aws-cis-controls-assessment 1.0.6__tar.gz → 1.0.7__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {aws_cis_controls_assessment-1.0.6/aws_cis_controls_assessment.egg-info → aws_cis_controls_assessment-1.0.7}/PKG-INFO +1 -1
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/__init__.py +1 -1
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_critical_security.py +33 -36
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7/aws_cis_controls_assessment.egg-info}/PKG-INFO +1 -1
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/LICENSE +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/MANIFEST.in +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/README.md +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/cli/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/cli/examples.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/cli/main.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/cli/utils.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/config/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/config/config_loader.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/config/rules/cis_controls_ig1.yaml +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/config/rules/cis_controls_ig2.yaml +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/config/rules/cis_controls_ig3.yaml +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/base_control.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_1_1.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_2_2.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_3_3.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_3_4.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_4_1.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_access_keys.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_advanced_security.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_backup_recovery.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_cloudtrail_logging.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_data_protection.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_iam_advanced.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_iam_governance.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_iam_policies.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_instance_optimization.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_network_enhancements.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_network_security.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_s3_enhancements.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_s3_security.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig1/control_vpc_security.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_3_10.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_3_11.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_5_2.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_advanced_encryption.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_codebuild_security.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_encryption_rest.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_encryption_transit.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_network_ha.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_remaining_encryption.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_remaining_rules.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig2/control_service_logging.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig3/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig3/control_12_8.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig3/control_13_1.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig3/control_3_14.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/controls/ig3/control_7_1.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/core/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/core/accuracy_validator.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/core/assessment_engine.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/core/audit_trail.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/core/aws_client_factory.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/core/error_handler.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/core/models.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/core/scoring_engine.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/reporters/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/reporters/base_reporter.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/reporters/csv_reporter.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/reporters/html_reporter.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_assessment/reporters/json_reporter.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_controls_assessment.egg-info/SOURCES.txt +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_controls_assessment.egg-info/dependency_links.txt +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_controls_assessment.egg-info/entry_points.txt +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_controls_assessment.egg-info/requires.txt +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/aws_cis_controls_assessment.egg-info/top_level.txt +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/deprecation-package/aws_cis_assessment_deprecated/__init__.py +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/README.md +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/assessment-logic.md +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/cli-reference.md +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/config-rule-mappings.md +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/developer-guide.md +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/installation.md +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/troubleshooting.md +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/user-guide.md +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/pyproject.toml +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/pytest.ini +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/requirements.txt +0 -0
- {aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/setup.cfg +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: aws-cis-controls-assessment
|
|
3
|
-
Version: 1.0.
|
|
3
|
+
Version: 1.0.7
|
|
4
4
|
Summary: Production-ready AWS CIS Controls compliance assessment framework with 145 comprehensive rules
|
|
5
5
|
Author-email: AWS CIS Assessment Team <security@example.com>
|
|
6
6
|
Maintainer-email: AWS CIS Assessment Team <security@example.com>
|
|
@@ -6,6 +6,6 @@ CIS Controls Implementation Groups (IG1, IG2, IG3). Implements 145 comprehensive
|
|
|
6
6
|
across all implementation groups for complete security compliance assessment.
|
|
7
7
|
"""
|
|
8
8
|
|
|
9
|
-
__version__ = "1.0.
|
|
9
|
+
__version__ = "1.0.7"
|
|
10
10
|
__author__ = "AWS CIS Assessment Team"
|
|
11
11
|
__description__ = "Production-ready AWS CIS Controls Compliance Assessment Framework"
|
|
@@ -32,24 +32,31 @@ class RootAccountHardwareMFAEnabledAssessment(BaseConfigRuleAssessment):
|
|
|
32
32
|
try:
|
|
33
33
|
iam_client = aws_factory.get_client('iam', region)
|
|
34
34
|
|
|
35
|
-
# Get account summary which includes MFA device count
|
|
35
|
+
# Get account summary which includes MFA device count for root
|
|
36
36
|
account_summary = iam_client.get_account_summary()
|
|
37
|
+
summary_map = account_summary.get('SummaryMap', {})
|
|
37
38
|
|
|
38
|
-
#
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
39
|
+
# Get virtual MFA devices to check if root has hardware MFA
|
|
40
|
+
# Virtual MFA devices can be listed without specifying a user
|
|
41
|
+
try:
|
|
42
|
+
virtual_mfa_devices = iam_client.list_virtual_mfa_devices()
|
|
43
|
+
virtual_mfa_list = virtual_mfa_devices.get('VirtualMFADevices', [])
|
|
44
|
+
except ClientError as e:
|
|
45
|
+
logger.warning(f"Could not list virtual MFA devices: {e}")
|
|
46
|
+
virtual_mfa_list = []
|
|
43
47
|
|
|
44
48
|
return [{
|
|
45
49
|
'account_id': aws_factory.account_id,
|
|
46
|
-
'account_summary':
|
|
47
|
-
'
|
|
48
|
-
'virtual_mfa_devices': virtual_mfa_devices.get('VirtualMFADevices', [])
|
|
50
|
+
'account_summary': summary_map,
|
|
51
|
+
'virtual_mfa_devices': virtual_mfa_list
|
|
49
52
|
}]
|
|
50
53
|
|
|
51
54
|
except ClientError as e:
|
|
52
|
-
|
|
55
|
+
error_code = e.response.get('Error', {}).get('Code', '')
|
|
56
|
+
if error_code in ['AccessDenied', 'UnauthorizedOperation']:
|
|
57
|
+
logger.warning(f"Insufficient permissions to check root account MFA: {e}")
|
|
58
|
+
else:
|
|
59
|
+
logger.error(f"Error getting root account MFA configuration: {e}")
|
|
53
60
|
return []
|
|
54
61
|
except Exception as e:
|
|
55
62
|
logger.error(f"Unexpected error in root account MFA check: {e}")
|
|
@@ -59,15 +66,15 @@ class RootAccountHardwareMFAEnabledAssessment(BaseConfigRuleAssessment):
|
|
|
59
66
|
"""Evaluate root account hardware MFA compliance."""
