aws-cis-controls-assessment 1.0.10__tar.gz → 1.1.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (97) hide show
  1. {aws_cis_controls_assessment-1.0.10/aws_cis_controls_assessment.egg-info → aws_cis_controls_assessment-1.1.0}/PKG-INFO +160 -52
  2. aws_cis_controls_assessment-1.1.0/README.md +347 -0
  3. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/__init__.py +2 -2
  4. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/config/rules/cis_controls_ig1.yaml +1 -1
  5. aws_cis_controls_assessment-1.1.0/aws_cis_assessment/config/rules/cis_controls_ig2.yaml +1091 -0
  6. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/__init__.py +62 -1
  7. aws_cis_controls_assessment-1.1.0/aws_cis_assessment/controls/ig2/control_4_5_6_access_configuration.py +2638 -0
  8. aws_cis_controls_assessment-1.1.0/aws_cis_assessment/controls/ig2/control_8_audit_logging.py +984 -0
  9. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/assessment_engine.py +54 -0
  10. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/html_reporter.py +197 -35
  11. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0/aws_cis_controls_assessment.egg-info}/PKG-INFO +160 -52
  12. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/SOURCES.txt +2 -0
  13. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/cli-reference.md +1 -1
  14. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/config-rule-mappings.md +423 -6
  15. aws_cis_controls_assessment-1.0.10/README.md +0 -239
  16. aws_cis_controls_assessment-1.0.10/aws_cis_assessment/config/rules/cis_controls_ig2.yaml +0 -494
  17. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/LICENSE +0 -0
  18. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/MANIFEST.in +0 -0
  19. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/cli/__init__.py +0 -0
  20. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/cli/examples.py +0 -0
  21. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/cli/main.py +0 -0
  22. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/cli/utils.py +0 -0
  23. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/config/__init__.py +0 -0
  24. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/config/config_loader.py +0 -0
  25. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/config/rules/cis_controls_ig3.yaml +0 -0
  26. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/__init__.py +0 -0
  27. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/base_control.py +0 -0
  28. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/__init__.py +0 -0
  29. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_1_1.py +0 -0
  30. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_2_2.py +0 -0
  31. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_3_3.py +0 -0
  32. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_3_4.py +0 -0
  33. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_4_1.py +0 -0
  34. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_access_keys.py +0 -0
  35. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_advanced_security.py +0 -0
  36. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_aws_backup_service.py +0 -0
  37. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_backup_recovery.py +0 -0
  38. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_cloudtrail_logging.py +0 -0
  39. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_critical_security.py +0 -0
  40. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_data_protection.py +0 -0
  41. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_iam_advanced.py +0 -0
  42. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_iam_governance.py +0 -0
  43. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_iam_policies.py +0 -0
  44. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_instance_optimization.py +0 -0
  45. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_network_enhancements.py +0 -0
  46. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_network_security.py +0 -0
  47. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_s3_enhancements.py +0 -0
  48. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_s3_security.py +0 -0
  49. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig1/control_vpc_security.py +0 -0
  50. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_3_10.py +0 -0
  51. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_3_11.py +0 -0
  52. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_5_2.py +0 -0
  53. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_advanced_encryption.py +0 -0
  54. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_aws_backup_ig2.py +0 -0
  55. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_codebuild_security.py +0 -0
  56. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_encryption_rest.py +0 -0
  57. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_encryption_transit.py +0 -0
  58. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_network_ha.py +0 -0
  59. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_remaining_encryption.py +0 -0
  60. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_remaining_rules.py +0 -0
  61. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig2/control_service_logging.py +0 -0
  62. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/__init__.py +0 -0
  63. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/control_12_8.py +0 -0
  64. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/control_13_1.py +0 -0
  65. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/control_3_14.py +0 -0
  66. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/controls/ig3/control_7_1.py +0 -0
  67. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/__init__.py +0 -0
  68. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/accuracy_validator.py +0 -0
  69. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/audit_trail.py +0 -0
  70. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/aws_client_factory.py +0 -0
  71. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/error_handler.py +0 -0
  72. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/models.py +0 -0
  73. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/core/scoring_engine.py +0 -0
  74. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/__init__.py +0 -0
  75. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/base_reporter.py +0 -0
  76. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/csv_reporter.py +0 -0
  77. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_assessment/reporters/json_reporter.py +0 -0
  78. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/dependency_links.txt +0 -0
  79. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/entry_points.txt +0 -0
  80. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/requires.txt +0 -0
  81. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/aws_cis_controls_assessment.egg-info/top_level.txt +0 -0
  82. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/deprecation-package/aws_cis_assessment_deprecated/__init__.py +0 -0
  83. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/README.md +0 -0
  84. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/adding-aws-backup-controls.md +0 -0
  85. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/assessment-logic.md +0 -0
  86. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/developer-guide.md +0 -0
  87. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/dual-scoring-implementation.md +0 -0
  88. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/html-report-improvements.md +0 -0
  89. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/installation.md +0 -0
  90. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/scoring-comparison-aws-config.md +0 -0
  91. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/scoring-methodology.md +0 -0
  92. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/troubleshooting.md +0 -0
  93. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/docs/user-guide.md +0 -0
  94. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/pyproject.toml +0 -0
  95. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/pytest.ini +0 -0
  96. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/requirements.txt +0 -0
  97. {aws_cis_controls_assessment-1.0.10 → aws_cis_controls_assessment-1.1.0}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: aws-cis-controls-assessment
3
- Version: 1.0.10
3
+ Version: 1.1.0
4
4
  Summary: Production-ready AWS CIS Controls compliance assessment framework with 145 comprehensive rules
5
5
  Author-email: AWS CIS Assessment Team <security@example.com>
6
6
  Maintainer-email: AWS CIS Assessment Team <security@example.com>
@@ -57,20 +57,22 @@ Dynamic: license-file
57
57
 
58
58
  # AWS CIS Controls Compliance Assessment Framework
59
59
 
60
- A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 133 implemented rules plus 5 bonus security enhancements.
