aws-cis-controls-assessment 1.0.10__tar.gz → 1.1.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {aws_cis_controls_assessment-1.0.10/aws_cis_controls_assessment.egg-info → aws_cis_controls_assessment-1.1.0}/PKG-INFO +160 -52
- aws_cis_controls_assessment-1.1.0/README.md +347 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/__init__.py +2 -2
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/config/rules/cis_controls_ig1.yaml +1 -1
- aws_cis_controls_assessment-1.1.0/aws_cis_assessment/config/rules/cis_controls_ig2.yaml +1091 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/__init__.py +62 -1
- aws_cis_controls_assessment-1.1.0/aws_cis_assessment/controls/ig2/control_4_5_6_access_configuration.py +2638 -0
- aws_cis_controls_assessment-1.1.0/aws_cis_assessment/controls/ig2/control_8_audit_logging.py +984 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/assessment_engine.py +54 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/html_reporter.py +197 -35
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0/aws_cis_controls_assessment.egg-info}/PKG-INFO +160 -52
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/SOURCES.txt +2 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/cli-reference.md +1 -1
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/config-rule-mappings.md +423 -6
- aws_cis_controls_assessment-1.0.10/README.md +0 -239
- aws_cis_controls_assessment-1.0.10/aws_cis_assessment/config/rules/cis_controls_ig2.yaml +0 -494
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/LICENSE +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/MANIFEST.in +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/cli/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/cli/examples.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/cli/main.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/cli/utils.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/config/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/config/config_loader.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/config/rules/cis_controls_ig3.yaml +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/base_control.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_1_1.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_2_2.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_3_3.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_3_4.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_4_1.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_access_keys.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_advanced_security.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_aws_backup_service.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_backup_recovery.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_cloudtrail_logging.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_critical_security.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_data_protection.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_iam_advanced.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_iam_governance.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_iam_policies.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_instance_optimization.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_network_enhancements.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_network_security.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_s3_enhancements.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_s3_security.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_vpc_security.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_3_10.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_3_11.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_5_2.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_advanced_encryption.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_aws_backup_ig2.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_codebuild_security.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_encryption_rest.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_encryption_transit.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_network_ha.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_remaining_encryption.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_remaining_rules.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_service_logging.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/control_12_8.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/control_13_1.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/control_3_14.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/control_7_1.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/accuracy_validator.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/audit_trail.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/aws_client_factory.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/error_handler.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/models.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/scoring_engine.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/base_reporter.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/csv_reporter.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/json_reporter.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/dependency_links.txt +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/entry_points.txt +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/requires.txt +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/top_level.txt +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/deprecation-package/aws_cis_assessment_deprecated/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/README.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/adding-aws-backup-controls.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/assessment-logic.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/developer-guide.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/dual-scoring-implementation.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/html-report-improvements.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/installation.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/scoring-comparison-aws-config.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/scoring-methodology.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/troubleshooting.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/user-guide.md +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/pyproject.toml +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/pytest.ini +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/requirements.txt +0 -0
- {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/setup.cfg +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: aws-cis-controls-assessment
|
|
3
|
-
Version: 1.0
|
|
3
|
+
Version: 1.1.0
|
|
4
4
|
Summary: Production-ready AWS CIS Controls compliance assessment framework with 145 comprehensive rules
|
|
5
5
|
Author-email: AWS CIS Assessment Team <security@example.com>
|
|
6
6
|
Maintainer-email: AWS CIS Assessment Team <security@example.com>
|
|
@@ -57,20 +57,22 @@ Dynamic: license-file
|
|
|
57
57
|
|
|
58
58
|
# AWS CIS Controls Compliance Assessment Framework
|
|
59
59
|
|
|
60
|
-
A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with
|
|
60
|
+
A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 163 implemented rules (131 CIS Controls + 32 bonus security enhancements).
|
|
61
61
|
|
|
62
62
|
> **Production Status**: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend [AWS Config](https://aws.amazon.com/config/) for ongoing continuous compliance monitoring and automated remediation.
|
|
63
63
|
|
|
64
64
|
## 🎯 Key Features
|
|
65
65
|
|
|
66
|
-
- **✅ Complete Coverage**:
|
|
66
|
+
- **✅ Complete Coverage**: 163 total rules implemented (131 CIS Controls + 32 bonus)
|
|
67
67
|
- **✅ Dual Scoring System**: Both weighted and AWS Config-style scoring methodologies
|
|
68
|
+
- **✅ Enhanced HTML Reports**: Control names, working search, improved remediation display
|
|
68
69
|
- **✅ Enterprise Ready**: Production-tested with enterprise-grade architecture
|
|
69
70
|
- **✅ Performance Optimized**: Handles large-scale assessments efficiently
|
|
70
71
|
- **✅ Multi-Format Reports**: JSON, HTML, and CSV with detailed remediation guidance
|
|
71
72
|
- **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
|
|
72
|
-
- **✅ Bonus Security Rules**: 5 additional security enhancements beyond CIS requirements
|
|
73
73
|
- **✅ AWS Backup Controls**: 6 comprehensive backup infrastructure controls (3 IG1 + 3 IG2)
|
|
74
|
+
- **✅ Audit Logging Controls**: 7 comprehensive audit log management controls (CIS Control 8)
|
|
75
|
+
- **✅ Access & Configuration Controls**: 14 comprehensive identity, access, and secure configuration controls (CIS Controls 4, 5, 6)
|
|
74
76
|
|
|
75
77
|
## 🚀 Quick Start
|
|
76
78
|
|
|
@@ -89,7 +91,7 @@ pip install -e .
