- Controls that enforce specific rules on the methods used to access your organization's resources, ensuring that only compliant access patterns are permitted.
Included Policy | Rational |
---|---|
Restrict access to only HTTPS connections to your resources | Require that access to your resources only occurs on encrypted connections over HTTPS (TLS). This can help you prevent potential attackers from manipulating network traffic. This can help you prevent potential attackers from manipulating network traffic and trusted partners from accessing your resources over an unencrypted connection. |