60
+ A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 163 implemented rules (131 CIS Controls + 32 bonus security enhancements).
61
61
 
62
62
  > **Production Status**: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend [AWS Config](https://aws.amazon.com/config/) for ongoing continuous compliance monitoring and automated remediation.
63
63
 
64
64
  ## 🎯 Key Features
65
65
 
66
- - **✅ Complete Coverage**: 137/137 CIS Controls rules implemented (100% coverage)
66
+ - **✅ Complete Coverage**: 163 total rules implemented (131 CIS Controls + 32 bonus)
67
67
  - **✅ Dual Scoring System**: Both weighted and AWS Config-style scoring methodologies
68
+ - **✅ Enhanced HTML Reports**: Control names, working search, improved remediation display
68
69
  - **✅ Enterprise Ready**: Production-tested with enterprise-grade architecture
69
70
  - **✅ Performance Optimized**: Handles large-scale assessments efficiently
70
71
  - **✅ Multi-Format Reports**: JSON, HTML, and CSV with detailed remediation guidance
71
72
  - **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
72
- - **✅ Bonus Security Rules**: 5 additional security enhancements beyond CIS requirements
73
73
  - **✅ AWS Backup Controls**: 6 comprehensive backup infrastructure controls (3 IG1 + 3 IG2)
74
+ - **✅ Audit Logging Controls**: 7 comprehensive audit log management controls (CIS Control 8)
75
+ - **✅ Access & Configuration Controls**: 14 comprehensive identity, access, and secure configuration controls (CIS Controls 4, 5, 6)
74
76
 
75
77
  ## 🚀 Quick Start
76
78
 
@@ -89,7 +91,7 @@ pip install -e .
89
91
  ### Basic Usage
90
92
 
91
93
  ```bash
92
- # Run complete assessment (all 142 rules) - defaults to us-east-1
94
+ # Run complete assessment (all 163 rules) - defaults to us-east-1
93
95
  aws-cis-assess assess --aws-profile my-aws-profile
94
96
 
95
97
  # Assess multiple regions
@@ -117,12 +119,12 @@ aws-cis-assess assess --output-format json
117
119
  - Data Protection and Encryption (8 rules)
118
120
  - Network Security Controls (20 rules)
119
121
  - Logging and Monitoring (13 rules)
120
- - Backup and Recovery (17 rules) - **NEW: 6 AWS Backup service controls added (3 IG1 + 3 IG2)**
122
+ - Backup and Recovery (17 rules) - **6 AWS Backup service controls (3 IG1 + 3 IG2)**
121
123
  - Security Services Integration (5 rules)
122
124
  - Configuration Management (9 rules)
123
125
  - Vulnerability Management (5 rules)
124
126
 
125
- ### IG2 - Enhanced Security (+40 Rules) ✅
127
+ ### IG2 - Enhanced Security (+74 Rules) ✅
126
128
  **100% Coverage Achieved**
127
129
  - Advanced Encryption at Rest (6 rules)
128
130
  - Certificate Management (2 rules)
@@ -133,7 +135,11 @@ aws-cis-assess assess --output-format json
133
135
  - Network Segmentation (5 rules)
134
136
  - Auto-scaling Security (1 rule)
135
137
  - Enhanced Access Controls (8 rules)
136
- - AWS Backup Advanced Controls (3 rules) - **NEW: Vault lock, reporting, restore testing**
138
+ - AWS Backup Advanced Controls (3 rules) - **Vault lock, reporting, restore testing**
139
+ - Audit Log Management (7 rules) - **Control 8 comprehensive logging coverage**
140
+ - Secure Configuration (5 rules) - **Control 4: session duration, security groups, VPC DNS, RDS admin, EC2 least privilege**
141
+ - Account Management (4 rules) - **Control 5: service account docs, admin policies, SSO, inline policies**
142
+ - Access Control Management (5 rules) - **Control 6: Access Analyzer, permission boundaries, SCPs, Cognito MFA, VPN MFA**
137
143
 
138
144
  ### IG3 - Advanced Security (+1 Rule) ✅
139
145
  **100% Coverage Achieved**
@@ -141,19 +147,82 @@ aws-cis-assess assess --output-format json
141
147
  - Critical for preventing application-layer attacks
142
148
  - Required for high-security environments
143
149
 
144
- ### Bonus Security Rules (+5 Rules) ✅
150
+ ### Bonus Security Rules (+32 Rules) ✅
145
151
  **Additional Value Beyond CIS Requirements**
146
152
  - Enhanced logging security (`cloudwatch-log-group-encrypted`)
147
153
  - Network security enhancement (`incoming-ssh-disabled`)
148
154
  - Data streaming encryption (`kinesis-stream-encrypted`)
149
155
  - Network access control (`restricted-incoming-traffic`)
150
156
  - Message queue encryption (`sqs-queue-encrypted-kms`)
157
+ - Route 53 DNS query logging (`route53-query-logging-enabled`)
158
+ - Plus 26 additional security enhancements
159
+ - Application Load Balancer access logs (`alb-access-logs-enabled`)
160
+ - CloudFront distribution access logs (`cloudfront-access-logs-enabled`)
161
+ - WAF web ACL logging (`waf-logging-enabled`)
162
+
163
+ ### 🔍 CIS Control 8: Audit Log Management (13 Rules)
164
+ **Comprehensive Audit Logging Coverage**
165
+
166
+ Control 8 focuses on collecting, alerting, reviewing, and retaining audit logs of events that could help detect, understand, or recover from an attack. Our implementation provides comprehensive coverage across AWS services:
167
+
168
+ **DNS Query Logging**
169
+ - `route53-query-logging-enabled`: Validates Route 53 hosted zones have query logging enabled to track DNS queries for security investigations
170
+
171
+ **Load Balancer & CDN Logging**
172
+ - `alb-access-logs-enabled`: Ensures Application Load Balancers capture access logs for traffic analysis
173
+ - `elb-logging-enabled`: Validates Classic Load Balancers have access logging enabled
174
+ - `cloudfront-access-logs-enabled`: Ensures CloudFront distributions log content delivery requests
175
+
176
+ **Log Retention & Management**
177
+ - `cloudwatch-log-retention-check`: Validates log groups have appropriate retention periods (minimum 90 days)
178
+ - `cw-loggroup-retention-period-check`: Additional log retention validation
179
+
180
+ **CloudTrail Monitoring**
181
+ - `cloudtrail-insights-enabled`: Enables anomaly detection for unusual API activity
182
+
183
+ **Configuration Tracking**
184
+ - `config-recording-all-resources`: Ensures AWS Config tracks all resource configuration changes
185
+
186
+ **Application Security Logging**
187
+ - `waf-logging-enabled`: Validates WAF web ACLs capture firewall events
188
+ - `wafv2-logging-enabled`: Ensures WAFv2 web ACLs have logging enabled
189
+
190
+ **Database & Service Logging**
191
+ - `rds-logging-enabled`: Validates RDS instances have appropriate logging enabled
192
+ - `elasticsearch-logs-to-cloudwatch`: Ensures Elasticsearch domains send logs to CloudWatch
193
+ - `codebuild-project-logging-enabled`: Validates CodeBuild projects capture build logs
194
+ - `redshift-cluster-configuration-check`: Ensures Redshift clusters have audit logging enabled
195
+
196
+ ### 🔐 CIS Controls 4, 5, 6: Access & Configuration Controls (14 Rules)
197
+ **Comprehensive Identity, Access Management, and Secure Configuration Coverage**
198
+
199
+ These controls focus on secure configuration of enterprise assets, account management, and access control management. Our implementation provides comprehensive coverage across AWS IAM, networking, and identity services:
200
+
201
+ **Control 4 - Secure Configuration (5 rules)**
202
+ - `iam-max-session-duration-check`: Validates IAM role session duration does not exceed 12 hours to limit credential exposure
203
+ - `security-group-default-rules-check`: Ensures default security groups have no inbound or outbound rules to prevent unintended access
204
+ - `vpc-dns-resolution-enabled`: Validates VPC DNS settings (enableDnsHostnames and enableDnsSupport) are properly configured
205
+ - `rds-default-admin-check`: Ensures RDS instances don't use default admin usernames (postgres, admin, root, mysql, administrator)
206
+ - `ec2-instance-profile-least-privilege`: Validates EC2 instance profile permissions follow least privilege principles
207
+
208
+ **Control 5 - Account Management (4 rules)**
209
+ - `iam-service-account-inventory-check`: Validates service accounts have required documentation tags (Purpose, Owner, LastReviewed)
210
+ - `iam-admin-policy-attached-to-role-check`: Ensures administrative policies are attached to roles, not directly to users
211
+ - `sso-enabled-check`: Validates AWS IAM Identity Center is configured and enabled for centralized identity management
212
+ - `iam-user-no-inline-policies`: Ensures IAM users don't have inline policies (only managed policies or group memberships)
213
+
214
+ **Control 6 - Access Control Management (5 rules)**
215
+ - `iam-access-analyzer-enabled`: Validates IAM Access Analyzer is enabled in all active regions for external access detection
216
+ - `iam-permission-boundaries-check`: Ensures permission boundaries are configured for roles with elevated privileges
217
+ - `organizations-scp-enabled-check`: Validates AWS Organizations Service Control Policies are enabled and in use
218
+ - `cognito-user-pool-mfa-enabled`: Ensures Cognito user pools have MFA enabled for enhanced authentication security
219
+ - `vpn-connection-mfa-enabled`: Validates Client VPN endpoints require MFA authentication
151
220
 
152
221
  ## 🏗️ Production Architecture
153
222
 
154
223
  ### Core Components
155
224
  - **Assessment Engine**: Orchestrates compliance evaluations across all AWS regions
156
- - **Control Assessments**: 138 individual rule implementations with robust error handling
225
+ - **Control Assessments**: 149 individual rule implementations with robust error handling
157
226
  - **Scoring Engine**: Calculates compliance scores and generates executive metrics
158
227
  - **Reporting System**: Multi-format output with detailed remediation guidance
159
228
  - **Resource Management**: Optimized for enterprise-scale deployments with memory management
@@ -249,48 +318,87 @@ MIT License - see [LICENSE](LICENSE) file for details.