|
|
|
89
91
|
### Basic Usage
|
|
90
92
|
|
|
91
93
|
```bash
|
|
92
|
-
# Run complete assessment (all
|
|
94
|
+
# Run complete assessment (all 163 rules) - defaults to us-east-1
|
|
93
95
|
aws-cis-assess assess --aws-profile my-aws-profile
|
|
94
96
|
|
|
95
97
|
# Assess multiple regions
|
|
@@ -117,12 +119,12 @@ aws-cis-assess assess --output-format json
|
|
|
117
119
|
- Data Protection and Encryption (8 rules)
|
|
118
120
|
- Network Security Controls (20 rules)
|
|
119
121
|
- Logging and Monitoring (13 rules)
|
|
120
|
-
- Backup and Recovery (17 rules) - **
|
|
122
|
+
- Backup and Recovery (17 rules) - **6 AWS Backup service controls (3 IG1 + 3 IG2)**
|
|
121
123
|
- Security Services Integration (5 rules)
|
|
122
124
|
- Configuration Management (9 rules)
|
|
123
125
|
- Vulnerability Management (5 rules)
|
|
124
126
|
|
|
125
|
-
### IG2 - Enhanced Security (+
|
|
127
|
+
### IG2 - Enhanced Security (+74 Rules) ✅
|
|
126
128
|
**100% Coverage Achieved**
|
|
127
129
|
- Advanced Encryption at Rest (6 rules)
|
|
128
130
|
- Certificate Management (2 rules)
|
|
@@ -133,7 +135,11 @@ aws-cis-assess assess --output-format json
|
|
|
133
135
|
- Network Segmentation (5 rules)
|
|
134
136
|
- Auto-scaling Security (1 rule)
|
|
135
137
|
- Enhanced Access Controls (8 rules)
|
|
136
|
-
- AWS Backup Advanced Controls (3 rules) - **
|
|
138
|
+
- AWS Backup Advanced Controls (3 rules) - **Vault lock, reporting, restore testing**
|
|
139
|
+
- Audit Log Management (7 rules) - **Control 8 comprehensive logging coverage**
|
|
140
|
+
- Secure Configuration (5 rules) - **Control 4: session duration, security groups, VPC DNS, RDS admin, EC2 least privilege**
|
|
141
|
+
- Account Management (4 rules) - **Control 5: service account docs, admin policies, SSO, inline policies**
|
|
142
|
+
- Access Control Management (5 rules) - **Control 6: Access Analyzer, permission boundaries, SCPs, Cognito MFA, VPN MFA**
|
|
137
143
|
|
|
138
144
|
### IG3 - Advanced Security (+1 Rule) ✅
|
|
139
145
|
**100% Coverage Achieved**
|
|
@@ -141,19 +147,82 @@ aws-cis-assess assess --output-format json
|
|
|
141
147
|
- Critical for preventing application-layer attacks
|
|
142
148
|
- Required for high-security environments
|
|
143
149
|
|
|
144
|
-
### Bonus Security Rules (+
|
|
150
|
+
### Bonus Security Rules (+32 Rules) ✅
|
|
145
151
|
**Additional Value Beyond CIS Requirements**
|
|
146
152
|
- Enhanced logging security (`cloudwatch-log-group-encrypted`)
|
|
147
153
|
- Network security enhancement (`incoming-ssh-disabled`)
|
|
148
154
|
- Data streaming encryption (`kinesis-stream-encrypted`)
|
|
149
155
|
- Network access control (`restricted-incoming-traffic`)
|
|
150
156
|
- Message queue encryption (`sqs-queue-encrypted-kms`)
|
|
157
|
+
- Route 53 DNS query logging (`route53-query-logging-enabled`)
|
|
158
|
+
- Plus 26 additional security enhancements
|
|
159
|
+
- Application Load Balancer access logs (`alb-access-logs-enabled`)
|
|
160
|
+
- CloudFront distribution access logs (`cloudfront-access-logs-enabled`)
|
|
161
|
+
- WAF web ACL logging (`waf-logging-enabled`)
|
|
162
|
+
|
|
163
|
+
### 🔍 CIS Control 8: Audit Log Management (13 Rules)
|
|
164
|
+
**Comprehensive Audit Logging Coverage**
|
|
165
|
+
|
|
166
|
+
Control 8 focuses on collecting, alerting, reviewing, and retaining audit logs of events that could help detect, understand, or recover from an attack. Our implementation provides comprehensive coverage across AWS services:
|
|
167
|
+
|
|
168
|
+
**DNS Query Logging**
|
|
169
|
+
- `route53-query-logging-enabled`: Validates Route 53 hosted zones have query logging enabled to track DNS queries for security investigations
|
|
170
|
+
|
|
171
|
+
**Load Balancer & CDN Logging**
|
|
172
|
+
- `alb-access-logs-enabled`: Ensures Application Load Balancers capture access logs for traffic analysis
|
|
173
|
+
- `elb-logging-enabled`: Validates Classic Load Balancers have access logging enabled
|
|
174
|
+
- `cloudfront-access-logs-enabled`: Ensures CloudFront distributions log content delivery requests
|
|
175
|
+
|
|
176
|
+
**Log Retention & Management**
|
|
177
|
+
- `cloudwatch-log-retention-check`: Validates log groups have appropriate retention periods (minimum 90 days)
|
|
178
|
+
- `cw-loggroup-retention-period-check`: Additional log retention validation
|
|
179
|
+
|
|
180
|
+
**CloudTrail Monitoring**
|
|
181
|
+
- `cloudtrail-insights-enabled`: Enables anomaly detection for unusual API activity
|
|
182
|
+
|
|
183
|
+
**Configuration Tracking**
|
|
184
|
+
- `config-recording-all-resources`: Ensures AWS Config tracks all resource configuration changes
|
|
185
|
+
|
|
186
|
+
**Application Security Logging**
|
|
187
|
+
- `waf-logging-enabled`: Validates WAF web ACLs capture firewall events
|
|
188
|
+
- `wafv2-logging-enabled`: Ensures WAFv2 web ACLs have logging enabled
|
|
189
|
+
|
|
190
|
+
**Database & Service Logging**
|
|
191
|
+
- `rds-logging-enabled`: Validates RDS instances have appropriate logging enabled
|
|
192
|
+
- `elasticsearch-logs-to-cloudwatch`: Ensures Elasticsearch domains send logs to CloudWatch
|
|
193
|
+
- `codebuild-project-logging-enabled`: Validates CodeBuild projects capture build logs
|
|
194
|
+
- `redshift-cluster-configuration-check`: Ensures Redshift clusters have audit logging enabled
|
|
195
|
+
|
|
196
|
+
### 🔐 CIS Controls 4, 5, 6: Access & Configuration Controls (14 Rules)
|
|
197
|
+
**Comprehensive Identity, Access Management, and Secure Configuration Coverage**
|
