aws-cis-controls-assessment 1.0.3__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (77) hide show
  1. aws_cis_assessment/__init__.py +11 -0
  2. aws_cis_assessment/cli/__init__.py +3 -0
  3. aws_cis_assessment/cli/examples.py +274 -0
  4. aws_cis_assessment/cli/main.py +1259 -0
  5. aws_cis_assessment/cli/utils.py +356 -0
  6. aws_cis_assessment/config/__init__.py +1 -0
  7. aws_cis_assessment/config/config_loader.py +328 -0
  8. aws_cis_assessment/config/rules/cis_controls_ig1.yaml +590 -0
  9. aws_cis_assessment/config/rules/cis_controls_ig2.yaml +412 -0
  10. aws_cis_assessment/config/rules/cis_controls_ig3.yaml +100 -0
  11. aws_cis_assessment/controls/__init__.py +1 -0
  12. aws_cis_assessment/controls/base_control.py +400 -0
  13. aws_cis_assessment/controls/ig1/__init__.py +239 -0
  14. aws_cis_assessment/controls/ig1/control_1_1.py +586 -0
  15. aws_cis_assessment/controls/ig1/control_2_2.py +231 -0
  16. aws_cis_assessment/controls/ig1/control_3_3.py +718 -0
  17. aws_cis_assessment/controls/ig1/control_3_4.py +235 -0
  18. aws_cis_assessment/controls/ig1/control_4_1.py +461 -0
  19. aws_cis_assessment/controls/ig1/control_access_keys.py +310 -0
  20. aws_cis_assessment/controls/ig1/control_advanced_security.py +512 -0
  21. aws_cis_assessment/controls/ig1/control_backup_recovery.py +510 -0
  22. aws_cis_assessment/controls/ig1/control_cloudtrail_logging.py +197 -0
  23. aws_cis_assessment/controls/ig1/control_critical_security.py +422 -0
  24. aws_cis_assessment/controls/ig1/control_data_protection.py +898 -0
  25. aws_cis_assessment/controls/ig1/control_iam_advanced.py +573 -0
  26. aws_cis_assessment/controls/ig1/control_iam_governance.py +493 -0
  27. aws_cis_assessment/controls/ig1/control_iam_policies.py +383 -0
  28. aws_cis_assessment/controls/ig1/control_instance_optimization.py +100 -0
  29. aws_cis_assessment/controls/ig1/control_network_enhancements.py +203 -0
  30. aws_cis_assessment/controls/ig1/control_network_security.py +672 -0
  31. aws_cis_assessment/controls/ig1/control_s3_enhancements.py +173 -0
  32. aws_cis_assessment/controls/ig1/control_s3_security.py +422 -0
  33. aws_cis_assessment/controls/ig1/control_vpc_security.py +235 -0
  34. aws_cis_assessment/controls/ig2/__init__.py +172 -0
  35. aws_cis_assessment/controls/ig2/control_3_10.py +698 -0
  36. aws_cis_assessment/controls/ig2/control_3_11.py +1330 -0
  37. aws_cis_assessment/controls/ig2/control_5_2.py +393 -0
  38. aws_cis_assessment/controls/ig2/control_advanced_encryption.py +355 -0
  39. aws_cis_assessment/controls/ig2/control_codebuild_security.py +263 -0
  40. aws_cis_assessment/controls/ig2/control_encryption_rest.py +382 -0
  41. aws_cis_assessment/controls/ig2/control_encryption_transit.py +382 -0
  42. aws_cis_assessment/controls/ig2/control_network_ha.py +467 -0
  43. aws_cis_assessment/controls/ig2/control_remaining_encryption.py +426 -0
  44. aws_cis_assessment/controls/ig2/control_remaining_rules.py +363 -0
  45. aws_cis_assessment/controls/ig2/control_service_logging.py +402 -0
  46. aws_cis_assessment/controls/ig3/__init__.py +49 -0
  47. aws_cis_assessment/controls/ig3/control_12_8.py +395 -0
  48. aws_cis_assessment/controls/ig3/control_13_1.py +467 -0
  49. aws_cis_assessment/controls/ig3/control_3_14.py +523 -0
