Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

5.1.5. Trusted Advisor Security Checks and Remediation

šŸ’” First Principle: Security misconfigurations don't announce themselves — they accumulate silently until someone exploits them. Trusted Advisor is AWS's automated best-practice auditor: it continuously checks your account against hundreds of recommendations and surfaces the ones that require attention before they become incidents.

Trusted Advisor Check Categories:
CategoryExamples
Cost OptimizationUnderutilized EC2 instances, idle load balancers
PerformanceHigh-utilization instances, CloudFront config
SecurityOpen security groups, MFA on root, exposed IAM access keys
Fault ToleranceRDS Multi-AZ, Auto Scaling, EBS snapshots
Service LimitsApproaching EC2, VPC, or IAM limits
Operational ExcellenceCloudTrail enabled, service limits
Security Checks Available on All Support Plans (Free):
  • S3 bucket permissions (public read/write)
  • Security groups with unrestricted access (0.0.0.0/0) on high-risk ports (port 22, port 3389)
  • MFA not enabled on root account
  • IAM access keys exposed (checks public code repositories)
  • CloudTrail logging disabled
Additional Security Checks (Business/Enterprise Support):
  • EBS public snapshots
  • RDS public snapshots
  • IAM password policy
  • Exposed AWS credentials in public repositories

Trusted Advisor Notifications: Configure email notifications for check status changes. Integrate with EventBridge to trigger automated remediation when a check status changes to "Warning" or "Error."

Trusted Advisor API: Programmatically refresh checks and retrieve results. Use with Lambda and EventBridge for automated remediation workflows:

Trusted Advisor check → "Error" status → EventBridge rule → Lambda → remediate

āš ļø Exam Trap: Trusted Advisor does not automatically fix anything — it identifies issues and reports them. Remediation is always a separate action (manual or automated via Lambda/SSM). Also, the full set of Trusted Advisor checks requires Business or Enterprise support — not Developer or Basic. Questions about "automatically detecting exposed IAM keys" point to Trusted Advisor (with Business support) or IAM Access Analyzer.

Reflection Question: A security operations team wants to receive an automated alert and trigger remediation whenever Trusted Advisor detects a security group with port 22 open to the internet. What event-driven architecture do you build using Trusted Advisor, EventBridge, and Lambda?

Alvin Varughese
Written byAlvin Varughese
Founder•15 professional certifications