|
|
60
67
|
try:
|
|
61
68
|
account_summary = resource.get('account_summary', {})
|
|
62
|
-
mfa_devices = resource.get('mfa_devices', [])
|
|
63
69
|
virtual_mfa_devices = resource.get('virtual_mfa_devices', [])
|
|
70
|
+
account_id = resource.get('account_id', 'unknown')
|
|
64
71
|
|
|
65
72
|
# Check if root account has any MFA devices
|
|
66
73
|
account_mfa_enabled = account_summary.get('AccountMFAEnabled', 0)
|
|
67
74
|
|
|
68
75
|
if account_mfa_enabled == 0:
|
|
69
76
|
return ComplianceResult(
|
|
70
|
-
resource_id=
|
|
77
|
+
resource_id=account_id,
|
|
71
78
|
resource_type="AWS::IAM::Root",
|
|
72
79
|
compliance_status=ComplianceStatus.NON_COMPLIANT,
|
|
73
80
|
evaluation_reason="Root account does not have MFA enabled",
|
|
@@ -75,42 +82,32 @@ class RootAccountHardwareMFAEnabledAssessment(BaseConfigRuleAssessment):
|
|
|
75
82
|
region=region
|
|
76
83
|
)
|
|
77
84
|
|
|
78
|
-
# Check if
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
resource_type="AWS::IAM::Root",
|
|
85
|
-
compliance_status=ComplianceStatus.NON_COMPLIANT,
|
|
86
|
-
evaluation_reason="Root account MFA is enabled but no MFA devices found",
|
|
87
|
-
config_rule_name=self.rule_name,
|
|
88
|
-
region=region
|
|
89
|
-
)
|
|
90
|
-
|
|
91
|
-
# Check if any of the root MFA devices are hardware (not virtual)
|
|
92
|
-
virtual_mfa_serial_numbers = {device.get('SerialNumber') for device in virtual_mfa_devices}
|
|
93
|
-
|
|
94
|
-
hardware_mfa_devices = [
|
|
95
|
-
device for device in root_mfa_devices
|
|
96
|
-
if device.get('SerialNumber') not in virtual_mfa_serial_numbers
|
|
85
|
+
# Check if root has a virtual MFA device
|
|
86
|
+
# Virtual MFA devices for root have SerialNumber like: arn:aws:iam::ACCOUNT_ID:mfa/root-account-mfa-device
|
|
87
|
+
root_virtual_mfa = [
|
|
88
|
+
device for device in virtual_mfa_devices
|
|
89
|
+
if 'root-account-mfa-device' in device.get('SerialNumber', '').lower()
|
|
90
|
+
or device.get('User', {}).get('Arn', '').endswith(':root')
|
|
97
91
|
]
|
|
98
92
|
|
|
99
|
-
if
|
|
93
|
+
if root_virtual_mfa:
|
|
100
94
|
return ComplianceResult(
|
|
101
|
-
resource_id=
|
|
95
|
+
resource_id=account_id,
|
|
102
96
|
resource_type="AWS::IAM::Root",
|
|
103
97
|
compliance_status=ComplianceStatus.NON_COMPLIANT,
|
|
104
|
-
evaluation_reason="Root account
|
|
98
|
+
evaluation_reason="Root account has virtual MFA enabled, hardware MFA required for enhanced security",
|
|
105
99
|
config_rule_name=self.rule_name,
|
|
106
100
|
region=region
|
|
107
101
|
)
|
|
108
102
|
|
|
103
|
+
# If MFA is enabled but no virtual MFA found, assume hardware MFA
|
|
104
|
+
# Note: We cannot definitively verify hardware MFA without root credentials,
|
|
105
|
+
# but if AccountMFAEnabled=1 and no virtual MFA exists, it's likely hardware
|
|
109
106
|
return ComplianceResult(
|
|
110
|
-
resource_id=
|
|
107
|
+
resource_id=account_id,
|
|
111
108
|
resource_type="AWS::IAM::Root",
|
|
112
109
|
compliance_status=ComplianceStatus.COMPLIANT,
|
|
113
|
-
evaluation_reason=
|
|
110
|
+
evaluation_reason="Root account has MFA enabled (likely hardware MFA - no virtual MFA detected)",
|
|
114
111
|
config_rule_name=self.rule_name,
|
|
115
112
|
region=region
|
|
116
113
|
)
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: aws-cis-controls-assessment
|
|
3
|
-
Version: 1.0.
|
|
3
|
+
Version: 1.0.7
|
|
4
4
|
Summary: Production-ready AWS CIS Controls compliance assessment framework with 145 comprehensive rules
|
|
5
5
|
Author-email: AWS CIS Assessment Team <security@example.com>
|
|
6
6
|
Maintainer-email: AWS CIS Assessment Team <security@example.com>
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/assessment-logic.md
RENAMED
|
File without changes
|
{aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/cli-reference.md
RENAMED
|
File without changes
|
{aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/config-rule-mappings.md
RENAMED
|
File without changes
|
{aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/developer-guide.md
RENAMED
|
File without changes
|
{aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/installation.md
RENAMED
|
File without changes
|
{aws_cis_controls_assessment-1.0.6 → aws_cis_controls_assessment-1.0.7}/docs/troubleshooting.md
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|