  50. aws_cis_assessment/controls/ig3/control_7_1.py +359 -0
  51. aws_cis_assessment/core/__init__.py +1 -0
  52. aws_cis_assessment/core/accuracy_validator.py +425 -0
  53. aws_cis_assessment/core/assessment_engine.py +1266 -0
  54. aws_cis_assessment/core/audit_trail.py +491 -0
  55. aws_cis_assessment/core/aws_client_factory.py +313 -0
  56. aws_cis_assessment/core/error_handler.py +607 -0
  57. aws_cis_assessment/core/models.py +166 -0
  58. aws_cis_assessment/core/scoring_engine.py +459 -0
  59. aws_cis_assessment/reporters/__init__.py +8 -0
  60. aws_cis_assessment/reporters/base_reporter.py +454 -0
  61. aws_cis_assessment/reporters/csv_reporter.py +835 -0
  62. aws_cis_assessment/reporters/html_reporter.py +2162 -0
  63. aws_cis_assessment/reporters/json_reporter.py +561 -0
  64. aws_cis_controls_assessment-1.0.3.dist-info/METADATA +248 -0
  65. aws_cis_controls_assessment-1.0.3.dist-info/RECORD +77 -0
  66. aws_cis_controls_assessment-1.0.3.dist-info/WHEEL +5 -0
  67. aws_cis_controls_assessment-1.0.3.dist-info/entry_points.txt +2 -0
  68. aws_cis_controls_assessment-1.0.3.dist-info/licenses/LICENSE +21 -0
  69. aws_cis_controls_assessment-1.0.3.dist-info/top_level.txt +2 -0
  70. docs/README.md +94 -0
  71. docs/assessment-logic.md +766 -0
  72. docs/cli-reference.md +698 -0
  73. docs/config-rule-mappings.md +393 -0
  74. docs/developer-guide.md +858 -0
  75. docs/installation.md +299 -0
  76. docs/troubleshooting.md +634 -0
  77. docs/user-guide.md +487 -0
@@ -0,0 +1,412 @@
1
+ implementation_group: IG2
2
+ total_rules: 58
3
+ description: Enhanced security for enterprises with regulatory compliance burdens
4
+ controls:
5
+ '11.4':
6
+ title: Control 11.4
7
+ weight: 1.0
8
+ config_rules:
9
+ - name: elb-deletion-protection-enabled
10
+ resource_types:
11
+ - AWS::ElasticLoadBalancingV2::LoadBalancer
12
+ parameters: {}
13
+ description: Assessment for elb-deletion-protection-enabled AWS Config rule.
14
+ remediation_guidance: Follow AWS Config rule guidance for elb-deletion-protection-enabled
15
+ - name: rds-instance-deletion-protection-enabled
16
+ resource_types:
17
+ - AWS::RDS::DBInstance
18
+ parameters: {}
19
+ description: Assessment for rds-instance-deletion-protection-enabled AWS Config
20
+ rule.
21
+ remediation_guidance: Follow AWS Config rule guidance for rds-instance-deletion-protection-enabled
22
+ '12.2':
23
+ title: Control 12.2
24
+ weight: 1.0
25
+ config_rules:
26
+ - name: elb-cross-zone-load-balancing-enabled
27
+ resource_types:
28
+ - AWS::ElasticLoadBalancing::LoadBalancer
29
+ parameters: {}
30
+ description: Assessment for elb-cross-zone-load-balancing-enabled AWS Config
31
+ rule.
32
+ remediation_guidance: Follow AWS Config rule guidance for elb-cross-zone-load-balancing-enabled
33
+ - name: elbv2-multiple-az
34
+ resource_types:
35
+ - AWS::ElasticLoadBalancingV2::LoadBalancer
36
+ parameters: {}
37
+ description: Assessment for elbv2-multiple-az AWS Config rule.
38
+ remediation_guidance: Follow AWS Config rule guidance for elbv2-multiple-az
39
+ - name: rds-cluster-multi-az-enabled
40
+ resource_types:
41
+ - AWS::RDS::DBCluster
42
+ parameters: {}
43
+ description: Assessment for rds-cluster-multi-az-enabled AWS Config rule.