|
198
|
+
|
|
199
|
+
These controls focus on secure configuration of enterprise assets, account management, and access control management. Our implementation provides comprehensive coverage across AWS IAM, networking, and identity services:
|
|
200
|
+
|
|
201
|
+
**Control 4 - Secure Configuration (5 rules)**
|
|
202
|
+
- `iam-max-session-duration-check`: Validates IAM role session duration does not exceed 12 hours to limit credential exposure
|
|
203
|
+
- `security-group-default-rules-check`: Ensures default security groups have no inbound or outbound rules to prevent unintended access
|
|
204
|
+
- `vpc-dns-resolution-enabled`: Validates VPC DNS settings (enableDnsHostnames and enableDnsSupport) are properly configured
|
|
205
|
+
- `rds-default-admin-check`: Ensures RDS instances don't use default admin usernames (postgres, admin, root, mysql, administrator)
|
|
206
|
+
- `ec2-instance-profile-least-privilege`: Validates EC2 instance profile permissions follow least privilege principles
|
|
207
|
+
|
|
208
|
+
**Control 5 - Account Management (4 rules)**
|
|
209
|
+
- `iam-service-account-inventory-check`: Validates service accounts have required documentation tags (Purpose, Owner, LastReviewed)
|
|
210
|
+
- `iam-admin-policy-attached-to-role-check`: Ensures administrative policies are attached to roles, not directly to users
|
|
211
|
+
- `sso-enabled-check`: Validates AWS IAM Identity Center is configured and enabled for centralized identity management
|
|
212
|
+
- `iam-user-no-inline-policies`: Ensures IAM users don't have inline policies (only managed policies or group memberships)
|
|
213
|
+
|
|
214
|
+
**Control 6 - Access Control Management (5 rules)**
|
|
215
|
+
- `iam-access-analyzer-enabled`: Validates IAM Access Analyzer is enabled in all active regions for external access detection
|
|
216
|
+
- `iam-permission-boundaries-check`: Ensures permission boundaries are configured for roles with elevated privileges
|
|
217
|
+
- `organizations-scp-enabled-check`: Validates AWS Organizations Service Control Policies are enabled and in use
|
|
218
|
+
- `cognito-user-pool-mfa-enabled`: Ensures Cognito user pools have MFA enabled for enhanced authentication security
|
|
219
|
+
- `vpn-connection-mfa-enabled`: Validates Client VPN endpoints require MFA authentication
|
|
151
220
|
|
|
152
221
|
## 🏗️ Production Architecture
|
|
153
222
|
|
|
154
223
|
### Core Components
|
|
155
224
|
- **Assessment Engine**: Orchestrates compliance evaluations across all AWS regions
|
|
156
|
-
- **Control Assessments**:
|
|
225
|
+
- **Control Assessments**: 149 individual rule implementations with robust error handling
|
|
157
226
|
- **Scoring Engine**: Calculates compliance scores and generates executive metrics
|
|
158
227
|
- **Reporting System**: Multi-format output with detailed remediation guidance
|
|
159
228
|
- **Resource Management**: Optimized for enterprise-scale deployments with memory management
|
|
@@ -249,48 +318,87 @@ MIT License - see [LICENSE](LICENSE) file for details.
|
|
|
249
318
|
|
|
250
319
|
---
|
|
251
320
|
|
|
252
|
-
**Framework Version**: 1.0
|
|
253
|
-
**CIS Controls Coverage**:
|
|
321
|
+
**Framework Version**: 1.1.0 (in development)
|
|
322
|
+
**CIS Controls Coverage**: 151/151 rules (100%) + 9 bonus rules
|
|
254
323
|
**Production Status**: ✅ Ready for immediate enterprise deployment
|
|
255
324
|
**Last Updated**: January 2026
|
|
256
325
|
|
|
257
|
-
## 🆕 What's New in Version 1.0
|
|
258
|
-
|
|
259
|
-
###
|
|
260
|
-
|
|
261
|
-
|
|
262
|
-
**
|
|
263
|
-
1. **
|
|
264
|
-
- Ensures
|
|
265
|
-
-
|
|
266
|
-
-
|
|
267
|
-
|
|
268
|
-
|
|
269
|
-
|
|
270
|
-
-
|
|
271
|
-
-
|
|
272
|
-
|
|
273
|
-
|
|
274
|
-
|
|
275
|
-
|
|
276
|
-
-
|
|
277
|
-
|
|
278
|
-
|
|
279
|
-
|
|
280
|
-
|
|
281
|
-
|
|
282
|
-
|
|
283
|
-
|
|
284
|
-
- Checks
|
|
285
|
-
|
|
286
|
-
|
|
287
|
-
|
|
288
|
-
|
|
289
|
-
|
|
290
|
-
|
|
291
|
-
|
|
292
|
-
-
|
|
293
|
-
|
|
294
|
-
|
|
295
|
-
|
|
296
|
-
|
|
326
|
+
## 🆕 What's New in Version 1.1.0
|
|
327
|
+
|
|
328
|
+
### Access & Configuration Controls (CIS Controls 4, 5, 6)
|
|
329
|
+
Fourteen new controls added to assess identity, access management, and secure configuration:
|
|
330
|
+
|
|
331
|
+
**Control 4 - Secure Configuration (5 rules)**:
|
|
332
|
+
1. **iam-max-session-duration-check** - Validates IAM role session duration does not exceed 12 hours
|
|
333
|
+
- Ensures temporary credentials have limited exposure window
|
|
334
|
+
- Checks MaxSessionDuration property on all IAM roles
|
|
335
|
+
- Compliant if session duration ≤ 43200 seconds (12 hours)
|
|
336
|
+
|
|
337
|
+
2. **security-group-default-rules-check** - Ensures default security groups have no rules
|
|
338
|
+
- Validates default security groups are restricted (no inbound/outbound rules)
|
|
339
|
+
- Prevents unintended access through default security groups
|
|
340
|
+
- Encourages use of custom security groups with explicit rules
|
|
341
|
+
|
|
342
|
+
3. **vpc-dns-resolution-enabled** - Validates VPC DNS configuration
|
|
343
|
+
- Checks both enableDnsHostnames and enableDnsSupport are enabled
|
|
344
|
+
- Ensures proper DNS resolution within VPCs
|
|
345
|
+
- Required for many AWS services to function correctly
|
|
346
|
+
|
|
347
|
+
4. **rds-default-admin-check** - Ensures RDS instances don't use default admin usernames
|
|
348
|
+
- Detects default usernames: postgres, admin, root, mysql, administrator, sa