249
318
 
250
319
  ---
251
320
 
252
- **Framework Version**: 1.0.10 (in development)
253
- **CIS Controls Coverage**: 137/137 rules (100%) + 5 bonus rules
321
+ **Framework Version**: 1.1.0 (in development)
322
+ **CIS Controls Coverage**: 151/151 rules (100%) + 9 bonus rules
254
323
  **Production Status**: ✅ Ready for immediate enterprise deployment
255
324
  **Last Updated**: January 2026
256
325
 
257
- ## 🆕 What's New in Version 1.0.10
258
-
259
- ### AWS Backup Service Controls
260
- Six new controls added to assess AWS Backup infrastructure:
261
-
262
- **IG1 Controls (3)**:
263
- 1. **backup-plan-min-frequency-and-min-retention-check** - Validates backup plans have appropriate frequency and retention policies
264
- - Ensures backup plans have at least one rule defined
265
- - Validates schedule expressions (cron or rate)
266
- - Checks retention periods meet minimum requirements (default: 7 days)
267
- - Validates lifecycle policies for cold storage transitions
268
-
269
- 2. **backup-vault-access-policy-check** - Ensures backup vaults have secure access policies
270
- - Detects publicly accessible backup vaults
271
- - Identifies overly permissive access policies
272
- - Warns about dangerous permissions (DeleteBackupVault, DeleteRecoveryPoint)
273
- - Validates principle of least privilege
274
-
275
- 3. **backup-selection-resource-coverage-check** - Validates backup plans cover critical resources
276
- - Ensures backup plans have at least one selection
277
- - Validates selections target specific resources or use tags
278
- - Checks that selections are not empty
279
-
280
- **IG2 Controls (3)**:
281
- 4. **backup-vault-lock-check** - Verifies vault lock for ransomware protection
282
- - Ensures critical vaults have Vault Lock enabled
283
- - Validates immutable backup configuration (WORM)
284
- - Checks minimum and maximum retention periods
285
-
286
- 5. **backup-report-plan-exists-check** - Validates backup compliance reporting
287
- - Ensures at least one report plan exists
288
- - Validates report delivery configuration
289
- - Checks for active report generation
290
-
291
- 6. **backup-restore-testing-plan-exists-check** - Ensures backups are recoverable
292
- - Validates restore testing plans exist
293
- - Checks testing schedules are configured
294
- - Ensures backups are actually tested for recoverability
295
-
296
- These controls complement the existing 12 resource-specific backup controls by assessing the centralized AWS Backup service infrastructure itself. Total backup controls: 17 (12 resource-specific + 5 service-level). See [AWS Backup Controls Guide](docs/adding-aws-backup-controls.md) for detailed documentation.
326
+ ## 🆕 What's New in Version 1.1.0
327
+
328
+ ### Access & Configuration Controls (CIS Controls 4, 5, 6)
329
+ Fourteen new controls added to assess identity, access management, and secure configuration:
330
+
331
+ **Control 4 - Secure Configuration (5 rules)**:
332
+ 1. **iam-max-session-duration-check** - Validates IAM role session duration does not exceed 12 hours
333
+ - Ensures temporary credentials have limited exposure window
334
+ - Checks MaxSessionDuration property on all IAM roles
335
+ - Compliant if session duration 43200 seconds (12 hours)
336
+
337
+ 2. **security-group-default-rules-check** - Ensures default security groups have no rules
338
+ - Validates default security groups are restricted (no inbound/outbound rules)
339
+ - Prevents unintended access through default security groups
340
+ - Encourages use of custom security groups with explicit rules
341
+
342
+ 3. **vpc-dns-resolution-enabled** - Validates VPC DNS configuration
343
+ - Checks both enableDnsHostnames and enableDnsSupport are enabled
344
+ - Ensures proper DNS resolution within VPCs
345
+ - Required for many AWS services to function correctly
346
+
347
+ 4. **rds-default-admin-check** - Ensures RDS instances don't use default admin usernames
348
+ - Detects default usernames: postgres, admin, root, mysql, administrator, sa
349
+ - Case-insensitive detection
350
+ - Reduces risk of credential guessing attacks
351
+
352
+ 5. **ec2-instance-profile-least-privilege** - Validates EC2 instance profile permissions
353
+ - Checks for overly permissive policies (AdministratorAccess, PowerUserAccess)
354
+ - Detects wildcard permissions (Action: "*", Resource: "*")
355
+ - Ensures least privilege principle for EC2 workloads
356
+
357
+ **Control 5 - Account Management (4 rules)**:
358
+ 6. **iam-service-account-inventory-check** - Validates service account documentation
359
+ - Ensures service accounts have required tags: Purpose, Owner, LastReviewed
360
+ - Identifies service accounts by naming convention or tags
361
+ - Supports compliance and access review processes
362
+
363
+ 7. **iam-admin-policy-attached-to-role-check** - Ensures admin policies on roles, not users
364
+ - Detects administrative policies attached directly to IAM users
365
+ - Encourages role-based access with temporary credentials
366
+ - Improves audit trail and access management
367
+
368
+ 8. **sso-enabled-check** - Validates AWS IAM Identity Center (SSO) is configured
369
+ - Checks for SSO instance existence
370
+ - Encourages centralized identity management
371
+ - Supports integration with corporate identity providers
372
+
373
+ 9. **iam-user-no-inline-policies** - Ensures IAM users don't have inline policies
374
+ - Detects inline policies attached to users
375
+ - Encourages use of managed policies for reusability
376
+ - Simplifies policy management and auditing
377
+
378
+ **Control 6 - Access Control Management (5 rules)**:
379
+ 10. **iam-access-analyzer-enabled** - Validates Access Analyzer in all regions
380
+ - Ensures IAM Access Analyzer is enabled regionally
381
+ - Detects resources shared with external entities
382
+ - Provides continuous monitoring for unintended access
383
+
384
+ 11. **iam-permission-boundaries-check** - Validates permission boundaries for elevated roles
385
+ - Identifies roles with elevated privileges
386
+ - Checks for permission boundary configuration
387
+ - Prevents privilege escalation in delegated administration
388
+
389
+ 12. **organizations-scp-enabled-check** - Validates Service Control Policies are in use
390
+ - Checks account is part of AWS Organizations
391
+ - Verifies SCPs are enabled (FeatureSet includes ALL)
392
+ - Ensures custom SCPs exist beyond default FullAWSAccess
393
+
394
+ 13. **cognito-user-pool-mfa-enabled** - Ensures Cognito user pools have MFA
395
+ - Validates MfaConfiguration is 'ON' or 'OPTIONAL'
396
+ - Supports both SMS and TOTP authentication methods
397
+ - Enhances authentication security for applications
398
+
399
+ 14. **vpn-connection-mfa-enabled** - Validates Client VPN endpoints require MFA
400
+ - Checks VPN authentication options for MFA requirement
401
+ - Supports Active Directory, SAML, and certificate-based MFA
402
+ - Ensures secure remote access to AWS resources
403
+
404
+ These controls complement the existing audit logging and backup controls by providing comprehensive coverage of identity, access management, and secure configuration practices. Total rules: 163 (149 previous + 14 new). See [Config Rule Mappings](docs/config-rule-mappings.md) for detailed documentation.