44
+ remediation_guidance: Follow AWS Config rule guidance for rds-cluster-multi-az-enabled
45
+ - name: rds-multi-az-support
46
+ resource_types:
47
+ - AWS::RDS::DBInstance
48
+ parameters: {}
49
+ description: Assessment for rds-multi-az-support AWS Config rule.
50
+ remediation_guidance: Follow AWS Config rule guidance for rds-multi-az-support
51
+ - name: vpc-vpn-2-tunnels-up
52
+ resource_types:
53
+ - AWS::EC2::VPNConnection
54
+ parameters: {}
55
+ description: Assessment for vpc-vpn-2-tunnels-up AWS Config rule.
56
+ remediation_guidance: Follow AWS Config rule guidance for vpc-vpn-2-tunnels-up
57
+ - name: dynamodb-autoscaling-enabled
58
+ resource_types:
59
+ - AWS::DynamoDB::Table
60
+ parameters: {}
61
+ description: Assessment for dynamodb-autoscaling-enabled AWS Config rule.
62
+ remediation_guidance: Follow AWS Config rule guidance for dynamodb-autoscaling-enabled
63
+ '3.10':
64
+ title: Encrypt Sensitive Data in Transit
65
+ weight: 1.0
66
+ config_rules:
67
+ - name: api-gw-ssl-enabled
68
+ resource_types:
69
+ - AWS::ApiGateway::Stage
70
+ parameters: {}
71
+ description: Assessment for api-gw-ssl-enabled Config rule - ensures API Gateway
72
+ stages have SSL certificates.
73
+ remediation_guidance: Follow AWS Config rule guidance for api-gw-ssl-enabled
74
+ - name: alb-http-to-https-redirection-check
75
+ resource_types:
76
+ - AWS::ElasticLoadBalancingV2::LoadBalancer
77
+ parameters: {}
78
+ description: Assessment for alb-http-to-https-redirection-check Config rule.
79
+ remediation_guidance: Follow AWS Config rule guidance for alb-http-to-https-redirection-check
80
+ - name: elb-tls-https-listeners-only
81
+ resource_types:
82
+ - AWS::ElasticLoadBalancing::LoadBalancer
83
+ parameters: {}
84
+ description: Assessment for elb-tls-https-listeners-only Config rule.
85
+ remediation_guidance: Follow AWS Config rule guidance for elb-tls-https-listeners-only
86
+ - name: s3-bucket-ssl-requests-only
87
+ resource_types:
88
+ - AWS::S3::Bucket
89
+ parameters: {}
90
+ description: Assessment for s3-bucket-ssl-requests-only Config rule.
91
+ remediation_guidance: Follow AWS Config rule guidance for s3-bucket-ssl-requests-only
92
+ - name: redshift-require-tls-ssl
93
+ resource_types:
94
+ - AWS::Redshift::Cluster
95
+ parameters: {}
96
+ description: Assessment for redshift-require-tls-ssl Config rule.
97
+ remediation_guidance: Follow AWS Config rule guidance for redshift-require-tls-ssl
98
+ - name: elb-acm-certificate-required
99
+ resource_types:
100
+ - AWS::ElasticLoadBalancing::LoadBalancer
101
+ parameters: {}
102
+ description: Assessment for elb-acm-certificate-required Config rule.
103
+ remediation_guidance: Follow AWS Config rule guidance for elb-acm-certificate-required
104
+ - name: elbv2-acm-certificate-required
105
+ resource_types:
106
+ - AWS::ElasticLoadBalancingV2::LoadBalancer
107
+ parameters: {}
108
+ description: Assessment for elbv2-acm-certificate-required Config rule.
109
+ remediation_guidance: Follow AWS Config rule guidance for elbv2-acm-certificate-required
110
+ - name: opensearch-https-required
111
+ resource_types:
112
+ - AWS::OpenSearch::Domain
113
+ parameters: {}
114
+ description: Assessment for opensearch-https-required Config rule.
115
+ remediation_guidance: Follow AWS Config rule guidance for opensearch-https-required
116
+ - name: opensearch-node-to-node-encryption-check
117
+ resource_types:
118
+ - AWS::OpenSearch::Domain
119
+ parameters: {}
120
+ description: Assessment for opensearch-node-to-node-encryption-check AWS Config
121
+ rule.