|
|
349
|
+
- Case-insensitive detection
|
|
350
|
+
- Reduces risk of credential guessing attacks
|
|
351
|
+
|
|
352
|
+
5. **ec2-instance-profile-least-privilege** - Validates EC2 instance profile permissions
|
|
353
|
+
- Checks for overly permissive policies (AdministratorAccess, PowerUserAccess)
|
|
354
|
+
- Detects wildcard permissions (Action: "*", Resource: "*")
|
|
355
|
+
- Ensures least privilege principle for EC2 workloads
|
|
356
|
+
|
|
357
|
+
**Control 5 - Account Management (4 rules)**:
|
|
358
|
+
6. **iam-service-account-inventory-check** - Validates service account documentation
|
|
359
|
+
- Ensures service accounts have required tags: Purpose, Owner, LastReviewed
|
|
360
|
+
- Identifies service accounts by naming convention or tags
|
|
361
|
+
- Supports compliance and access review processes
|
|
362
|
+
|
|
363
|
+
7. **iam-admin-policy-attached-to-role-check** - Ensures admin policies on roles, not users
|
|
364
|
+
- Detects administrative policies attached directly to IAM users
|
|
365
|
+
- Encourages role-based access with temporary credentials
|
|
366
|
+
- Improves audit trail and access management
|
|
367
|
+
|
|
368
|
+
8. **sso-enabled-check** - Validates AWS IAM Identity Center (SSO) is configured
|
|
369
|
+
- Checks for SSO instance existence
|
|
370
|
+
- Encourages centralized identity management
|
|
371
|
+
- Supports integration with corporate identity providers
|
|
372
|
+
|
|
373
|
+
9. **iam-user-no-inline-policies** - Ensures IAM users don't have inline policies
|
|
374
|
+
- Detects inline policies attached to users
|
|
375
|
+
- Encourages use of managed policies for reusability
|
|
376
|
+
- Simplifies policy management and auditing
|
|
377
|
+
|
|
378
|
+
**Control 6 - Access Control Management (5 rules)**:
|
|
379
|
+
10. **iam-access-analyzer-enabled** - Validates Access Analyzer in all regions
|
|
380
|
+
- Ensures IAM Access Analyzer is enabled regionally
|
|
381
|
+
- Detects resources shared with external entities
|
|
382
|
+
- Provides continuous monitoring for unintended access
|
|
383
|
+
|
|
384
|
+
11. **iam-permission-boundaries-check** - Validates permission boundaries for elevated roles
|
|
385
|
+
- Identifies roles with elevated privileges
|
|
386
|
+
- Checks for permission boundary configuration
|
|
387
|
+
- Prevents privilege escalation in delegated administration
|
|
388
|
+
|
|
389
|
+
12. **organizations-scp-enabled-check** - Validates Service Control Policies are in use
|
|
390
|
+
- Checks account is part of AWS Organizations
|
|
391
|
+
- Verifies SCPs are enabled (FeatureSet includes ALL)
|
|
392
|
+
- Ensures custom SCPs exist beyond default FullAWSAccess
|
|
393
|
+
|
|
394
|
+
13. **cognito-user-pool-mfa-enabled** - Ensures Cognito user pools have MFA
|
|
395
|
+
- Validates MfaConfiguration is 'ON' or 'OPTIONAL'
|
|
396
|
+
- Supports both SMS and TOTP authentication methods
|
|
397
|
+
- Enhances authentication security for applications
|
|
398
|
+
|
|
399
|
+
14. **vpn-connection-mfa-enabled** - Validates Client VPN endpoints require MFA
|
|
400
|
+
- Checks VPN authentication options for MFA requirement
|
|
401
|
+
- Supports Active Directory, SAML, and certificate-based MFA
|
|
402
|
+
- Ensures secure remote access to AWS resources
|
|
403
|
+
|
|
404
|
+
These controls complement the existing audit logging and backup controls by providing comprehensive coverage of identity, access management, and secure configuration practices. Total rules: 163 (149 previous + 14 new). See [Config Rule Mappings](docs/config-rule-mappings.md) for detailed documentation.
|
|
@@ -0,0 +1,347 @@
|
|
|
1
|
+
# AWS CIS Controls Compliance Assessment Framework
|
|
2
|
+
|
|
3
|
+
A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 163 implemented rules (131 CIS Controls + 32 bonus security enhancements).
|
|
4
|
+
|
|
5
|
+
> **Production Status**: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend [AWS Config](https://aws.amazon.com/config/) for ongoing continuous compliance monitoring and automated remediation.
|
|
6
|
+
|
|
7
|
+
## 🎯 Key Features
|
|
8
|
+
|
|
9
|
+
- **✅ Complete Coverage**: 163 total rules implemented (131 CIS Controls + 32 bonus)
|
|
10
|
+
- **✅ Dual Scoring System**: Both weighted and AWS Config-style scoring methodologies
|
|
11
|
+
- **✅ Enhanced HTML Reports**: Control names, working search, improved remediation display
|
|
12
|
+
- **✅ Enterprise Ready**: Production-tested with enterprise-grade architecture
|
|
13
|
+
- **✅ Performance Optimized**: Handles large-scale assessments efficiently
|
|
14
|
+
- **✅ Multi-Format Reports**: JSON, HTML, and CSV with detailed remediation guidance
|
|
15
|
+
- **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
|
|
16
|
+
- **✅ AWS Backup Controls**: 6 comprehensive backup infrastructure controls (3 IG1 + 3 IG2)
|
|
17
|
+
- **✅ Audit Logging Controls**: 7 comprehensive audit log management controls (CIS Control 8)
|
|
18
|
+
- **✅ Access & Configuration Controls**: 14 comprehensive identity, access, and secure configuration controls (CIS Controls 4, 5, 6)
|
|
19
|
+
|
|
20
|
+
## 🚀 Quick Start
|
|
21
|
+
|
|
22
|
+
### Installation
|
|
23
|
+
|
|
24
|
+
```bash
|
|
25
|
+
# Install from PyPI (production-ready)
|
|
26
|
+
pip install aws-cis-controls-assessment
|
|
27
|
+
|
|
28
|
+
# Or install from source for development
|
|
29
|
+
git clone <repository-url>
|
|
30
|
+
cd aws-cis-controls-assessment
|
|
31
|
+
pip install -e .
