aws-cis-controls-assessment 1.0.9__py3-none-any.whl → 1.0.10__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -92,6 +92,13 @@ from .control_remaining_rules import (
92
92
  AuditLogPolicyExistsAssessment
93
93
  )
94
94
 
95
+ # Import AWS Backup IG2 controls
96
+ from .control_aws_backup_ig2 import (
97
+ BackupVaultLockCheckAssessment,
98
+ BackupReportPlanExistsCheckAssessment,
99
+ BackupRestoreTestingPlanExistsCheckAssessment
100
+ )
101
+
95
102
  __all__ = [
96
103
  # Control 3.10 - Encrypt Sensitive Data in Transit
97
104
  'APIGatewaySSLEnabledAssessment',
@@ -165,6 +172,11 @@ __all__ = [
165
172
  'RestrictedCommonPortsAssessment',
166
173
  'AuditLogPolicyExistsAssessment',
167
174
 
175
+ # AWS Backup IG2 Controls
176
+ 'BackupVaultLockCheckAssessment',
177
+ 'BackupReportPlanExistsCheckAssessment',
178
+ 'BackupRestoreTestingPlanExistsCheckAssessment',
179
+
168
180
  # Control 5.2 - Use Unique Passwords
169
181
  'MFAEnabledForIAMConsoleAccessAssessment',
170
182
  'RootAccountMFAEnabledAssessment',
@@ -0,0 +1,23 @@
1
+ """AWS Backup Service Controls for IG2 - Advanced backup infrastructure assessment.
2
+
3
+ This module implements IG2-level AWS Backup service controls that assess
4
+ advanced backup capabilities like vault lock, reporting, and restore testing.
5
+
6
+ Controls:
7
+ - backup-vault-lock-check: Verifies vault lock (ransomware protection)
8
+ - backup-report-plan-exists-check: Validates backup compliance reporting
9
+ - backup-restore-testing-plan-exists-check: Ensures backups are recoverable
10
+ """
11
+
12
+ # Import the IG2 controls from the IG1 module since they're all in the same file
13
+ from aws_cis_assessment.controls.ig1.control_aws_backup_service import (
14
+ BackupVaultLockCheckAssessment,
15
+ BackupReportPlanExistsCheckAssessment,
16
+ BackupRestoreTestingPlanExistsCheckAssessment
17
+ )
18
+
19
+ __all__ = [
20
+ 'BackupVaultLockCheckAssessment',
21
+ 'BackupReportPlanExistsCheckAssessment',
22
+ 'BackupRestoreTestingPlanExistsCheckAssessment'
23
+ ]
@@ -95,6 +95,11 @@ from aws_cis_assessment.controls.ig1.control_backup_recovery import (
95
95
  DBInstanceBackupEnabledAssessment, RedshiftBackupEnabledAssessment, DynamoDBPITREnabledAssessment,
96
96
  ElastiCacheRedisClusterAutomaticBackupCheckAssessment, S3BucketReplicationEnabledAssessment
97
97
  )
98
+ from aws_cis_assessment.controls.ig1.control_aws_backup_service import (
99
+ BackupPlanMinFrequencyAndMinRetentionCheckAssessment,
100
+ BackupVaultAccessPolicyCheckAssessment,
101
+ BackupSelectionResourceCoverageCheckAssessment
102
+ )
98
103
  from aws_cis_assessment.controls.ig1.control_s3_enhancements import (
99
104
  S3AccountLevelPublicAccessBlocksPeriodicAssessment, S3BucketPublicWriteProhibitedAssessment
100
105
  )
@@ -151,6 +156,11 @@ from aws_cis_assessment.controls.ig2.control_remaining_rules import (
151
156
  RedshiftEnhancedVPCRoutingEnabledAssessment, RestrictedCommonPortsAssessment,
152
157
  AuditLogPolicyExistsAssessment
153
158
  )
159
+ from aws_cis_assessment.controls.ig2.control_aws_backup_ig2 import (
160
+ BackupVaultLockCheckAssessment,
161
+ BackupReportPlanExistsCheckAssessment,
162
+ BackupRestoreTestingPlanExistsCheckAssessment
163
+ )
154
164
  from aws_cis_assessment.controls.ig3.control_3_14 import (
155
165
  APIGatewayExecutionLoggingEnabledAssessment, CloudTrailS3DataEventsEnabledAssessment,
156
166
  MultiRegionCloudTrailEnabledAssessment, CloudTrailCloudWatchLogsEnabledAssessment
@@ -412,6 +422,11 @@ class AssessmentEngine:
412
422
  'elasticache-redis-cluster-automatic-backup-check': ElastiCacheRedisClusterAutomaticBackupCheckAssessment(),
413
423
  's3-bucket-replication-enabled': S3BucketReplicationEnabledAssessment(),
414
424
 
