Mods

Control: AWS > ECS > Service > Allowed > Custom

Take an action when an AWS ECS service is not allowed based on custom rules.

The Allowed > Custom control checks if the service is allowed based on the Allowed > Custom > * policies. If the service is not allowed, this control raises an alarm and takes the defined enforcement action.

For any enforcement actions that specify if new, e.g., Enforce: Delete if not allowed and resource is new, this control will only take the enforcement actions for resources created within the last 60 minutes.

Resource Types

This control targets the following resource types:

Policies

The following policies can be used to configure this control:

This control type relies on these other policies when running actions:

Permissions

Cloud permissions used by this control and its actions:

  • ecs:DeleteService

Category

In Your Workspace

Developers