aws-cis-controls-assessment 1.0.3__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- aws_cis_assessment/__init__.py +11 -0
- aws_cis_assessment/cli/__init__.py +3 -0
- aws_cis_assessment/cli/examples.py +274 -0
- aws_cis_assessment/cli/main.py +1259 -0
- aws_cis_assessment/cli/utils.py +356 -0
- aws_cis_assessment/config/__init__.py +1 -0
- aws_cis_assessment/config/config_loader.py +328 -0
- aws_cis_assessment/config/rules/cis_controls_ig1.yaml +590 -0
- aws_cis_assessment/config/rules/cis_controls_ig2.yaml +412 -0
- aws_cis_assessment/config/rules/cis_controls_ig3.yaml +100 -0
- aws_cis_assessment/controls/__init__.py +1 -0
- aws_cis_assessment/controls/base_control.py +400 -0
- aws_cis_assessment/controls/ig1/__init__.py +239 -0
- aws_cis_assessment/controls/ig1/control_1_1.py +586 -0
- aws_cis_assessment/controls/ig1/control_2_2.py +231 -0
- aws_cis_assessment/controls/ig1/control_3_3.py +718 -0
- aws_cis_assessment/controls/ig1/control_3_4.py +235 -0
- aws_cis_assessment/controls/ig1/control_4_1.py +461 -0
- aws_cis_assessment/controls/ig1/control_access_keys.py +310 -0
- aws_cis_assessment/controls/ig1/control_advanced_security.py +512 -0
- aws_cis_assessment/controls/ig1/control_backup_recovery.py +510 -0
- aws_cis_assessment/controls/ig1/control_cloudtrail_logging.py +197 -0
- aws_cis_assessment/controls/ig1/control_critical_security.py +422 -0
- aws_cis_assessment/controls/ig1/control_data_protection.py +898 -0
- aws_cis_assessment/controls/ig1/control_iam_advanced.py +573 -0
- aws_cis_assessment/controls/ig1/control_iam_governance.py +493 -0
- aws_cis_assessment/controls/ig1/control_iam_policies.py +383 -0
- aws_cis_assessment/controls/ig1/control_instance_optimization.py +100 -0
- aws_cis_assessment/controls/ig1/control_network_enhancements.py +203 -0
- aws_cis_assessment/controls/ig1/control_network_security.py +672 -0
- aws_cis_assessment/controls/ig1/control_s3_enhancements.py +173 -0
- aws_cis_assessment/controls/ig1/control_s3_security.py +422 -0
- aws_cis_assessment/controls/ig1/control_vpc_security.py +235 -0
- aws_cis_assessment/controls/ig2/__init__.py +172 -0
- aws_cis_assessment/controls/ig2/control_3_10.py +698 -0
- aws_cis_assessment/controls/ig2/control_3_11.py +1330 -0
- aws_cis_assessment/controls/ig2/control_5_2.py +393 -0
- aws_cis_assessment/controls/ig2/control_advanced_encryption.py +355 -0
- aws_cis_assessment/controls/ig2/control_codebuild_security.py +263 -0
- aws_cis_assessment/controls/ig2/control_encryption_rest.py +382 -0
- aws_cis_assessment/controls/ig2/control_encryption_transit.py +382 -0
- aws_cis_assessment/controls/ig2/control_network_ha.py +467 -0
- aws_cis_assessment/controls/ig2/control_remaining_encryption.py +426 -0
- aws_cis_assessment/controls/ig2/control_remaining_rules.py +363 -0
- aws_cis_assessment/controls/ig2/control_service_logging.py +402 -0
- aws_cis_assessment/controls/ig3/__init__.py +49 -0
- aws_cis_assessment/controls/ig3/control_12_8.py +395 -0
- aws_cis_assessment/controls/ig3/control_13_1.py +467 -0
- aws_cis_assessment/controls/ig3/control_3_14.py +523 -0
- aws_cis_assessment/controls/ig3/control_7_1.py +359 -0
- aws_cis_assessment/core/__init__.py +1 -0
- aws_cis_assessment/core/accuracy_validator.py +425 -0
- aws_cis_assessment/core/assessment_engine.py +1266 -0
- aws_cis_assessment/core/audit_trail.py +491 -0
- aws_cis_assessment/core/aws_client_factory.py +313 -0
- aws_cis_assessment/core/error_handler.py +607 -0
- aws_cis_assessment/core/models.py +166 -0
- aws_cis_assessment/core/scoring_engine.py +459 -0
- aws_cis_assessment/reporters/__init__.py +8 -0
- aws_cis_assessment/reporters/base_reporter.py +454 -0
- aws_cis_assessment/reporters/csv_reporter.py +835 -0
- aws_cis_assessment/reporters/html_reporter.py +2162 -0
- aws_cis_assessment/reporters/json_reporter.py +561 -0
- aws_cis_controls_assessment-1.0.3.dist-info/METADATA +248 -0
- aws_cis_controls_assessment-1.0.3.dist-info/RECORD +77 -0
- aws_cis_controls_assessment-1.0.3.dist-info/WHEEL +5 -0
- aws_cis_controls_assessment-1.0.3.dist-info/entry_points.txt +2 -0
- aws_cis_controls_assessment-1.0.3.dist-info/licenses/LICENSE +21 -0
- aws_cis_controls_assessment-1.0.3.dist-info/top_level.txt +2 -0
- docs/README.md +94 -0
- docs/assessment-logic.md +766 -0
- docs/cli-reference.md +698 -0
- docs/config-rule-mappings.md +393 -0
- docs/developer-guide.md +858 -0
- docs/installation.md +299 -0
- docs/troubleshooting.md +634 -0
- docs/user-guide.md +487 -0
|
@@ -0,0 +1,412 @@
|
|
|
1
|
+
implementation_group: IG2
|
|
2
|
+
total_rules: 58
|
|
3
|
+
description: Enhanced security for enterprises with regulatory compliance burdens
|
|
4
|
+
controls:
|
|
5
|
+
'11.4':
|
|
6
|
+
title: Control 11.4
|
|
7
|
+
weight: 1.0
|
|
8
|
+
config_rules:
|
|
9
|
+
- name: elb-deletion-protection-enabled
|
|
10
|
+
resource_types:
|
|
11
|
+
- AWS::ElasticLoadBalancingV2::LoadBalancer
|
|
12
|
+
parameters: {}
|
|
13
|
+
description: Assessment for elb-deletion-protection-enabled AWS Config rule.