@@ -0,0 +1,347 @@
1
+ # AWS CIS Controls Compliance Assessment Framework
2
+
3
+ A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 163 implemented rules (131 CIS Controls + 32 bonus security enhancements).
4
+
5
+ > **Production Status**: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend [AWS Config](https://aws.amazon.com/config/) for ongoing continuous compliance monitoring and automated remediation.
6
+
7
+ ## 🎯 Key Features
8
+
9
+ - **✅ Complete Coverage**: 163 total rules implemented (131 CIS Controls + 32 bonus)
10
+ - **✅ Dual Scoring System**: Both weighted and AWS Config-style scoring methodologies
11
+ - **✅ Enhanced HTML Reports**: Control names, working search, improved remediation display
12
+ - **✅ Enterprise Ready**: Production-tested with enterprise-grade architecture
13
+ - **✅ Performance Optimized**: Handles large-scale assessments efficiently
14
+ - **✅ Multi-Format Reports**: JSON, HTML, and CSV with detailed remediation guidance
15
+ - **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
16
+ - **✅ AWS Backup Controls**: 6 comprehensive backup infrastructure controls (3 IG1 + 3 IG2)
17
+ - **✅ Audit Logging Controls**: 7 comprehensive audit log management controls (CIS Control 8)
18
+ - **✅ Access & Configuration Controls**: 14 comprehensive identity, access, and secure configuration controls (CIS Controls 4, 5, 6)
19
+
20
+ ## 🚀 Quick Start
21
+
22
+ ### Installation
23
+
24
+ ```bash
25
+ # Install from PyPI (production-ready)
26
+ pip install aws-cis-controls-assessment
27
+
28
+ # Or install from source for development
29
+ git clone <repository-url>
30
+ cd aws-cis-controls-assessment
31
+ pip install -e .
32
+ ```
33
+
34
+ ### Basic Usage
35
+
36
+ ```bash
37
+ # Run complete assessment (all 163 rules) - defaults to us-east-1
38
+ aws-cis-assess assess --aws-profile my-aws-profile
39
+
40
+ # Assess multiple regions
41
+ aws-cis-assess assess --aws-profile my-aws-profile --regions us-east-1,us-west-2
42
+
43
+ # Assess specific Implementation Group using short flag (defaults to us-east-1)
44
+ aws-cis-assess assess -p my-aws-profile --implementation-groups IG1 --output-format json
45
+
46
+ # Generate comprehensive HTML report (defaults to us-east-1)
47
+ aws-cis-assess assess --aws-profile production --output-format html --output-file compliance-report.html
48
+
49
+ # Enterprise multi-region assessment with multiple formats
50
+ aws-cis-assess assess -p security-audit --implementation-groups IG1,IG2,IG3 --regions all --output-format html,json --output-dir ./reports/
51
+
52
+ # Quick assessment with default profile and default region (us-east-1)
53
+ aws-cis-assess assess --output-format json
54
+ ```
55
+
56
+ ## 📊 Implementation Groups Coverage
57
+
58
+ ### IG1 - Essential Cyber Hygiene (96 Rules) ✅
59
+ **100% Coverage Achieved**
60
+ - Asset Inventory and Management (6 rules)
61
+ - Identity and Access Management (15 rules)
62
+ - Data Protection and Encryption (8 rules)
63
+ - Network Security Controls (20 rules)
64
+ - Logging and Monitoring (13 rules)
65
+ - Backup and Recovery (17 rules) - **6 AWS Backup service controls (3 IG1 + 3 IG2)**
66
+ - Security Services Integration (5 rules)
67
+ - Configuration Management (9 rules)
68
+ - Vulnerability Management (5 rules)
69
+
70
+ ### IG2 - Enhanced Security (+74 Rules) ✅
71
+ **100% Coverage Achieved**
72
+ - Advanced Encryption at Rest (6 rules)
73
+ - Certificate Management (2 rules)
74
+ - Network High Availability (7 rules)
75
+ - Enhanced Monitoring (3 rules)
76
+ - CodeBuild Security (4 rules)
77
+ - Vulnerability Scanning (1 rule)
78
+ - Network Segmentation (5 rules)
79
+ - Auto-scaling Security (1 rule)
80
+ - Enhanced Access Controls (8 rules)
81
+ - AWS Backup Advanced Controls (3 rules) - **Vault lock, reporting, restore testing**
82
+ - Audit Log Management (7 rules) - **Control 8 comprehensive logging coverage**
83
+ - Secure Configuration (5 rules) - **Control 4: session duration, security groups, VPC DNS, RDS admin, EC2 least privilege**
84
+ - Account Management (4 rules) - **Control 5: service account docs, admin policies, SSO, inline policies**
85
+ - Access Control Management (5 rules) - **Control 6: Access Analyzer, permission boundaries, SCPs, Cognito MFA, VPN MFA**
86
+
87
+ ### IG3 - Advanced Security (+1 Rule) ✅
88
+ **100% Coverage Achieved**
89
+ - API Gateway WAF Integration (1 rule)
90
+ - Critical for preventing application-layer attacks
91
+ - Required for high-security environments
92
+
93
+ ### Bonus Security Rules (+32 Rules) ✅
94
+ **Additional Value Beyond CIS Requirements**
95
+ - Enhanced logging security (`cloudwatch-log-group-encrypted`)
96
+ - Network security enhancement (`incoming-ssh-disabled`)
97
+ - Data streaming encryption (`kinesis-stream-encrypted`)
98
+ - Network access control (`restricted-incoming-traffic`)
99