122
+ remediation_guidance: Follow AWS Config rule guidance for opensearch-node-to-node-encryption-check
123
+ '3.11':
124
+ title: Encrypt Sensitive Data at Rest
125
+ weight: 1.0
126
+ config_rules:
127
+ - name: secretsmanager-using-cmk
128
+ resource_types:
129
+ - AWS::SecretsManager::Secret
130
+ parameters: {}
131
+ description: Assessment for secretsmanager-using-cmk AWS Config rule.
132
+ remediation_guidance: Follow AWS Config rule guidance for secretsmanager-using-cmk
133
+ - name: sns-encrypted-kms
134
+ resource_types:
135
+ - AWS::SNS::Topic
136
+ parameters: {}
137
+ description: Assessment for sns-encrypted-kms AWS Config rule.
138
+ remediation_guidance: Follow AWS Config rule guidance for sns-encrypted-kms
139
+ - name: sqs-queue-encrypted-kms
140
+ resource_types:
141
+ - AWS::SQS::Queue
142
+ parameters: {}
143
+ description: Assessment for sqs-queue-encrypted-kms AWS Config rule.
144
+ remediation_guidance: Follow AWS Config rule guidance for sqs-queue-encrypted-kms
145
+ - name: kinesis-stream-encrypted
146
+ resource_types:
147
+ - AWS::Kinesis::Stream
148
+ parameters: {}
149
+ description: Assessment for kinesis-stream-encrypted AWS Config rule.
150
+ remediation_guidance: Follow AWS Config rule guidance for kinesis-stream-encrypted
151
+ - name: elasticsearch-encrypted-at-rest
152
+ resource_types:
153
+ - AWS::Elasticsearch::Domain
154
+ parameters: {}
155
+ description: Assessment for elasticsearch-encrypted-at-rest AWS Config rule.
156
+ remediation_guidance: Follow AWS Config rule guidance for elasticsearch-encrypted-at-rest
157
+ - name: encrypted-volumes
158
+ resource_types:
159
+ - AWS::EC2::Volume
160
+ parameters: {}
161
+ description: Assessment for encrypted-volumes Config rule - ensures EBS volumes
162
+ are encrypted.
163
+ remediation_guidance: Follow AWS Config rule guidance for encrypted-volumes
164
+ - name: rds-storage-encrypted
165
+ resource_types:
166
+ - AWS::RDS::DBInstance
167
+ parameters: {}
168
+ description: Assessment for rds-storage-encrypted Config rule - ensures RDS
169
+ instances have storage encryption.
170
+ remediation_guidance: Follow AWS Config rule guidance for rds-storage-encrypted
171
+ - name: s3-default-encryption-kms
172
+ resource_types:
173
+ - AWS::S3::Bucket
174
+ parameters: {}
175
+ description: Assessment for s3-default-encryption-kms Config rule - ensures
176
+ S3 buckets have default KMS encryption.
177
+ remediation_guidance: Follow AWS Config rule guidance for s3-default-encryption-kms
178
+ - name: dynamodb-table-encrypted-kms
179
+ resource_types:
180
+ - AWS::DynamoDB::Table
181
+ parameters: {}
182
+ description: Assessment for dynamodb-table-encrypted-kms Config rule - ensures
183
+ DynamoDB tables are encrypted with KMS.
184
+ remediation_guidance: Follow AWS Config rule guidance for dynamodb-table-encrypted-kms
185
+ - name: backup-recovery-point-encrypted
186
+ resource_types:
187
+ - AWS::Backup::RecoveryPoint
188
+ parameters: {}
189
+ description: Assessment for backup-recovery-point-encrypted Config rule - ensures
190
+ AWS Backup recovery points are encrypted.
191
+ remediation_guidance: Follow AWS Config rule guidance for backup-recovery-point-encrypted
192
+ - name: efs-encrypted-check
193
+ resource_types:
194
+ - AWS::EFS::FileSystem
195
+ parameters: {}
196
+ description: Assessment for efs-encrypted-check Config rule - ensures EFS file
197
+ systems are encrypted.
