Automatic information enumeration - AWS
Description
The system exposes resources that are not necessary for the operation of the application.
Impact
Expose system resources that can be enumerated.
Recommendation
The application should not expose resources that are not explicitly necessary for the operation of the application, exposing unnecessary resources could expand the attack surface.
Threat
Anonymous attacker from the Internet.
Expected Remediation Time
⏱️ 60 minutes.
Requirements
237 - Ascertain human interaction266 - Disable insecure functionalities327 - Set a rate limitFixes