|
|
32
|
+
```
|
|
33
|
+
|
|
34
|
+
### Basic Usage
|
|
35
|
+
|
|
36
|
+
```bash
|
|
37
|
+
# Run complete assessment (all 163 rules) - defaults to us-east-1
|
|
38
|
+
aws-cis-assess assess --aws-profile my-aws-profile
|
|
39
|
+
|
|
40
|
+
# Assess multiple regions
|
|
41
|
+
aws-cis-assess assess --aws-profile my-aws-profile --regions us-east-1,us-west-2
|
|
42
|
+
|
|
43
|
+
# Assess specific Implementation Group using short flag (defaults to us-east-1)
|
|
44
|
+
aws-cis-assess assess -p my-aws-profile --implementation-groups IG1 --output-format json
|
|
45
|
+
|
|
46
|
+
# Generate comprehensive HTML report (defaults to us-east-1)
|
|
47
|
+
aws-cis-assess assess --aws-profile production --output-format html --output-file compliance-report.html
|
|
48
|
+
|
|
49
|
+
# Enterprise multi-region assessment with multiple formats
|
|
50
|
+
aws-cis-assess assess -p security-audit --implementation-groups IG1,IG2,IG3 --regions all --output-format html,json --output-dir ./reports/
|
|
51
|
+
|
|
52
|
+
# Quick assessment with default profile and default region (us-east-1)
|
|
53
|
+
aws-cis-assess assess --output-format json
|
|
54
|
+
```
|
|
55
|
+
|
|
56
|
+
## 📊 Implementation Groups Coverage
|
|
57
|
+
|
|
58
|
+
### IG1 - Essential Cyber Hygiene (96 Rules) ✅
|
|
59
|
+
**100% Coverage Achieved**
|
|
60
|
+
- Asset Inventory and Management (6 rules)
|
|
61
|
+
- Identity and Access Management (15 rules)
|
|
62
|
+
- Data Protection and Encryption (8 rules)
|
|
63
|
+
- Network Security Controls (20 rules)
|
|
64
|
+
- Logging and Monitoring (13 rules)
|
|
65
|
+
- Backup and Recovery (17 rules) - **6 AWS Backup service controls (3 IG1 + 3 IG2)**
|
|
66
|
+
- Security Services Integration (5 rules)
|
|
67
|
+
- Configuration Management (9 rules)
|
|
68
|
+
- Vulnerability Management (5 rules)
|
|
69
|
+
|
|
70
|
+
### IG2 - Enhanced Security (+74 Rules) ✅
|
|
71
|
+
**100% Coverage Achieved**
|
|
72
|
+
- Advanced Encryption at Rest (6 rules)
|
|
73
|
+
- Certificate Management (2 rules)
|
|
74
|
+
- Network High Availability (7 rules)
|
|
75
|
+
- Enhanced Monitoring (3 rules)
|
|
76
|
+
- CodeBuild Security (4 rules)
|
|
77
|
+
- Vulnerability Scanning (1 rule)
|
|
78
|
+
- Network Segmentation (5 rules)
|
|
79
|
+
- Auto-scaling Security (1 rule)
|
|
80
|
+
- Enhanced Access Controls (8 rules)
|
|
81
|
+
- AWS Backup Advanced Controls (3 rules) - **Vault lock, reporting, restore testing**
|
|
82
|
+
- Audit Log Management (7 rules) - **Control 8 comprehensive logging coverage**
|
|
83
|
+
- Secure Configuration (5 rules) - **Control 4: session duration, security groups, VPC DNS, RDS admin, EC2 least privilege**
|
|
84
|
+
- Account Management (4 rules) - **Control 5: service account docs, admin policies, SSO, inline policies**
|
|
85
|
+
- Access Control Management (5 rules) - **Control 6: Access Analyzer, permission boundaries, SCPs, Cognito MFA, VPN MFA**
|
|
86
|
+
|
|
87
|
+
### IG3 - Advanced Security (+1 Rule) ✅
|
|
88
|
+
**100% Coverage Achieved**
|
|
89
|
+
- API Gateway WAF Integration (1 rule)
|
|
90
|
+
- Critical for preventing application-layer attacks
|
|
91
|
+
- Required for high-security environments
|
|
92
|
+
|
|
93
|
+
### Bonus Security Rules (+32 Rules) ✅
|
|
94
|
+
**Additional Value Beyond CIS Requirements**
|
|
95
|
+
- Enhanced logging security (`cloudwatch-log-group-encrypted`)
|
|
96
|
+
- Network security enhancement (`incoming-ssh-disabled`)
|
|
97
|
+
- Data streaming encryption (`kinesis-stream-encrypted`)
|
|
98
|
+
- Network access control (`restricted-incoming-traffic`)
|
|
99
|
+
- Message queue encryption (`sqs-queue-encrypted-kms`)
|
|
100
|
+
- Route 53 DNS query logging (`route53-query-logging-enabled`)
|
|
101
|
+
- Plus 26 additional security enhancements
|
|
102
|
+
- Application Load Balancer access logs (`alb-access-logs-enabled`)
|
|
103
|
+
- CloudFront distribution access logs (`cloudfront-access-logs-enabled`)
|
|
104
|
+
- WAF web ACL logging (`waf-logging-enabled`)
|
|
105
|
+
|
|
106
|
+
### 🔍 CIS Control 8: Audit Log Management (13 Rules)
|
|
107
|
+
**Comprehensive Audit Logging Coverage**
|
|
108
|
+
|
|
109
|
+
Control 8 focuses on collecting, alerting, reviewing, and retaining audit logs of events that could help detect, understand, or recover from an attack. Our implementation provides comprehensive coverage across AWS services:
|
|
110
|
+
|
|
111
|
+
**DNS Query Logging**
|
|
112
|
+
- `route53-query-logging-enabled`: Validates Route 53 hosted zones have query logging enabled to track DNS queries for security investigations
|
|
113
|
+
|
|
114
|
+
**Load Balancer & CDN Logging**
|
|
115
|
+
- `alb-access-logs-enabled`: Ensures Application Load Balancers capture access logs for traffic analysis
|
|