+ - Message queue encryption (`sqs-queue-encrypted-kms`)
100
+ - Route 53 DNS query logging (`route53-query-logging-enabled`)
101
+ - Plus 26 additional security enhancements
102
+ - Application Load Balancer access logs (`alb-access-logs-enabled`)
103
+ - CloudFront distribution access logs (`cloudfront-access-logs-enabled`)
104
+ - WAF web ACL logging (`waf-logging-enabled`)
105
+
106
+ ### 🔍 CIS Control 8: Audit Log Management (13 Rules)
107
+ **Comprehensive Audit Logging Coverage**
108
+
109
+ Control 8 focuses on collecting, alerting, reviewing, and retaining audit logs of events that could help detect, understand, or recover from an attack. Our implementation provides comprehensive coverage across AWS services:
110
+
111
+ **DNS Query Logging**
112
+ - `route53-query-logging-enabled`: Validates Route 53 hosted zones have query logging enabled to track DNS queries for security investigations
113
+
114
+ **Load Balancer & CDN Logging**
115
+ - `alb-access-logs-enabled`: Ensures Application Load Balancers capture access logs for traffic analysis
116
+ - `elb-logging-enabled`: Validates Classic Load Balancers have access logging enabled
117
+ - `cloudfront-access-logs-enabled`: Ensures CloudFront distributions log content delivery requests
118
+
119
+ **Log Retention & Management**
120
+ - `cloudwatch-log-retention-check`: Validates log groups have appropriate retention periods (minimum 90 days)
121
+ - `cw-loggroup-retention-period-check`: Additional log retention validation
122
+
123
+ **CloudTrail Monitoring**
124
+ - `cloudtrail-insights-enabled`: Enables anomaly detection for unusual API activity
125
+
126
+ **Configuration Tracking**
127
+ - `config-recording-all-resources`: Ensures AWS Config tracks all resource configuration changes
128
+
129
+ **Application Security Logging**
130
+ - `waf-logging-enabled`: Validates WAF web ACLs capture firewall events
131
+ - `wafv2-logging-enabled`: Ensures WAFv2 web ACLs have logging enabled
132
+
133
+ **Database & Service Logging**
134
+ - `rds-logging-enabled`: Validates RDS instances have appropriate logging enabled
135
+ - `elasticsearch-logs-to-cloudwatch`: Ensures Elasticsearch domains send logs to CloudWatch
136
+ - `codebuild-project-logging-enabled`: Validates CodeBuild projects capture build logs
137
+ - `redshift-cluster-configuration-check`: Ensures Redshift clusters have audit logging enabled
138
+
139
+ ### 🔐 CIS Controls 4, 5, 6: Access & Configuration Controls (14 Rules)
140
+ **Comprehensive Identity, Access Management, and Secure Configuration Coverage**
141
+
142
+ These controls focus on secure configuration of enterprise assets, account management, and access control management. Our implementation provides comprehensive coverage across AWS IAM, networking, and identity services:
143
+
144
+ **Control 4 - Secure Configuration (5 rules)**
145
+ - `iam-max-session-duration-check`: Validates IAM role session duration does not exceed 12 hours to limit credential exposure
146
+ - `security-group-default-rules-check`: Ensures default security groups have no inbound or outbound rules to prevent unintended access
147
+ - `vpc-dns-resolution-enabled`: Validates VPC DNS settings (enableDnsHostnames and enableDnsSupport) are properly configured
148
+ - `rds-default-admin-check`: Ensures RDS instances don't use default admin usernames (postgres, admin, root, mysql, administrator)
149
+ - `ec2-instance-profile-least-privilege`: Validates EC2 instance profile permissions follow least privilege principles
150
+
151
+ **Control 5 - Account Management (4 rules)**
152
+ - `iam-service-account-inventory-check`: Validates service accounts have required documentation tags (Purpose, Owner, LastReviewed)
153
+ - `iam-admin-policy-attached-to-role-check`: Ensures administrative policies are attached to roles, not directly to users
154
+ - `sso-enabled-check`: Validates AWS IAM Identity Center is configured and enabled for centralized identity management
155
+ - `iam-user-no-inline-policies`: Ensures IAM users don't have inline policies (only managed policies or group memberships)
156
+
157
+ **Control 6 - Access Control Management (5 rules)**
158
+ - `iam-access-analyzer-enabled`: Validates IAM Access Analyzer is enabled in all active regions for external access detection
159
+ - `iam-permission-boundaries-check`: Ensures permission boundaries are configured for roles with elevated privileges
160
+ - `organizations-scp-enabled-check`: Validates AWS Organizations Service Control Policies are enabled and in use
161
+ - `cognito-user-pool-mfa-enabled`: Ensures Cognito user pools have MFA enabled for enhanced authentication security
162
+ - `vpn-connection-mfa-enabled`: Validates Client VPN endpoints require MFA authentication
163
+
164
+ ## 🏗️ Production Architecture
165
+
166
+ ### Core Components
167
+ - **Assessment Engine**: Orchestrates compliance evaluations across all AWS regions
