It's important to note that any Elastic Load Balancer (ELB) that is configured in your AWS account, whether active or not, will add charges to your monthly bill. If an ELB has no associated back-end instances, you should consider either registering instances or deleting it. Similarly, if an ELB has no healthy backend instances, you should troubleshoot the configuration or delete it altogether. Removing unused AWS components such as the Elastic Load Balancer can prevent any unexpected charges on your bill. To help lower the cost of your monthly AWS bill, you should identify any unused Elastic Load Balancers in your account and delete them.


To remediate unused Elastic Load Balancers (ELBs) in your AWS account, you can follow these steps:

  1. Log in to the AWS Management Console and navigate to the EC2 service.
  2. Click on the "Load Balancers" link under the "Load Balancing" category in the left-hand menu.
  3. Identify any ELBs that are not being used.
  4. Select the ELB that you want to delete.
  5. Click on the "Actions" button and select "Delete" from the dropdown menu.
  6. In the "Delete Load Balancer" dialog box, confirm that you want to delete the ELB.
  7. Click on the "Yes, Delete" button to remove the ELB from your account.

Alternatively, if you have an ELB with no associated back-end instances, you can register instances to it so that it can be used, rather than deleting it.

By deleting unused Elastic Load Balancers, you can avoid any unnecessary charges on your monthly AWS bill.

Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.