|
|
14
|
+
remediation_guidance: Follow AWS Config rule guidance for elb-deletion-protection-enabled
|
|
15
|
+
- name: rds-instance-deletion-protection-enabled
|
|
16
|
+
resource_types:
|
|
17
|
+
- AWS::RDS::DBInstance
|
|
18
|
+
parameters: {}
|
|
19
|
+
description: Assessment for rds-instance-deletion-protection-enabled AWS Config
|
|
20
|
+
rule.
|
|
21
|
+
remediation_guidance: Follow AWS Config rule guidance for rds-instance-deletion-protection-enabled
|
|
22
|
+
'12.2':
|
|
23
|
+
title: Control 12.2
|
|
24
|
+
weight: 1.0
|
|
25
|
+
config_rules:
|
|
26
|
+
- name: elb-cross-zone-load-balancing-enabled
|
|
27
|
+
resource_types:
|
|
28
|
+
- AWS::ElasticLoadBalancing::LoadBalancer
|
|
29
|
+
parameters: {}
|
|
30
|
+
description: Assessment for elb-cross-zone-load-balancing-enabled AWS Config
|
|
31
|
+
rule.
|
|
32
|
+
remediation_guidance: Follow AWS Config rule guidance for elb-cross-zone-load-balancing-enabled
|
|
33
|
+
- name: elbv2-multiple-az
|
|
34
|
+
resource_types:
|
|
35
|
+
- AWS::ElasticLoadBalancingV2::LoadBalancer
|
|
36
|
+
parameters: {}
|
|
37
|
+
description: Assessment for elbv2-multiple-az AWS Config rule.
|
|
38
|
+
remediation_guidance: Follow AWS Config rule guidance for elbv2-multiple-az
|
|
39
|
+
- name: rds-cluster-multi-az-enabled
|
|
40
|
+
resource_types:
|
|
41
|
+
- AWS::RDS::DBCluster
|
|
42
|
+
parameters: {}
|
|
43
|
+
description: Assessment for rds-cluster-multi-az-enabled AWS Config rule.
|
|
44
|
+
remediation_guidance: Follow AWS Config rule guidance for rds-cluster-multi-az-enabled
|
|
45
|
+
- name: rds-multi-az-support
|
|
46
|
+
resource_types:
|
|
47
|
+
- AWS::RDS::DBInstance
|
|
48
|
+
parameters: {}
|
|
49
|
+
description: Assessment for rds-multi-az-support AWS Config rule.
|
|
50
|
+
remediation_guidance: Follow AWS Config rule guidance for rds-multi-az-support
|
|
51
|
+
- name: vpc-vpn-2-tunnels-up
|
|
52
|
+
resource_types:
|
|
53
|
+
- AWS::EC2::VPNConnection
|
|
54
|
+
parameters: {}
|
|
55
|
+
description: Assessment for vpc-vpn-2-tunnels-up AWS Config rule.
|
|
56
|
+
remediation_guidance: Follow AWS Config rule guidance for vpc-vpn-2-tunnels-up
|
|
57
|
+
- name: dynamodb-autoscaling-enabled
|
|
58
|
+
resource_types:
|
|
59
|
+
- AWS::DynamoDB::Table
|
|
60
|
+
parameters: {}
|
|
61
|
+
description: Assessment for dynamodb-autoscaling-enabled AWS Config rule.