116
|
+
- `elb-logging-enabled`: Validates Classic Load Balancers have access logging enabled
|
|
117
|
+
- `cloudfront-access-logs-enabled`: Ensures CloudFront distributions log content delivery requests
|
|
118
|
+
|
|
119
|
+
**Log Retention & Management**
|
|
120
|
+
- `cloudwatch-log-retention-check`: Validates log groups have appropriate retention periods (minimum 90 days)
|
|
121
|
+
- `cw-loggroup-retention-period-check`: Additional log retention validation
|
|
122
|
+
|
|
123
|
+
**CloudTrail Monitoring**
|
|
124
|
+
- `cloudtrail-insights-enabled`: Enables anomaly detection for unusual API activity
|
|
125
|
+
|
|
126
|
+
**Configuration Tracking**
|
|
127
|
+
- `config-recording-all-resources`: Ensures AWS Config tracks all resource configuration changes
|
|
128
|
+
|
|
129
|
+
**Application Security Logging**
|
|
130
|
+
- `waf-logging-enabled`: Validates WAF web ACLs capture firewall events
|
|
131
|
+
- `wafv2-logging-enabled`: Ensures WAFv2 web ACLs have logging enabled
|
|
132
|
+
|
|
133
|
+
**Database & Service Logging**
|
|
134
|
+
- `rds-logging-enabled`: Validates RDS instances have appropriate logging enabled
|
|
135
|
+
- `elasticsearch-logs-to-cloudwatch`: Ensures Elasticsearch domains send logs to CloudWatch
|
|
136
|
+
- `codebuild-project-logging-enabled`: Validates CodeBuild projects capture build logs
|
|
137
|
+
- `redshift-cluster-configuration-check`: Ensures Redshift clusters have audit logging enabled
|
|
138
|
+
|
|
139
|
+
### 🔐 CIS Controls 4, 5, 6: Access & Configuration Controls (14 Rules)
|
|
140
|
+
**Comprehensive Identity, Access Management, and Secure Configuration Coverage**
|
|
141
|
+
|
|
142
|
+
These controls focus on secure configuration of enterprise assets, account management, and access control management. Our implementation provides comprehensive coverage across AWS IAM, networking, and identity services:
|
|
143
|
+
|
|
144
|
+
**Control 4 - Secure Configuration (5 rules)**
|
|
145
|
+
- `iam-max-session-duration-check`: Validates IAM role session duration does not exceed 12 hours to limit credential exposure
|
|
146
|
+
- `security-group-default-rules-check`: Ensures default security groups have no inbound or outbound rules to prevent unintended access
|
|
147
|
+
- `vpc-dns-resolution-enabled`: Validates VPC DNS settings (enableDnsHostnames and enableDnsSupport) are properly configured
|
|
148
|
+
- `rds-default-admin-check`: Ensures RDS instances don't use default admin usernames (postgres, admin, root, mysql, administrator)
|
|
149
|
+
- `ec2-instance-profile-least-privilege`: Validates EC2 instance profile permissions follow least privilege principles
|
|
150
|
+
|
|
151
|
+
**Control 5 - Account Management (4 rules)**
|
|
152
|
+
- `iam-service-account-inventory-check`: Validates service accounts have required documentation tags (Purpose, Owner, LastReviewed)
|
|
153
|
+
- `iam-admin-policy-attached-to-role-check`: Ensures administrative policies are attached to roles, not directly to users
|
|
154
|
+
- `sso-enabled-check`: Validates AWS IAM Identity Center is configured and enabled for centralized identity management
|
|
155
|
+
- `iam-user-no-inline-policies`: Ensures IAM users don't have inline policies (only managed policies or group memberships)
|
|
156
|
+
|
|
157
|
+
**Control 6 - Access Control Management (5 rules)**
|
|
158
|
+
- `iam-access-analyzer-enabled`: Validates IAM Access Analyzer is enabled in all active regions for external access detection
|
|
159
|
+
- `iam-permission-boundaries-check`: Ensures permission boundaries are configured for roles with elevated privileges
|
|
160
|
+
- `organizations-scp-enabled-check`: Validates AWS Organizations Service Control Policies are enabled and in use
|
|
161
|
+
- `cognito-user-pool-mfa-enabled`: Ensures Cognito user pools have MFA enabled for enhanced authentication security
|
|
162
|
+
- `vpn-connection-mfa-enabled`: Validates Client VPN endpoints require MFA authentication
|
|
163
|
+
|
|
164
|
+
## 🏗️ Production Architecture
|
|
165
|
+
|
|
166
|
+
### Core Components
|
|
167
|
+
- **Assessment Engine**: Orchestrates compliance evaluations across all AWS regions
|
|
168
|
+
- **Control Assessments**: 149 individual rule implementations with robust error handling
|
|
169
|
+
- **Scoring Engine**: Calculates compliance scores and generates executive metrics
|
|
170
|
+
- **Reporting System**: Multi-format output with detailed remediation guidance
|
|
171
|
+
- **Resource Management**: Optimized for enterprise-scale deployments with memory management
|
|
172
|
+
|
|
173
|
+
### Enterprise Features
|
|
174
|
+
- **Multi-threading**: Parallel execution for improved performance
|
|
175
|
+
- **Error Recovery**: Comprehensive error handling and retry mechanisms
