Description

Audit for network security groups to verify if flow logs are configured. Enabling flow logs allows to log information about IP traffic flowing through network security group. It can be used for optimizing network flows, monitoring throughput, verifying compliance, detecting intrusions and more.

Query

Tables used in this query:

Controls using this query:

SQL