|
|
62
|
+
remediation_guidance: Follow AWS Config rule guidance for dynamodb-autoscaling-enabled
|
|
63
|
+
'3.10':
|
|
64
|
+
title: Encrypt Sensitive Data in Transit
|
|
65
|
+
weight: 1.0
|
|
66
|
+
config_rules:
|
|
67
|
+
- name: api-gw-ssl-enabled
|
|
68
|
+
resource_types:
|
|
69
|
+
- AWS::ApiGateway::Stage
|
|
70
|
+
parameters: {}
|
|
71
|
+
description: Assessment for api-gw-ssl-enabled Config rule - ensures API Gateway
|
|
72
|
+
stages have SSL certificates.
|
|
73
|
+
remediation_guidance: Follow AWS Config rule guidance for api-gw-ssl-enabled
|
|
74
|
+
- name: alb-http-to-https-redirection-check
|
|
75
|
+
resource_types:
|
|
76
|
+
- AWS::ElasticLoadBalancingV2::LoadBalancer
|
|
77
|
+
parameters: {}
|
|
78
|
+
description: Assessment for alb-http-to-https-redirection-check Config rule.
|
|
79
|
+
remediation_guidance: Follow AWS Config rule guidance for alb-http-to-https-redirection-check
|
|
80
|
+
- name: elb-tls-https-listeners-only
|
|
81
|
+
resource_types:
|
|
82
|
+
- AWS::ElasticLoadBalancing::LoadBalancer
|
|
83
|
+
parameters: {}
|
|
84
|
+
description: Assessment for elb-tls-https-listeners-only Config rule.
|
|
85
|
+
remediation_guidance: Follow AWS Config rule guidance for elb-tls-https-listeners-only
|
|
86
|
+
- name: s3-bucket-ssl-requests-only
|
|
87
|
+
resource_types:
|
|
88
|
+
- AWS::S3::Bucket
|
|
89
|
+
parameters: {}
|
|
90
|
+
description: Assessment for s3-bucket-ssl-requests-only Config rule.
|
|
91
|
+
remediation_guidance: Follow AWS Config rule guidance for s3-bucket-ssl-requests-only
|
|
92
|
+
- name: redshift-require-tls-ssl
|
|
93
|
+
resource_types:
|
|
94
|
+
- AWS::Redshift::Cluster
|
|
95
|
+
parameters: {}
|
|
96
|
+
description: Assessment for redshift-require-tls-ssl Config rule.
|
|
97
|
+
remediation_guidance: Follow AWS Config rule guidance for redshift-require-tls-ssl
|
|
98
|
+
- name: elb-acm-certificate-required
|
|
99
|
+
resource_types:
|
|
100
|
+
- AWS::ElasticLoadBalancing::LoadBalancer
|
|
101
|
+
parameters: {}
|
|
102
|
+
description: Assessment for elb-acm-certificate-required Config rule.
|
|
103
|
+
remediation_guidance: Follow AWS Config rule guidance for elb-acm-certificate-required
|
|
104
|
+
- name: elbv2-acm-certificate-required
|
|
105
|
+
resource_types:
|
|
106
|
+
- AWS::ElasticLoadBalancingV2::LoadBalancer
|
|
107
|
+
parameters: {}
|
|
108
|
+
description: Assessment for elbv2-acm-certificate-required Config rule.
|
|
109
|
+
remediation_guidance: Follow AWS Config rule guidance for elbv2-acm-certificate-required
|
|
110
|
+
- name: opensearch-https-required
|
|
111
|
+
resource_types:
|
|
112
|
+
- AWS::OpenSearch::Domain
|
|
113
|
+
parameters: {}
|
|
114
|
+
description: Assessment for opensearch-https-required Config rule.
|
|
115
|
+
remediation_guidance: Follow AWS Config rule guidance for opensearch-https-required
|
|
116
|
+
- name: opensearch-node-to-node-encryption-check
|
|
117
|
+
resource_types:
|
|
118
|
+
- AWS::OpenSearch::Domain
|
|
119
|
+
parameters: {}
|
|
120
|
+
description: Assessment for opensearch-node-to-node-encryption-check AWS Config
|
|
121
|
+
rule.
|
|
122
|
+
remediation_guidance: Follow AWS Config rule guidance for opensearch-node-to-node-encryption-check
|
|
123
|
+
'3.11':
|
|
124
|
+
title: Encrypt Sensitive Data at Rest
|
|
125
|
+
weight: 1.0
|
|
126
|
+
config_rules:
|
|
127
|
+
- name: secretsmanager-using-cmk
|
|
128
|
+
resource_types:
|
|
129
|
+
- AWS::SecretsManager::Secret
|
|
130
|
+
parameters: {}
|
|
131
|
+
description: Assessment for secretsmanager-using-cmk AWS Config rule.
|
|
132
|
+
remediation_guidance: Follow AWS Config rule guidance for secretsmanager-using-cmk
|
|
133
|
+
- name: sns-encrypted-kms
|
|
134
|
+
resource_types:
|
|
135
|
+
- AWS::SNS::Topic
|
|
136
|
+
parameters: {}
|
|
137
|
+
description: Assessment for sns-encrypted-kms AWS Config rule.