168
+ - **Control Assessments**: 149 individual rule implementations with robust error handling
169
+ - **Scoring Engine**: Calculates compliance scores and generates executive metrics
170
+ - **Reporting System**: Multi-format output with detailed remediation guidance
171
+ - **Resource Management**: Optimized for enterprise-scale deployments with memory management
172
+
173
+ ### Enterprise Features
174
+ - **Multi-threading**: Parallel execution for improved performance
175
+ - **Error Recovery**: Comprehensive error handling and retry mechanisms
176
+ - **Audit Trail**: Complete compliance audit and logging capabilities
177
+ - **Resource Monitoring**: Real-time performance and resource usage tracking
178
+ - **Scalable Architecture**: Handles assessments across hundreds of AWS accounts
179
+
180
+ ## 📋 Requirements
181
+
182
+ - **Python**: 3.8+ (production tested on 3.8, 3.9, 3.10, 3.11)
183
+ - **AWS Credentials**: Configured via AWS CLI, environment variables, or IAM roles
184
+ - **Permissions**: Read-only access to AWS services being assessed
185
+ - **Memory**: Minimum 2GB RAM for large-scale assessments
186
+ - **Network**: Internet access for AWS API calls
187
+ - **Default Region**: Assessments default to `us-east-1` unless `--regions` is specified
188
+
189
+ ## 📈 Business Value
190
+
191
+ ### Immediate Benefits
192
+ - **Compliance Readiness**: Instant CIS Controls compliance assessment
193
+ - **Risk Reduction**: Identify and prioritize security vulnerabilities
194
+ - **Audit Support**: Generate comprehensive compliance reports
195
+ - **Cost Optimization**: Identify misconfigured and unused resources
196
+ - **Operational Efficiency**: Automate manual compliance checking
197
+
198
+ ### Long-term Value
199
+ - **Continuous Improvement**: Track compliance posture over time
200
+ - **Regulatory Compliance**: Support for multiple compliance frameworks
201
+ - **Security Automation**: Foundation for automated remediation
202
+ - **Enterprise Integration**: Integrate with existing security tools
203
+ - **Future-Proof**: Extensible architecture for evolving requirements
204
+
205
+ ## 🛡️ Security & Compliance
206
+
207
+ ### Security Features
208
+ - **Read-Only Access**: Framework requires only read permissions
209
+ - **No Data Storage**: No sensitive data stored or transmitted
210
+ - **Audit Logging**: Complete audit trail of all assessments
211
+ - **Error Handling**: Secure error handling without data leakage
212
+
213
+ ### Compliance Support
214
+ - **CIS Controls**: 100% coverage of Implementation Groups 1, 2, and 3
215
+ - **AWS Well-Architected**: Aligned with security pillar best practices
216
+ - **Industry Standards**: Supports SOC 2, NIST, ISO 27001 mapping
217
+ - **Regulatory Requirements**: HIPAA, PCI DSS, FedRAMP compatible
218
+ - **Custom Frameworks**: Extensible for organization-specific requirements
219
+
220
+ ## 📚 Documentation
221
+
222
+ ### Core Documentation
223
+ - **[Installation Guide](docs/installation.md)**: Detailed installation instructions and requirements
224
+ - **[User Guide](docs/user-guide.md)**: Comprehensive user manual and best practices
225
+ - **[CLI Reference](docs/cli-reference.md)**: Complete command-line interface documentation
226
+ - **[Dual Scoring Guide](docs/dual-scoring-implementation.md)**: Weighted vs AWS Config scoring methodologies
227
+ - **[Scoring Methodology](docs/scoring-methodology.md)**: Detailed explanation of weighted scoring
228
+ - **[AWS Config Comparison](docs/scoring-comparison-aws-config.md)**: Comparison with AWS Config approach
229
+ - **[Troubleshooting Guide](docs/troubleshooting.md)**: Common issues and solutions
230
+ - **[Developer Guide](docs/developer-guide.md)**: Development and contribution guidelines
231
+
232
+ ### Technical Documentation
233
+ - **[Assessment Logic](docs/assessment-logic.md)**: How compliance assessments work
234
+ - **[Config Rule Mappings](docs/config-rule-mappings.md)**: CIS Controls to AWS Config rule mappings
235
+ - **[HTML Report Improvements](docs/html-report-improvements.md)**: Enhanced HTML report features and customization
236
+
237
+ ## 🤝 Support & Community
238
+
239
+ ### Getting Help
240
+ - **Documentation**: Comprehensive guides and API documentation
241
+ - **GitHub Issues**: Bug reports and feature requests
242
+ - **Enterprise Support**: Commercial support available for enterprise deployments
243
+
244
+ ### Contributing
245
+ - **Code Contributions**: Pull requests welcome with comprehensive tests
246
+ - **Documentation**: Help improve documentation and examples
247
+ - **Bug Reports**: Detailed bug reports with reproduction steps
248
+ - **Feature Requests**: Enhancement suggestions with business justification
249
+
250
+ ## 📄 License
251
+
252
+ MIT License - see [LICENSE](LICENSE) file for details.