198
+ remediation_guidance: Follow AWS Config rule guidance for efs-encrypted-check
199
+ - name: secretsmanager-using-cmk
200
+ resource_types:
201
+ - AWS::SecretsManager::Secret
202
+ parameters: {}
203
+ description: Assessment for secretsmanager-using-cmk Config rule - ensures Secrets
204
+ Manager secrets use KMS keys.
205
+ remediation_guidance: Follow AWS Config rule guidance for secretsmanager-using-cmk
206
+ - name: sns-encrypted-kms
207
+ resource_types:
208
+ - AWS::SNS::Topic
209
+ parameters: {}
210
+ description: Assessment for sns-encrypted-kms Config rule - ensures SNS topics
211
+ are encrypted with KMS.
212
+ remediation_guidance: Follow AWS Config rule guidance for sns-encrypted-kms
213
+ - name: sqs-queue-encrypted-kms
214
+ resource_types:
215
+ - AWS::SQS::Queue
216
+ parameters: {}
217
+ description: Assessment for sqs-queue-encrypted-kms Config rule - ensures SQS
218
+ queues are encrypted with KMS.
219
+ remediation_guidance: Follow AWS Config rule guidance for sqs-queue-encrypted-kms
220
+ - name: cloudwatch-log-group-encrypted
221
+ resource_types:
222
+ - AWS::Logs::LogGroup
223
+ parameters: {}
224
+ description: Assessment for cloudwatch-log-group-encrypted Config rule - ensures
225
+ CloudWatch log groups are encrypted.
226
+ remediation_guidance: Follow AWS Config rule guidance for cloudwatch-log-group-encrypted
227
+ - name: kinesis-stream-encrypted
228
+ resource_types:
229
+ - AWS::Kinesis::Stream
230
+ parameters: {}
231
+ description: Assessment for kinesis-stream-encrypted Config rule - ensures Kinesis
232
+ streams are encrypted.
233
+ remediation_guidance: Follow AWS Config rule guidance for kinesis-stream-encrypted
234
+ - name: elasticsearch-encrypted-at-rest
235
+ resource_types:
236
+ - AWS::Elasticsearch::Domain
237
+ parameters: {}
238
+ description: Assessment for elasticsearch-encrypted-at-rest Config rule - ensures
239
+ Elasticsearch domains are encrypted at rest.
240
+ remediation_guidance: Follow AWS Config rule guidance for elasticsearch-encrypted-at-rest
241
+ - name: cloud-trail-encryption-enabled
242
+ resource_types:
243
+ - AWS::CloudTrail::Trail
244
+ parameters: {}
245
+ description: Assessment for cloud-trail-encryption-enabled Config rule.
246
+ remediation_guidance: Follow AWS Config rule guidance for cloud-trail-encryption-enabled
247
+ - name: efs-encrypted-check
248
+ resource_types:
249
+ - AWS::EFS::FileSystem
250
+ parameters: {}
251
+ description: Assessment for efs-encrypted-check Config rule.
252
+ remediation_guidance: Follow AWS Config rule guidance for efs-encrypted-check
253
+ - name: ec2-ebs-encryption-by-default
254
+ resource_types:
255
+ - AWS::::Account
256
+ parameters: {}
257
+ description: Assessment for ec2-ebs-encryption-by-default Config rule.
258
+ remediation_guidance: Follow AWS Config rule guidance for ec2-ebs-encryption-by-default
259
+ - name: rds-snapshot-encrypted
260
+ resource_types:
261
+ - AWS::RDS::DBSnapshot
262
+ - AWS::RDS::DBClusterSnapshot
263
+ parameters: {}
264
+ description: Assessment for rds-snapshot-encrypted Config rule.
265
+ remediation_guidance: Follow AWS Config rule guidance for rds-snapshot-encrypted
266
+ - name: opensearch-encrypted-at-rest
267
+ resource_types:
268
+ - AWS::OpenSearch::Domain
269
+ parameters: {}
270
+ description: Assessment for opensearch-encrypted-at-rest AWS Config rule.
271
+ remediation_guidance: Follow AWS Config rule guidance for opensearch-encrypted-at-rest
272
+ - name: redshift-cluster-kms-enabled
273
+ resource_types:
274
+ - AWS::Redshift::Cluster
275
+ parameters: {}
276
+ description: Assessment for redshift-cluster-kms-enabled AWS Config rule.