|
|
138
|
+
remediation_guidance: Follow AWS Config rule guidance for sns-encrypted-kms
|
|
139
|
+
- name: sqs-queue-encrypted-kms
|
|
140
|
+
resource_types:
|
|
141
|
+
- AWS::SQS::Queue
|
|
142
|
+
parameters: {}
|
|
143
|
+
description: Assessment for sqs-queue-encrypted-kms AWS Config rule.
|
|
144
|
+
remediation_guidance: Follow AWS Config rule guidance for sqs-queue-encrypted-kms
|
|
145
|
+
- name: kinesis-stream-encrypted
|
|
146
|
+
resource_types:
|
|
147
|
+
- AWS::Kinesis::Stream
|
|
148
|
+
parameters: {}
|
|
149
|
+
description: Assessment for kinesis-stream-encrypted AWS Config rule.
|
|
150
|
+
remediation_guidance: Follow AWS Config rule guidance for kinesis-stream-encrypted
|
|
151
|
+
- name: elasticsearch-encrypted-at-rest
|
|
152
|
+
resource_types:
|
|
153
|
+
- AWS::Elasticsearch::Domain
|
|
154
|
+
parameters: {}
|
|
155
|
+
description: Assessment for elasticsearch-encrypted-at-rest AWS Config rule.
|
|
156
|
+
remediation_guidance: Follow AWS Config rule guidance for elasticsearch-encrypted-at-rest
|
|
157
|
+
- name: encrypted-volumes
|
|
158
|
+
resource_types:
|
|
159
|
+
- AWS::EC2::Volume
|
|
160
|
+
parameters: {}
|
|
161
|
+
description: Assessment for encrypted-volumes Config rule - ensures EBS volumes
|
|
162
|
+
are encrypted.
|
|
163
|
+
remediation_guidance: Follow AWS Config rule guidance for encrypted-volumes
|
|
164
|
+
- name: rds-storage-encrypted
|
|
165
|
+
resource_types:
|
|
166
|
+
- AWS::RDS::DBInstance
|
|
167
|
+
parameters: {}
|
|
168
|
+
description: Assessment for rds-storage-encrypted Config rule - ensures RDS
|
|
169
|
+
instances have storage encryption.
|
|
170
|
+
remediation_guidance: Follow AWS Config rule guidance for rds-storage-encrypted
|
|
171
|
+
- name: s3-default-encryption-kms
|
|
172
|
+
resource_types:
|
|
173
|
+
- AWS::S3::Bucket
|
|
174
|
+
parameters: {}
|
|
175
|
+
description: Assessment for s3-default-encryption-kms Config rule - ensures
|
|
176
|
+
S3 buckets have default KMS encryption.
|
|
177
|
+
remediation_guidance: Follow AWS Config rule guidance for s3-default-encryption-kms
|
|
178
|
+
- name: dynamodb-table-encrypted-kms
|
|
179
|
+
resource_types:
|
|
180
|
+
- AWS::DynamoDB::Table
|
|
181
|
+
parameters: {}
|
|
182
|
+
description: Assessment for dynamodb-table-encrypted-kms Config rule - ensures
|
|
183
|
+
DynamoDB tables are encrypted with KMS.
|
|
184
|
+
remediation_guidance: Follow AWS Config rule guidance for dynamodb-table-encrypted-kms
|
|
185
|
+
- name: backup-recovery-point-encrypted
|
|
186
|
+
resource_types:
|
|
187
|
+
- AWS::Backup::RecoveryPoint
|
|
188
|
+
parameters: {}
|
|
189
|
+
description: Assessment for backup-recovery-point-encrypted Config rule - ensures
|
|
190
|
+
AWS Backup recovery points are encrypted.
|
|
191
|
+
remediation_guidance: Follow AWS Config rule guidance for backup-recovery-point-encrypted
|
|
192
|
+
- name: efs-encrypted-check
|
|
193
|
+
resource_types:
|
|
194
|
+
- AWS::EFS::FileSystem
|
|
195
|
+
parameters: {}
|
|
196
|
+
description: Assessment for efs-encrypted-check Config rule - ensures EFS file
|
|
197
|
+
systems are encrypted.
|
|
198
|
+
remediation_guidance: Follow AWS Config rule guidance for efs-encrypted-check
|
|
199
|
+
- name: secretsmanager-using-cmk
|
|
200
|
+
resource_types:
|
|
201
|
+
- AWS::SecretsManager::Secret
|
|
202
|
+
parameters: {}
|
|
203
|
+
description: Assessment for secretsmanager-using-cmk Config rule - ensures Secrets
|
|
204
|
+
Manager secrets use KMS keys.
|
|
205
|
+
remediation_guidance: Follow AWS Config rule guidance for secretsmanager-using-cmk
|
|
206
|
+
- name: sns-encrypted-kms
|
|
207
|
+
resource_types:
|
|
208
|
+
- AWS::SNS::Topic
|
|
209
|
+
parameters: {}
|
|
210
|
+
description: Assessment for sns-encrypted-kms Config rule - ensures SNS topics
|
|
211
|
+
are encrypted with KMS.