|
|
176
|
+
- **Audit Trail**: Complete compliance audit and logging capabilities
|
|
177
|
+
- **Resource Monitoring**: Real-time performance and resource usage tracking
|
|
178
|
+
- **Scalable Architecture**: Handles assessments across hundreds of AWS accounts
|
|
179
|
+
|
|
180
|
+
## 📋 Requirements
|
|
181
|
+
|
|
182
|
+
- **Python**: 3.8+ (production tested on 3.8, 3.9, 3.10, 3.11)
|
|
183
|
+
- **AWS Credentials**: Configured via AWS CLI, environment variables, or IAM roles
|
|
184
|
+
- **Permissions**: Read-only access to AWS services being assessed
|
|
185
|
+
- **Memory**: Minimum 2GB RAM for large-scale assessments
|
|
186
|
+
- **Network**: Internet access for AWS API calls
|
|
187
|
+
- **Default Region**: Assessments default to `us-east-1` unless `--regions` is specified
|
|
188
|
+
|
|
189
|
+
## 📈 Business Value
|
|
190
|
+
|
|
191
|
+
### Immediate Benefits
|
|
192
|
+
- **Compliance Readiness**: Instant CIS Controls compliance assessment
|
|
193
|
+
- **Risk Reduction**: Identify and prioritize security vulnerabilities
|
|
194
|
+
- **Audit Support**: Generate comprehensive compliance reports
|
|
195
|
+
- **Cost Optimization**: Identify misconfigured and unused resources
|
|
196
|
+
- **Operational Efficiency**: Automate manual compliance checking
|
|
197
|
+
|
|
198
|
+
### Long-term Value
|
|
199
|
+
- **Continuous Improvement**: Track compliance posture over time
|
|
200
|
+
- **Regulatory Compliance**: Support for multiple compliance frameworks
|
|
201
|
+
- **Security Automation**: Foundation for automated remediation
|
|
202
|
+
- **Enterprise Integration**: Integrate with existing security tools
|
|
203
|
+
- **Future-Proof**: Extensible architecture for evolving requirements
|
|
204
|
+
|
|
205
|
+
## 🛡️ Security & Compliance
|
|
206
|
+
|
|
207
|
+
### Security Features
|
|
208
|
+
- **Read-Only Access**: Framework requires only read permissions
|
|
209
|
+
- **No Data Storage**: No sensitive data stored or transmitted
|
|
210
|
+
- **Audit Logging**: Complete audit trail of all assessments
|
|
211
|
+
- **Error Handling**: Secure error handling without data leakage
|
|
212
|
+
|
|
213
|
+
### Compliance Support
|
|
214
|
+
- **CIS Controls**: 100% coverage of Implementation Groups 1, 2, and 3
|
|
215
|
+
- **AWS Well-Architected**: Aligned with security pillar best practices
|
|
216
|
+
- **Industry Standards**: Supports SOC 2, NIST, ISO 27001 mapping
|
|
217
|
+
- **Regulatory Requirements**: HIPAA, PCI DSS, FedRAMP compatible
|
|
218
|
+
- **Custom Frameworks**: Extensible for organization-specific requirements
|
|
219
|
+
|
|
220
|
+
## 📚 Documentation
|
|
221
|
+
|
|
222
|
+
### Core Documentation
|
|
223
|
+
- **[Installation Guide](docs/installation.md)**: Detailed installation instructions and requirements
|
|
224
|
+
- **[User Guide](docs/user-guide.md)**: Comprehensive user manual and best practices
|
|
225
|
+
- **[CLI Reference](docs/cli-reference.md)**: Complete command-line interface documentation
|
|
226
|
+
- **[Dual Scoring Guide](docs/dual-scoring-implementation.md)**: Weighted vs AWS Config scoring methodologies
|
|
227
|
+
- **[Scoring Methodology](docs/scoring-methodology.md)**: Detailed explanation of weighted scoring
|
|
228
|
+
- **[AWS Config Comparison](docs/scoring-comparison-aws-config.md)**: Comparison with AWS Config approach
|
|
229
|
+
- **[Troubleshooting Guide](docs/troubleshooting.md)**: Common issues and solutions
|
|
230
|
+
- **[Developer Guide](docs/developer-guide.md)**: Development and contribution guidelines
|
|
231
|
+
|
|
232
|
+
### Technical Documentation
|
|
233
|
+
- **[Assessment Logic](docs/assessment-logic.md)**: How compliance assessments work
|
|
234
|
+
- **[Config Rule Mappings](docs/config-rule-mappings.md)**: CIS Controls to AWS Config rule mappings
|
|
235
|
+
- **[HTML Report Improvements](docs/html-report-improvements.md)**: Enhanced HTML report features and customization
|
|
236
|
+
|
|
237
|
+
## 🤝 Support & Community
|
|
238
|
+
|
|
239
|
+
### Getting Help
|
|
240
|
+
- **Documentation**: Comprehensive guides and API documentation
|
|
241
|
+
- **GitHub Issues**: Bug reports and feature requests
|
|
242
|
+
- **Enterprise Support**: Commercial support available for enterprise deployments
|
|
243
|
+
|
|
244
|
+
### Contributing
|
|
245
|
+
- **Code Contributions**: Pull requests welcome with comprehensive tests
|
|
246
|
+
- **Documentation**: Help improve documentation and examples
|
|
247
|
+
- **Bug Reports**: Detailed bug reports with reproduction steps
|
|
248
|
+
- **Feature Requests**: Enhancement suggestions with business justification
|
|
249
|
+
|
|
250
|
+
## 📄 License
|
|
251
|
+
|
|
252
|
+
MIT License - see [LICENSE](LICENSE) file for details.