277
+ remediation_guidance: Follow AWS Config rule guidance for redshift-cluster-kms-enabled
278
+ - name: sagemaker-endpoint-configuration-kms-key-configured
279
+ resource_types:
280
+ - AWS::SageMaker::EndpointConfig
281
+ parameters: {}
282
+ description: Assessment for sagemaker-endpoint-configuration-kms-key-configured
283
+ AWS Config rule.
284
+ remediation_guidance: Follow AWS Config rule guidance for sagemaker-endpoint-configuration-kms-key-configured
285
+ - name: sagemaker-notebook-instance-kms-key-configured
286
+ resource_types:
287
+ - AWS::SageMaker::NotebookInstance
288
+ parameters: {}
289
+ description: Assessment for sagemaker-notebook-instance-kms-key-configured AWS
290
+ Config rule.
291
+ remediation_guidance: Follow AWS Config rule guidance for sagemaker-notebook-instance-kms-key-configured
292
+ - name: codebuild-project-artifact-encryption
293
+ resource_types:
294
+ - AWS::CodeBuild::Project
295
+ parameters: {}
296
+ description: Assessment for codebuild-project-artifact-encryption AWS Config
297
+ rule.
298
+ remediation_guidance: Follow AWS Config rule guidance for codebuild-project-artifact-encryption
299
+ '3.3':
300
+ title: Configure Data Access Control Lists
301
+ weight: 1.0
302
+ config_rules:
303
+ - name: redshift-enhanced-vpc-routing-enabled
304
+ resource_types:
305
+ - AWS::Redshift::Cluster
306
+ parameters: {}
307
+ description: Assessment for redshift-enhanced-vpc-routing-enabled AWS Config
308
+ rule.
309
+ remediation_guidance: Follow AWS Config rule guidance for redshift-enhanced-vpc-routing-enabled
310
+ - name: restricted-common-ports
311
+ resource_types:
312
+ - AWS::EC2::SecurityGroup
313
+ parameters: {}
314
+ description: Assessment for restricted-common-ports AWS Config rule.
315
+ remediation_guidance: Follow AWS Config rule guidance for restricted-common-ports
316
+ - name: codebuild-project-environment-privileged-check
317
+ resource_types:
318
+ - AWS::CodeBuild::Project
319
+ parameters: {}
320
+ description: Assessment for codebuild-project-environment-privileged-check AWS
321
+ Config rule.
322
+ remediation_guidance: Follow AWS Config rule guidance for codebuild-project-environment-privileged-check
323
+ - name: codebuild-project-envvar-awscred-check
324
+ resource_types:
325
+ - AWS::CodeBuild::Project
326
+ parameters: {}
327
+ description: Assessment for codebuild-project-envvar-awscred-check AWS Config
328
+ rule.
329
+ remediation_guidance: Follow AWS Config rule guidance for codebuild-project-envvar-awscred-check
330
+ - name: codebuild-project-source-repo-url-check
331
+ resource_types:
332
+ - AWS::CodeBuild::Project
333
+ parameters: {}
334
+ description: Assessment for codebuild-project-source-repo-url-check AWS Config
335
+ rule.
336
+ remediation_guidance: Follow AWS Config rule guidance for codebuild-project-source-repo-url-check
337
+ '4.1':
338
+ title: Establish and Maintain a Secure Configuration Process
339
+ weight: 1.0
340
+ config_rules:
341
+ - name: acm-certificate-expiration-check
342
+ resource_types:
343
+ - AWS::ACM::Certificate
344
+ parameters: {}
345
+ description: Assessment for acm-certificate-expiration-check AWS Config rule.
346
+ remediation_guidance: Follow AWS Config rule guidance for acm-certificate-expiration-check
347
+ '5.2':
348
+ title: Use Unique Passwords
349
+ weight: 1.0
350
+ config_rules:
351
+ - name: mfa-enabled-for-iam-console-access
352
+ resource_types:
353
+ - AWS::IAM::User
354
+ parameters: {}
355
+ description: Assessment for mfa-enabled-for-iam-console-access Config rule -
356
+ ensures MFA for console access.