|
|
212
|
+
remediation_guidance: Follow AWS Config rule guidance for sns-encrypted-kms
|
|
213
|
+
- name: sqs-queue-encrypted-kms
|
|
214
|
+
resource_types:
|
|
215
|
+
- AWS::SQS::Queue
|
|
216
|
+
parameters: {}
|
|
217
|
+
description: Assessment for sqs-queue-encrypted-kms Config rule - ensures SQS
|
|
218
|
+
queues are encrypted with KMS.
|
|
219
|
+
remediation_guidance: Follow AWS Config rule guidance for sqs-queue-encrypted-kms
|
|
220
|
+
- name: cloudwatch-log-group-encrypted
|
|
221
|
+
resource_types:
|
|
222
|
+
- AWS::Logs::LogGroup
|
|
223
|
+
parameters: {}
|
|
224
|
+
description: Assessment for cloudwatch-log-group-encrypted Config rule - ensures
|
|
225
|
+
CloudWatch log groups are encrypted.
|
|
226
|
+
remediation_guidance: Follow AWS Config rule guidance for cloudwatch-log-group-encrypted
|
|
227
|
+
- name: kinesis-stream-encrypted
|
|
228
|
+
resource_types:
|
|
229
|
+
- AWS::Kinesis::Stream
|
|
230
|
+
parameters: {}
|
|
231
|
+
description: Assessment for kinesis-stream-encrypted Config rule - ensures Kinesis
|
|
232
|
+
streams are encrypted.
|
|
233
|
+
remediation_guidance: Follow AWS Config rule guidance for kinesis-stream-encrypted
|
|
234
|
+
- name: elasticsearch-encrypted-at-rest
|
|
235
|
+
resource_types:
|
|
236
|
+
- AWS::Elasticsearch::Domain
|
|
237
|
+
parameters: {}
|
|
238
|
+
description: Assessment for elasticsearch-encrypted-at-rest Config rule - ensures
|
|
239
|
+
Elasticsearch domains are encrypted at rest.
|
|
240
|
+
remediation_guidance: Follow AWS Config rule guidance for elasticsearch-encrypted-at-rest
|
|
241
|
+
- name: cloud-trail-encryption-enabled
|
|
242
|
+
resource_types:
|
|
243
|
+
- AWS::CloudTrail::Trail
|
|
244
|
+
parameters: {}
|
|
245
|
+
description: Assessment for cloud-trail-encryption-enabled Config rule.
|
|
246
|
+
remediation_guidance: Follow AWS Config rule guidance for cloud-trail-encryption-enabled
|
|
247
|
+
- name: efs-encrypted-check
|
|
248
|
+
resource_types:
|
|
249
|
+
- AWS::EFS::FileSystem
|
|
250
|
+
parameters: {}
|
|
251
|
+
description: Assessment for efs-encrypted-check Config rule.
|
|
252
|
+
remediation_guidance: Follow AWS Config rule guidance for efs-encrypted-check
|
|
253
|
+
- name: ec2-ebs-encryption-by-default
|
|
254
|
+
resource_types:
|
|
255
|
+
- AWS::::Account
|
|
256
|
+
parameters: {}
|
|
257
|
+
description: Assessment for ec2-ebs-encryption-by-default Config rule.
|
|
258
|
+
remediation_guidance: Follow AWS Config rule guidance for ec2-ebs-encryption-by-default
|
|
259
|
+
- name: rds-snapshot-encrypted
|
|
260
|
+
resource_types:
|
|
261
|
+
- AWS::RDS::DBSnapshot
|
|
262
|
+
- AWS::RDS::DBClusterSnapshot
|
|
263
|
+
parameters: {}
|
|
264
|
+
description: Assessment for rds-snapshot-encrypted Config rule.
|
|
265
|
+
remediation_guidance: Follow AWS Config rule guidance for rds-snapshot-encrypted
|
|
266
|
+
- name: opensearch-encrypted-at-rest
|
|
267
|
+
resource_types:
|
|
268
|
+
- AWS::OpenSearch::Domain
|
|
269
|
+
parameters: {}
|
|
270
|
+
description: Assessment for opensearch-encrypted-at-rest AWS Config rule.
|
|
271
|
+
remediation_guidance: Follow AWS Config rule guidance for opensearch-encrypted-at-rest
|
|
272
|
+
- name: redshift-cluster-kms-enabled
|
|
273
|
+
resource_types:
|
|
274
|
+
- AWS::Redshift::Cluster
|
|
275
|
+
parameters: {}
|
|
276
|
+
description: Assessment for redshift-cluster-kms-enabled AWS Config rule.
|
|
277
|
+
remediation_guidance: Follow AWS Config rule guidance for redshift-cluster-kms-enabled
|
|
278
|
+
- name: sagemaker-endpoint-configuration-kms-key-configured
|
|
279
|
+
resource_types:
|
|
280
|
+
- AWS::SageMaker::EndpointConfig
|
|
281
|
+
parameters: {}
|
|
282
|
+
description: Assessment for sagemaker-endpoint-configuration-kms-key-configured
|
|
283
|
+
AWS Config rule.
