Control: AWS > Route 53 Resolver > Resolver Endpoint > Allowed > Custom
Take an action when an AWS Route 53 Resolver resolver endpoint is not allowed based on custom rules.
The Allowed > Custom control checks if the resolver endpoint is allowed based on the Allowed > Custom > * policies. If the resolver endpoint is not allowed, this control raises an alarm and takes the defined enforcement action.
For any enforcement actions that specify if new, e.g., Enforce: Delete if not allowed and resource is new, this control will only take the enforcement actions for resources created within the last 60 minutes.
Resource Types
This control targets the following resource types:
Policies
The following policies can be used to configure this control:
This control type relies on these other policies when running actions:
Permissions
Cloud permissions used by this control and its actions:
route53resolver:DeleteResolverEndpoint
Category
In Your Workspace
Developers
- tmod:@turbot/aws-route53resolver#/control/types/resolverEndpointAllowedCustom
- tmod:@turbot/turbot#/control/categories/resourceAllowed
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-route53resolver#/control/types/resolverEndpointAllowedCustom"
Get Controls