425
+ # AWS Backup Service Controls (IG1)
426
+ 'backup-plan-min-frequency-and-min-retention-check': BackupPlanMinFrequencyAndMinRetentionCheckAssessment(),
427
+ 'backup-vault-access-policy-check': BackupVaultAccessPolicyCheckAssessment(),
428
+ 'backup-selection-resource-coverage-check': BackupSelectionResourceCoverageCheckAssessment(),
429
+
415
430
  # S3 Security Enhancements
416
431
  's3-account-level-public-access-blocks-periodic': S3AccountLevelPublicAccessBlocksPeriodicAssessment(),
417
432
  's3-bucket-public-write-prohibited': S3BucketPublicWriteProhibitedAssessment(),
@@ -488,6 +503,11 @@ class AssessmentEngine:
488
503
  'redshift-enhanced-vpc-routing-enabled': RedshiftEnhancedVPCRoutingEnabledAssessment(),
489
504
  'restricted-common-ports': RestrictedCommonPortsAssessment(),
490
505
  'audit-log-policy-exists (Process check)': AuditLogPolicyExistsAssessment(),
506
+
507
+ # AWS Backup Service Controls (IG2)
508
+ 'backup-vault-lock-check': BackupVaultLockCheckAssessment(),
509
+ 'backup-report-plan-exists-check': BackupReportPlanExistsCheckAssessment(),
510
+ 'backup-restore-testing-plan-exists-check': BackupRestoreTestingPlanExistsCheckAssessment(),
491
511
  },
492
512
  'IG3': {
493
513
  # Control 3.14 - Sensitive Data Logging
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: aws-cis-controls-assessment
3
- Version: 1.0.9
3
+ Version: 1.0.10
4
4
  Summary: Production-ready AWS CIS Controls compliance assessment framework with 145 comprehensive rules
5
5
  Author-email: AWS CIS Assessment Team <security@example.com>
6
6
  Maintainer-email: AWS CIS Assessment Team <security@example.com>
@@ -57,19 +57,20 @@ Dynamic: license-file
57
57
 
58
58
  # AWS CIS Controls Compliance Assessment Framework
59
59
 
60
- A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 131 implemented rules plus 5 bonus security enhancements.
60
+ A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 133 implemented rules plus 5 bonus security enhancements.
61
61
 
62
62
  > **Production Status**: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend [AWS Config](https://aws.amazon.com/config/) for ongoing continuous compliance monitoring and automated remediation.
63
63
 
64
64
  ## 🎯 Key Features
65
65
 
66
- - **✅ Complete Coverage**: 131/131 CIS Controls rules implemented (100% coverage)
66
+ - **✅ Complete Coverage**: 137/137 CIS Controls rules implemented (100% coverage)
67
67
  - **✅ Dual Scoring System**: Both weighted and AWS Config-style scoring methodologies
68
68
  - **✅ Enterprise Ready**: Production-tested with enterprise-grade architecture
69
69
  - **✅ Performance Optimized**: Handles large-scale assessments efficiently
70
70
  - **✅ Multi-Format Reports**: JSON, HTML, and CSV with detailed remediation guidance
71
71
  - **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
72
72
  - **✅ Bonus Security Rules**: 5 additional security enhancements beyond CIS requirements
73
+ - **✅ AWS Backup Controls**: 6 comprehensive backup infrastructure controls (3 IG1 + 3 IG2)
73
74
 