|
|
253
|
+
|
|
254
|
+
## 🏆 Project Status
|
|
255
|
+
|
|
256
|
+
**✅ Production Ready**: Complete implementation with 100% CIS Controls coverage
|
|
257
|
+
**✅ Enterprise Deployed**: Actively used in production environments
|
|
258
|
+
**✅ Continuously Maintained**: Regular updates and security patches
|
|
259
|
+
**✅ Community Supported**: Active development and community contributions
|
|
260
|
+
**✅ Future-Proof**: Extensible architecture for evolving requirements
|
|
261
|
+
|
|
262
|
+
---
|
|
263
|
+
|
|
264
|
+
**Framework Version**: 1.1.0 (in development)
|
|
265
|
+
**CIS Controls Coverage**: 151/151 rules (100%) + 9 bonus rules
|
|
266
|
+
**Production Status**: ✅ Ready for immediate enterprise deployment
|
|
267
|
+
**Last Updated**: January 2026
|
|
268
|
+
|
|
269
|
+
## 🆕 What's New in Version 1.1.0
|
|
270
|
+
|
|
271
|
+
### Access & Configuration Controls (CIS Controls 4, 5, 6)
|
|
272
|
+
Fourteen new controls added to assess identity, access management, and secure configuration:
|
|
273
|
+
|
|
274
|
+
**Control 4 - Secure Configuration (5 rules)**:
|
|
275
|
+
1. **iam-max-session-duration-check** - Validates IAM role session duration does not exceed 12 hours
|
|
276
|
+
- Ensures temporary credentials have limited exposure window
|
|
277
|
+
- Checks MaxSessionDuration property on all IAM roles
|
|
278
|
+
- Compliant if session duration ≤ 43200 seconds (12 hours)
|
|
279
|
+
|
|
280
|
+
2. **security-group-default-rules-check** - Ensures default security groups have no rules
|
|
281
|
+
- Validates default security groups are restricted (no inbound/outbound rules)
|
|
282
|
+
- Prevents unintended access through default security groups
|
|
283
|
+
- Encourages use of custom security groups with explicit rules
|
|
284
|
+
|
|
285
|
+
3. **vpc-dns-resolution-enabled** - Validates VPC DNS configuration
|
|
286
|
+
- Checks both enableDnsHostnames and enableDnsSupport are enabled
|
|
287
|
+
- Ensures proper DNS resolution within VPCs
|
|
288
|
+
- Required for many AWS services to function correctly
|
|
289
|
+
|
|
290
|
+
4. **rds-default-admin-check** - Ensures RDS instances don't use default admin usernames
|
|
291
|
+
- Detects default usernames: postgres, admin, root, mysql, administrator, sa
|
|
292
|
+
- Case-insensitive detection
|
|
293
|
+
- Reduces risk of credential guessing attacks
|
|
294
|
+
|
|
295
|
+
5. **ec2-instance-profile-least-privilege** - Validates EC2 instance profile permissions
|
|
296
|
+
- Checks for overly permissive policies (AdministratorAccess, PowerUserAccess)
|
|
297
|
+
- Detects wildcard permissions (Action: "*", Resource: "*")
|
|
298
|
+
- Ensures least privilege principle for EC2 workloads
|
|
299
|
+
|
|
300
|
+
**Control 5 - Account Management (4 rules)**:
|
|
301
|
+
6. **iam-service-account-inventory-check** - Validates service account documentation
|
|
302
|
+
- Ensures service accounts have required tags: Purpose, Owner, LastReviewed
|
|
303
|
+
- Identifies service accounts by naming convention or tags
|
|
304
|
+
- Supports compliance and access review processes
|
|
305
|
+
|
|
306
|
+
7. **iam-admin-policy-attached-to-role-check** - Ensures admin policies on roles, not users
|
|
307
|
+
- Detects administrative policies attached directly to IAM users
|
|
308
|
+
- Encourages role-based access with temporary credentials
|
|
309
|
+
- Improves audit trail and access management
|
|
310
|
+
|
|
311
|
+
8. **sso-enabled-check** - Validates AWS IAM Identity Center (SSO) is configured
|
|
312
|
+
- Checks for SSO instance existence
|
|
313
|
+
- Encourages centralized identity management
|
|
314
|
+
- Supports integration with corporate identity providers
|
|
315
|
+
|
|
316
|
+
9. **iam-user-no-inline-policies** - Ensures IAM users don't have inline policies
|
|
317
|
+
- Detects inline policies attached to users
|
|
318
|
+
- Encourages use of managed policies for reusability
|
|
319
|
+
- Simplifies policy management and auditing
|
|
320
|
+
|
|
321
|
+
**Control 6 - Access Control Management (5 rules)**:
|
|
322
|
+
10. **iam-access-analyzer-enabled** - Validates Access Analyzer in all regions
|
|
323
|
+
- Ensures IAM Access Analyzer is enabled regionally
|
|
324
|
+
- Detects resources shared with external entities
|
|
325
|
+
- Provides continuous monitoring for unintended access
|
|
326
|
+
|
|
327
|
+
11. **iam-permission-boundaries-check** - Validates permission boundaries for elevated roles
|
|
328
|
+
- Identifies roles with elevated privileges
|
|
329
|
+
- Checks for permission boundary configuration
|
|
330
|
+
- Prevents privilege escalation in delegated administration
|
|
331
|
+
|
|
332
|
+
12. **organizations-scp-enabled-check** - Validates Service Control Policies are in use
|
|
333
|
+
- Checks account is part of AWS Organizations
|
|
334
|
+
- Verifies SCPs are enabled (FeatureSet includes ALL)
|
|
335
|
+
- Ensures custom SCPs exist beyond default FullAWSAccess
|
|
336
|
+
|
|
337
|
+
13. **cognito-user-pool-mfa-enabled** - Ensures Cognito user pools have MFA
|
|
338
|
+
- Validates MfaConfiguration is 'ON' or 'OPTIONAL'
|
|
339
|
+
- Supports both SMS and TOTP authentication methods
|
|
340
|
+
- Enhances authentication security for applications
|
|
341
|
+
|
|
342
|
+
14. **vpn-connection-mfa-enabled** - Validates Client VPN endpoints require MFA
|
|
343
|
+
- Checks VPN authentication options for MFA requirement
|
|
344
|
+
- Supports Active Directory, SAML, and certificate-based MFA
|
|
345
|
+
- Ensures secure remote access to AWS resources
|
|
346
|
+
|
|
347
|
+
These controls complement the existing audit logging and backup controls by providing comprehensive coverage of identity, access management, and secure configuration practices. Total rules: 163 (149 previous + 14 new). See [Config Rule Mappings](docs/config-rule-mappings.md) for detailed documentation.
|
|
@@ -2,10 +2,10 @@
|
|
|
2
2
|
AWS CIS Controls Compliance Assessment Framework
|
|
3
3
|
|
|
4
4
|
A production-ready, enterprise-grade framework for evaluating AWS account configurations against
|
|
5
|
-
CIS Controls Implementation Groups (IG1, IG2, IG3). Implements
|
|
5
|
+
CIS Controls Implementation Groups (IG1, IG2, IG3). Implements 163 comprehensive AWS Config rules
|
|
6
6
|
across all implementation groups for complete security compliance assessment.
|
|
7
7
|
"""
|
|
8
8
|
|
|
9
|
-
__version__ = "1.0
|
|
9
|
+
__version__ = "1.1.0"
|
|
10
10
|
__author__ = "AWS CIS Assessment Team"
|
|
11
11
|
__description__ = "Production-ready AWS CIS Controls Compliance Assessment Framework"
|