357
+ remediation_guidance: Follow AWS Config rule guidance for mfa-enabled-for-iam-console-access
358
+ - name: root-account-mfa-enabled
359
+ resource_types:
360
+ - AWS::::Account
361
+ parameters: {}
362
+ description: Assessment for root-account-mfa-enabled Config rule - ensures root
363
+ account has MFA.
364
+ remediation_guidance: Follow AWS Config rule guidance for root-account-mfa-enabled
365
+ - name: iam-user-unused-credentials-check
366
+ resource_types:
367
+ - AWS::IAM::User
368
+ parameters: {}
369
+ description: Assessment for iam-user-unused-credentials-check Config rule -
370
+ identifies unused credentials.
371
+ remediation_guidance: Follow AWS Config rule guidance for iam-user-unused-credentials-check
372
+ '8.2':
373
+ title: Control 8.2
374
+ weight: 1.0
375
+ config_rules:
376
+ - name: elasticsearch-logs-to-cloudwatch
377
+ resource_types:
378
+ - AWS::Elasticsearch::Domain
379
+ parameters: {}
380
+ description: Assessment for elasticsearch-logs-to-cloudwatch AWS Config rule.
381
+ remediation_guidance: Follow AWS Config rule guidance for elasticsearch-logs-to-cloudwatch
382
+ - name: elb-logging-enabled
383
+ resource_types:
384
+ - AWS::ElasticLoadBalancing::LoadBalancer
385
+ parameters: {}
386
+ description: Assessment for elb-logging-enabled AWS Config rule.
387
+ remediation_guidance: Follow AWS Config rule guidance for elb-logging-enabled
388
+ - name: rds-logging-enabled
389
+ resource_types:
390
+ - AWS::RDS::DBInstance
391
+ parameters: {}
392
+ description: Assessment for rds-logging-enabled AWS Config rule.
393
+ remediation_guidance: Follow AWS Config rule guidance for rds-logging-enabled
394
+ - name: wafv2-logging-enabled
395
+ resource_types:
396
+ - AWS::WAFv2::WebACL
397
+ parameters: {}
398
+ description: Assessment for wafv2-logging-enabled AWS Config rule.
399
+ remediation_guidance: Follow AWS Config rule guidance for wafv2-logging-enabled
400
+ - name: codebuild-project-logging-enabled
401
+ resource_types:
402
+ - AWS::CodeBuild::Project
403
+ parameters: {}
404
+ description: Assessment for codebuild-project-logging-enabled AWS Config rule.
405
+ remediation_guidance: Follow AWS Config rule guidance for codebuild-project-logging-enabled
406
+ - name: redshift-cluster-configuration-check
407
+ resource_types:
408
+ - AWS::Redshift::Cluster
409
+ parameters: {}
410
+ description: Assessment for redshift-cluster-configuration-check AWS Config
411
+ rule.
412
+ remediation_guidance: Follow AWS Config rule guidance for redshift-cluster-configuration-check
@@ -0,0 +1,100 @@
1
+ implementation_group: IG3
2
+ total_rules: 13
3
+ description: Advanced security for enterprises with high-risk environments
4
+ controls:
5
+ '12.8':
6
+ title: Establish and Maintain Dedicated Computing Resources for All Administrative
7
+ Work
8
+ weight: 1.0
9
+ config_rules:
10
+ - name: api-gw-associated-with-waf
11
+ resource_types:
12
+ - AWS::ApiGateway::Stage
13
+ parameters: {}
14
+ description: Assessment for api-gw-associated-with-waf Config rule.
15
+ remediation_guidance: Follow AWS Config rule guidance for api-gw-associated-with-waf
16
+ - name: vpc-sg-open-only-to-authorized-ports
17
+ resource_types:
18
+ - AWS::EC2::SecurityGroup
19
+ parameters: {}
20
+ description: Assessment for vpc-sg-open-only-to-authorized-ports Config rule.
21
+ remediation_guidance: Follow AWS Config rule guidance for vpc-sg-open-only-to-authorized-ports
22
+ - name: no-unrestricted-route-to-igw
23
+ resource_types:
24
+ - AWS::EC2::RouteTable
25
+ parameters: {}
26
+ description: Assessment for no-unrestricted-route-to-igw Config rule.