|
|
284
|
+
remediation_guidance: Follow AWS Config rule guidance for sagemaker-endpoint-configuration-kms-key-configured
|
|
285
|
+
- name: sagemaker-notebook-instance-kms-key-configured
|
|
286
|
+
resource_types:
|
|
287
|
+
- AWS::SageMaker::NotebookInstance
|
|
288
|
+
parameters: {}
|
|
289
|
+
description: Assessment for sagemaker-notebook-instance-kms-key-configured AWS
|
|
290
|
+
Config rule.
|
|
291
|
+
remediation_guidance: Follow AWS Config rule guidance for sagemaker-notebook-instance-kms-key-configured
|
|
292
|
+
- name: codebuild-project-artifact-encryption
|
|
293
|
+
resource_types:
|
|
294
|
+
- AWS::CodeBuild::Project
|
|
295
|
+
parameters: {}
|
|
296
|
+
description: Assessment for codebuild-project-artifact-encryption AWS Config
|
|
297
|
+
rule.
|
|
298
|
+
remediation_guidance: Follow AWS Config rule guidance for codebuild-project-artifact-encryption
|
|
299
|
+
'3.3':
|
|
300
|
+
title: Configure Data Access Control Lists
|
|
301
|
+
weight: 1.0
|
|
302
|
+
config_rules:
|
|
303
|
+
- name: redshift-enhanced-vpc-routing-enabled
|
|
304
|
+
resource_types:
|
|
305
|
+
- AWS::Redshift::Cluster
|
|
306
|
+
parameters: {}
|
|
307
|
+
description: Assessment for redshift-enhanced-vpc-routing-enabled AWS Config
|
|
308
|
+
rule.
|
|
309
|
+
remediation_guidance: Follow AWS Config rule guidance for redshift-enhanced-vpc-routing-enabled
|
|
310
|
+
- name: restricted-common-ports
|
|
311
|
+
resource_types:
|
|
312
|
+
- AWS::EC2::SecurityGroup
|
|
313
|
+
parameters: {}
|
|
314
|
+
description: Assessment for restricted-common-ports AWS Config rule.
|
|
315
|
+
remediation_guidance: Follow AWS Config rule guidance for restricted-common-ports
|
|
316
|
+
- name: codebuild-project-environment-privileged-check
|
|
317
|
+
resource_types:
|
|
318
|
+
- AWS::CodeBuild::Project
|
|
319
|
+
parameters: {}
|
|
320
|
+
description: Assessment for codebuild-project-environment-privileged-check AWS
|
|
321
|
+
Config rule.
|
|
322
|
+
remediation_guidance: Follow AWS Config rule guidance for codebuild-project-environment-privileged-check
|
|
323
|
+
- name: codebuild-project-envvar-awscred-check
|
|
324
|
+
resource_types:
|
|
325
|
+
- AWS::CodeBuild::Project
|
|
326
|
+
parameters: {}
|
|
327
|
+
description: Assessment for codebuild-project-envvar-awscred-check AWS Config
|
|
328
|
+
rule.
|
|
329
|
+
remediation_guidance: Follow AWS Config rule guidance for codebuild-project-envvar-awscred-check
|
|
330
|
+
- name: codebuild-project-source-repo-url-check
|
|
331
|
+
resource_types:
|
|
332
|
+
- AWS::CodeBuild::Project
|
|
333
|
+
parameters: {}
|
|
334
|
+
description: Assessment for codebuild-project-source-repo-url-check AWS Config
|
|
335
|
+
rule.
|
|
336
|
+
remediation_guidance: Follow AWS Config rule guidance for codebuild-project-source-repo-url-check
|
|
337
|
+
'4.1':
|
|
338
|
+
title: Establish and Maintain a Secure Configuration Process
|
|
339
|
+
weight: 1.0
|
|
340
|
+
config_rules:
|
|
341
|
+
- name: acm-certificate-expiration-check
|
|
342
|
+
resource_types:
|
|
343
|
+
- AWS::ACM::Certificate
|
|
344
|
+
parameters: {}
|
|
345
|
+
description: Assessment for acm-certificate-expiration-check AWS Config rule.
|
|
346
|
+
remediation_guidance: Follow AWS Config rule guidance for acm-certificate-expiration-check
|
|
347
|
+
'5.2':
|
|
348
|
+
title: Use Unique Passwords
|
|
349
|
+
weight: 1.0
|
|
350
|
+
config_rules:
|
|
351
|
+
- name: mfa-enabled-for-iam-console-access
|
|
352
|
+
resource_types:
|
|
353
|
+
- AWS::IAM::User
|
|
354
|
+
parameters: {}
|
|
355
|
+
description: Assessment for mfa-enabled-for-iam-console-access Config rule -
|
|
356
|
+
ensures MFA for console access.
|
|
357
|
+
remediation_guidance: Follow AWS Config rule guidance for mfa-enabled-for-iam-console-access
|
|
358
|
+
- name: root-account-mfa-enabled
|
|
359
|
+
resource_types:
|
|
360
|
+
- AWS::::Account
|
|
361
|
+
parameters: {}
|
|
362
|
+
description: Assessment for root-account-mfa-enabled Config rule - ensures root
|
|
363
|
+
account has MFA.