253
+
254
+ ## 🏆 Project Status
255
+
256
+ **✅ Production Ready**: Complete implementation with 100% CIS Controls coverage
257
+ **✅ Enterprise Deployed**: Actively used in production environments
258
+ **✅ Continuously Maintained**: Regular updates and security patches
259
+ **✅ Community Supported**: Active development and community contributions
260
+ **✅ Future-Proof**: Extensible architecture for evolving requirements
261
+
262
+ ---
263
+
264
+ **Framework Version**: 1.1.0 (in development)
265
+ **CIS Controls Coverage**: 151/151 rules (100%) + 9 bonus rules
266
+ **Production Status**: ✅ Ready for immediate enterprise deployment
267
+ **Last Updated**: January 2026
268
+
269
+ ## 🆕 What's New in Version 1.1.0
270
+
271
+ ### Access & Configuration Controls (CIS Controls 4, 5, 6)
272
+ Fourteen new controls added to assess identity, access management, and secure configuration:
273
+
274
+ **Control 4 - Secure Configuration (5 rules)**:
275
+ 1. **iam-max-session-duration-check** - Validates IAM role session duration does not exceed 12 hours
276
+ - Ensures temporary credentials have limited exposure window
277
+ - Checks MaxSessionDuration property on all IAM roles
278
+ - Compliant if session duration ≤ 43200 seconds (12 hours)
279
+
280
+ 2. **security-group-default-rules-check** - Ensures default security groups have no rules
281
+ - Validates default security groups are restricted (no inbound/outbound rules)
282
+ - Prevents unintended access through default security groups
283
+ - Encourages use of custom security groups with explicit rules
284
+
285
+ 3. **vpc-dns-resolution-enabled** - Validates VPC DNS configuration
286
+ - Checks both enableDnsHostnames and enableDnsSupport are enabled
287
+ - Ensures proper DNS resolution within VPCs
288
+ - Required for many AWS services to function correctly
289
+
290
+ 4. **rds-default-admin-check** - Ensures RDS instances don't use default admin usernames
291
+ - Detects default usernames: postgres, admin, root, mysql, administrator, sa
292
+ - Case-insensitive detection
293
+ - Reduces risk of credential guessing attacks
294
+
295
+ 5. **ec2-instance-profile-least-privilege** - Validates EC2 instance profile permissions
296
+ - Checks for overly permissive policies (AdministratorAccess, PowerUserAccess)
297
+ - Detects wildcard permissions (Action: "*", Resource: "*")
298
+ - Ensures least privilege principle for EC2 workloads
299
+
300
+ **Control 5 - Account Management (4 rules)**:
301
+ 6. **iam-service-account-inventory-check** - Validates service account documentation
302
+ - Ensures service accounts have required tags: Purpose, Owner, LastReviewed
303
+ - Identifies service accounts by naming convention or tags
304
+ - Supports compliance and access review processes
305
+
306
+ 7. **iam-admin-policy-attached-to-role-check** - Ensures admin policies on roles, not users
307
+ - Detects administrative policies attached directly to IAM users
308
+ - Encourages role-based access with temporary credentials
309
+ - Improves audit trail and access management
310
+
311
+ 8. **sso-enabled-check** - Validates AWS IAM Identity Center (SSO) is configured
312
+ - Checks for SSO instance existence
313
+ - Encourages centralized identity management
314
+ - Supports integration with corporate identity providers
315
+
316
+ 9. **iam-user-no-inline-policies** - Ensures IAM users don't have inline policies
317
+ - Detects inline policies attached to users
318
+ - Encourages use of managed policies for reusability
319
+ - Simplifies policy management and auditing
320
+
321
+ **Control 6 - Access Control Management (5 rules)**:
322
+ 10. **iam-access-analyzer-enabled** - Validates Access Analyzer in all regions
323
+ - Ensures IAM Access Analyzer is enabled regionally
324
+ - Detects resources shared with external entities
325
+ - Provides continuous monitoring for unintended access
326
+
327
+ 11. **iam-permission-boundaries-check** - Validates permission boundaries for elevated roles
328
+ - Identifies roles with elevated privileges
329
+ - Checks for permission boundary configuration
330
+ - Prevents privilege escalation in delegated administration
331
+
332
+ 12. **organizations-scp-enabled-check** - Validates Service Control Policies are in use
333
+ - Checks account is part of AWS Organizations
334
+ - Verifies SCPs are enabled (FeatureSet includes ALL)
335
+ - Ensures custom SCPs exist beyond default FullAWSAccess
336
+
337
+ 13. **cognito-user-pool-mfa-enabled** - Ensures Cognito user pools have MFA
338
+ - Validates MfaConfiguration is 'ON' or 'OPTIONAL'
339
+ - Supports both SMS and TOTP authentication methods
340
+ - Enhances authentication security for applications
341
+
342
+ 14. **vpn-connection-mfa-enabled** - Validates Client VPN endpoints require MFA
343
+ - Checks VPN authentication options for MFA requirement
344
+ - Supports Active Directory, SAML, and certificate-based MFA
345
+ - Ensures secure remote access to AWS resources
346
+
347
+ These controls complement the existing audit logging and backup controls by providing comprehensive coverage of identity, access management, and secure configuration practices. Total rules: 163 (149 previous + 14 new). See [Config Rule Mappings](docs/config-rule-mappings.md) for detailed documentation.
@@ -2,10 +2,10 @@
2
2
  AWS CIS Controls Compliance Assessment Framework
3
3
 
4
4
  A production-ready, enterprise-grade framework for evaluating AWS account configurations against
5
- CIS Controls Implementation Groups (IG1, IG2, IG3). Implements 145 comprehensive AWS Config rules
5
+ CIS Controls Implementation Groups (IG1, IG2, IG3). Implements 163 comprehensive AWS Config rules
6
6
  across all implementation groups for complete security compliance assessment.
7
7
  """
8
8
 
9
- __version__ = "1.0.10"
9
+ __version__ = "1.1.0"
10
10
  __author__ = "AWS CIS Assessment Team"
11
11
  __description__ = "Production-ready AWS CIS Controls Compliance Assessment Framework"
@@ -1,5 +1,5 @@
1
1
  implementation_group: IG1
2
- total_rules: 76
2
+ total_rules: 77
3
3
  description: Essential cyber hygiene - foundational safeguards for all enterprises
4
4
  controls:
5
5
  '1.1':