27
+ remediation_guidance: Follow AWS Config rule guidance for no-unrestricted-route-to-igw
28
+ '13.1':
29
+ title: Centralize Security Event Alerting
30
+ weight: 1.0
31
+ config_rules:
32
+ - name: restricted-incoming-traffic
33
+ resource_types:
34
+ - AWS::EC2::SecurityGroup
35
+ parameters: {}
36
+ description: Assessment for restricted-incoming-traffic Config rule.
37
+ remediation_guidance: Follow AWS Config rule guidance for restricted-incoming-traffic
38
+ - name: incoming-ssh-disabled
39
+ resource_types:
40
+ - AWS::EC2::SecurityGroup
41
+ parameters: {}
42
+ description: Assessment for incoming-ssh-disabled Config rule.
43
+ remediation_guidance: Follow AWS Config rule guidance for incoming-ssh-disabled
44
+ - name: vpc-flow-logs-enabled
45
+ resource_types:
46
+ - AWS::EC2::VPC
47
+ parameters: {}
48
+ description: Assessment for VPC Flow Logs enabled for network monitoring.
49
+ remediation_guidance: Follow AWS Config rule guidance for vpc-flow-logs-enabled
50
+ '3.14':
51
+ title: Log Sensitive Data Access
52
+ weight: 1.0
53
+ config_rules:
54
+ - name: api-gw-execution-logging-enabled
55
+ resource_types:
56
+ - AWS::ApiGateway::Stage
57
+ parameters: {}
58
+ description: Assessment for api-gw-execution-logging-enabled Config rule.
59
+ remediation_guidance: Follow AWS Config rule guidance for api-gw-execution-logging-enabled
60
+ - name: cloudtrail-s3-dataevents-enabled
61
+ resource_types:
62
+ - AWS::CloudTrail::Trail
63
+ parameters: {}
64
+ description: Assessment for cloudtrail-s3-dataevents-enabled Config rule.
65
+ remediation_guidance: Follow AWS Config rule guidance for cloudtrail-s3-dataevents-enabled
66
+ - name: multi-region-cloudtrail-enabled
67
+ resource_types:
68
+ - AWS::::Account
69
+ parameters: {}
70
+ description: Assessment for multi-region-cloudtrail-enabled Config rule.
71
+ remediation_guidance: Follow AWS Config rule guidance for multi-region-cloudtrail-enabled
72
+ - name: cloud-trail-cloud-watch-logs-enabled
73
+ resource_types:
74
+ - AWS::CloudTrail::Trail
75
+ parameters: {}
76
+ description: Assessment for cloud-trail-cloud-watch-logs-enabled Config rule.
77
+ remediation_guidance: Follow AWS Config rule guidance for cloud-trail-cloud-watch-logs-enabled
78
+ '7.1':
79
+ title: Establish and Maintain a Vulnerability Management Process
80
+ weight: 1.0
81
+ config_rules:
82
+ - name: ecr-private-image-scanning-enabled
83
+ resource_types:
84
+ - AWS::ECR::Repository
85
+ parameters: {}
86
+ description: Assessment for ecr-private-image-scanning-enabled Config rule.
87
+ remediation_guidance: Follow AWS Config rule guidance for ecr-private-image-scanning-enabled
88
+ - name: guardduty-enabled-centralized
89
+ resource_types:
90
+ - AWS::::Account
91
+ parameters: {}
92
+ description: Assessment for guardduty-enabled-centralized Config rule.
93
+ remediation_guidance: Follow AWS Config rule guidance for guardduty-enabled-centralized
94
+ - name: ec2-managedinstance-patch-compliance-status-check
95
+ resource_types:
96
+ - AWS::EC2::Instance
97
+ parameters: {}
98
+ description: Assessment for ec2-managedinstance-patch-compliance-status-check
99
+ Config rule.
100
+ remediation_guidance: Follow AWS Config rule guidance for ec2-managedinstance-patch-compliance-status-check
@@ -0,0 +1 @@
1
+ """CIS Controls assessment implementations based on AWS Config rules."""