|
|
364
|
+
remediation_guidance: Follow AWS Config rule guidance for root-account-mfa-enabled
|
|
365
|
+
- name: iam-user-unused-credentials-check
|
|
366
|
+
resource_types:
|
|
367
|
+
- AWS::IAM::User
|
|
368
|
+
parameters: {}
|
|
369
|
+
description: Assessment for iam-user-unused-credentials-check Config rule -
|
|
370
|
+
identifies unused credentials.
|
|
371
|
+
remediation_guidance: Follow AWS Config rule guidance for iam-user-unused-credentials-check
|
|
372
|
+
'8.2':
|
|
373
|
+
title: Control 8.2
|
|
374
|
+
weight: 1.0
|
|
375
|
+
config_rules:
|
|
376
|
+
- name: elasticsearch-logs-to-cloudwatch
|
|
377
|
+
resource_types:
|
|
378
|
+
- AWS::Elasticsearch::Domain
|
|
379
|
+
parameters: {}
|
|
380
|
+
description: Assessment for elasticsearch-logs-to-cloudwatch AWS Config rule.
|
|
381
|
+
remediation_guidance: Follow AWS Config rule guidance for elasticsearch-logs-to-cloudwatch
|
|
382
|
+
- name: elb-logging-enabled
|
|
383
|
+
resource_types:
|
|
384
|
+
- AWS::ElasticLoadBalancing::LoadBalancer
|
|
385
|
+
parameters: {}
|
|
386
|
+
description: Assessment for elb-logging-enabled AWS Config rule.
|
|
387
|
+
remediation_guidance: Follow AWS Config rule guidance for elb-logging-enabled
|
|
388
|
+
- name: rds-logging-enabled
|
|
389
|
+
resource_types:
|
|
390
|
+
- AWS::RDS::DBInstance
|
|
391
|
+
parameters: {}
|
|
392
|
+
description: Assessment for rds-logging-enabled AWS Config rule.
|
|
393
|
+
remediation_guidance: Follow AWS Config rule guidance for rds-logging-enabled
|
|
394
|
+
- name: wafv2-logging-enabled
|
|
395
|
+
resource_types:
|
|
396
|
+
- AWS::WAFv2::WebACL
|
|
397
|
+
parameters: {}
|
|
398
|
+
description: Assessment for wafv2-logging-enabled AWS Config rule.
|
|
399
|
+
remediation_guidance: Follow AWS Config rule guidance for wafv2-logging-enabled
|
|
400
|
+
- name: codebuild-project-logging-enabled
|
|
401
|
+
resource_types:
|
|
402
|
+
- AWS::CodeBuild::Project
|
|
403
|
+
parameters: {}
|
|
404
|
+
description: Assessment for codebuild-project-logging-enabled AWS Config rule.
|
|
405
|
+
remediation_guidance: Follow AWS Config rule guidance for codebuild-project-logging-enabled
|
|
406
|
+
- name: redshift-cluster-configuration-check
|
|
407
|
+
resource_types:
|
|
408
|
+
- AWS::Redshift::Cluster
|
|
409
|
+
parameters: {}
|
|
410
|
+
description: Assessment for redshift-cluster-configuration-check AWS Config
|
|
411
|
+
rule.
|
|
412
|
+
remediation_guidance: Follow AWS Config rule guidance for redshift-cluster-configuration-check
|
|
@@ -0,0 +1,100 @@
|
|
|
1
|
+
implementation_group: IG3
|
|
2
|
+
total_rules: 13
|
|
3
|
+
description: Advanced security for enterprises with high-risk environments
|
|
4
|
+
controls:
|
|
5
|
+
'12.8':
|
|
6
|
+
title: Establish and Maintain Dedicated Computing Resources for All Administrative
|
|
7
|
+
Work
|
|
8
|
+
weight: 1.0
|
|
9
|
+
config_rules:
|
|
10
|
+
- name: api-gw-associated-with-waf
|
|
11
|
+
resource_types:
|
|
12
|
+
- AWS::ApiGateway::Stage
|
|
13
|
+
parameters: {}
|
|
14
|
+
description: Assessment for api-gw-associated-with-waf Config rule.
|
|
15
|
+
remediation_guidance: Follow AWS Config rule guidance for api-gw-associated-with-waf
|
|
16
|
+
- name: vpc-sg-open-only-to-authorized-ports
|
|
17
|
+
resource_types:
|
|
18
|
+
- AWS::EC2::SecurityGroup
|
|
19
|
+
parameters: {}
|
|
20
|
+
description: Assessment for vpc-sg-open-only-to-authorized-ports Config rule.
|
|
21
|
+
remediation_guidance: Follow AWS Config rule guidance for vpc-sg-open-only-to-authorized-ports
|
|
22
|
+
- name: no-unrestricted-route-to-igw
|
|
23
|
+
resource_types:
|
|
24
|
+
- AWS::EC2::RouteTable
|
|
25
|
+
parameters: {}
|
|
26
|
+
description: Assessment for no-unrestricted-route-to-igw Config rule.
|
|
27
|
+
remediation_guidance: Follow AWS Config rule guidance for no-unrestricted-route-to-igw
|
|
28
|
+
'13.1':
|
|
29
|
+
title: Centralize Security Event Alerting
|
|
30
|
+
weight: 1.0
|
|
31
|
+
config_rules:
|
|
32
|
+
- name: restricted-incoming-traffic
|
|
33
|
+
resource_types:
|
|
34
|
+
- AWS::EC2::SecurityGroup
|
|
35
|
+
parameters: {}
|
|
36
|
+
description: Assessment for restricted-incoming-traffic Config rule.
|
|
37
|
+
remediation_guidance: Follow AWS Config rule guidance for restricted-incoming-traffic
|
|
38
|
+
- name: incoming-ssh-disabled
|
|
39
|
+
resource_types:
|
|
40
|
+
- AWS::EC2::SecurityGroup
|
|
41
|
+
parameters: {}
|
|
42
|
+
description: Assessment for incoming-ssh-disabled Config rule.
|
|
43
|
+
remediation_guidance: Follow AWS Config rule guidance for incoming-ssh-disabled
|
|
44
|
+
- name: vpc-flow-logs-enabled
|
|
45
|
+
resource_types:
|
|
46
|
+
- AWS::EC2::VPC
|
|
47
|
+
parameters: {}
|
|
48
|
+
description: Assessment for VPC Flow Logs enabled for network monitoring.
|
|
49
|
+
remediation_guidance: Follow AWS Config rule guidance for vpc-flow-logs-enabled
|
|
50
|
+
'3.14':
|
|
51
|
+
title: Log Sensitive Data Access
|
|
52
|
+
weight: 1.0
|
|
53
|
+
config_rules:
|
|
54
|
+
- name: api-gw-execution-logging-enabled
|
|
55
|
+
resource_types:
|
|
56
|
+
- AWS::ApiGateway::Stage
|
|
57
|
+
parameters: {}
|
|
58
|
+
description: Assessment for api-gw-execution-logging-enabled Config rule.
|
|
59
|
+
remediation_guidance: Follow AWS Config rule guidance for api-gw-execution-logging-enabled
|
|
60
|
+
- name: cloudtrail-s3-dataevents-enabled
|
|
61
|
+
resource_types:
|
|
62
|
+
- AWS::CloudTrail::Trail
|
|
63
|
+
parameters: {}
|
|
64
|
+
description: Assessment for cloudtrail-s3-dataevents-enabled Config rule.
|
|
65
|
+
remediation_guidance: Follow AWS Config rule guidance for cloudtrail-s3-dataevents-enabled
|
|
66
|
+
- name: multi-region-cloudtrail-enabled
|
|
67
|
+
resource_types:
|
|
68
|
+
- AWS::::Account
|
|
69
|
+
parameters: {}
|
|
70
|
+
description: Assessment for multi-region-cloudtrail-enabled Config rule.
|
|
71
|
+
remediation_guidance: Follow AWS Config rule guidance for multi-region-cloudtrail-enabled
|
|
72
|
+
- name: cloud-trail-cloud-watch-logs-enabled
|
|
73
|
+
resource_types:
|
|
74
|
+
- AWS::CloudTrail::Trail
|
|
75
|
+
parameters: {}
|
|
76
|
+
description: Assessment for cloud-trail-cloud-watch-logs-enabled Config rule.
|
|
77
|
+
remediation_guidance: Follow AWS Config rule guidance for cloud-trail-cloud-watch-logs-enabled
|
|
78
|
+
'7.1':
|
|
79
|
+
title: Establish and Maintain a Vulnerability Management Process
|
|
80
|
+
weight: 1.0
|
|
81
|
+
config_rules:
|
|
82
|
+
- name: ecr-private-image-scanning-enabled
|
|
83
|
+
resource_types:
|
|
84
|
+
- AWS::ECR::Repository
|
|
85
|
+
parameters: {}
|
|
86
|
+
description: Assessment for ecr-private-image-scanning-enabled Config rule.
|
|
87
|
+
remediation_guidance: Follow AWS Config rule guidance for ecr-private-image-scanning-enabled
|
|
88
|
+
- name: guardduty-enabled-centralized
|
|
89
|
+
resource_types:
|
|
90
|
+
- AWS::::Account
|
|
91
|
+
parameters: {}
|
|
92
|
+
description: Assessment for guardduty-enabled-centralized Config rule.
|
|
93
|
+
remediation_guidance: Follow AWS Config rule guidance for guardduty-enabled-centralized
|
|
94
|
+
- name: ec2-managedinstance-patch-compliance-status-check
|
|
95
|
+
resource_types:
|
|
96
|
+
- AWS::EC2::Instance
|
|
97
|
+
parameters: {}
|
|
98
|
+
description: Assessment for ec2-managedinstance-patch-compliance-status-check
|
|
99
|
+
Config rule.
|
|
100
|
+
remediation_guidance: Follow AWS Config rule guidance for ec2-managedinstance-patch-compliance-status-check
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
"""CIS Controls assessment implementations based on AWS Config rules."""
|