74
75
  ## 🚀 Quick Start
75
76
 
@@ -88,7 +89,7 @@ pip install -e .
88
89
  ### Basic Usage
89
90
 
90
91
  ```bash
91
- # Run complete assessment (all 136 rules) - defaults to us-east-1
92
+ # Run complete assessment (all 142 rules) - defaults to us-east-1
92
93
  aws-cis-assess assess --aws-profile my-aws-profile
93
94
 
94
95
  # Assess multiple regions
@@ -109,19 +110,19 @@ aws-cis-assess assess --output-format json
109
110
 
110
111
  ## 📊 Implementation Groups Coverage
111
112
 
112
- ### IG1 - Essential Cyber Hygiene (93 Rules) ✅
113
+ ### IG1 - Essential Cyber Hygiene (96 Rules) ✅
113
114
  **100% Coverage Achieved**
114
115
  - Asset Inventory and Management (6 rules)
115
116
  - Identity and Access Management (15 rules)
116
117
  - Data Protection and Encryption (8 rules)
117
118
  - Network Security Controls (20 rules)
118
119
  - Logging and Monitoring (13 rules)
119
- - Backup and Recovery (12 rules)
120
+ - Backup and Recovery (17 rules) - **NEW: 6 AWS Backup service controls added (3 IG1 + 3 IG2)**
120
121
  - Security Services Integration (5 rules)
121
122
  - Configuration Management (9 rules)
122
123
  - Vulnerability Management (5 rules)
123
124
 
124
- ### IG2 - Enhanced Security (+37 Rules) ✅
125
+ ### IG2 - Enhanced Security (+40 Rules) ✅
125
126
  **100% Coverage Achieved**
126
127
  - Advanced Encryption at Rest (6 rules)
127
128
  - Certificate Management (2 rules)
@@ -132,6 +133,7 @@ aws-cis-assess assess --output-format json
132
133
  - Network Segmentation (5 rules)
133
134
  - Auto-scaling Security (1 rule)
134
135
  - Enhanced Access Controls (8 rules)
136
+ - AWS Backup Advanced Controls (3 rules) - **NEW: Vault lock, reporting, restore testing**
135
137
 
136
138
  ### IG3 - Advanced Security (+1 Rule) ✅
137
139
  **100% Coverage Achieved**
@@ -151,7 +153,7 @@ aws-cis-assess assess --output-format json
151
153
 
152
154
  ### Core Components
153
155
  - **Assessment Engine**: Orchestrates compliance evaluations across all AWS regions
154
- - **Control Assessments**: 136 individual rule implementations with robust error handling
156
+ - **Control Assessments**: 138 individual rule implementations with robust error handling
155
157
  - **Scoring Engine**: Calculates compliance scores and generates executive metrics
156
158
  - **Reporting System**: Multi-format output with detailed remediation guidance
157
159
  - **Resource Management**: Optimized for enterprise-scale deployments with memory management
@@ -247,7 +249,48 @@ MIT License - see [LICENSE](LICENSE) file for details.
247
249
 
248
250
  ---
249
251
 
250
- **Framework Version**: 1.0.0+
251
- **CIS Controls Coverage**: 131/131 rules (100%) + 5 bonus rules
252
+ **Framework Version**: 1.0.10 (in development)
253
+ **CIS Controls Coverage**: 137/137 rules (100%) + 5 bonus rules
252
254
  **Production Status**: ✅ Ready for immediate enterprise deployment
253
255
  **Last Updated**: January 2026
256
+
257
+ ## 🆕 What's New in Version 1.0.10
258
+
259
+ ### AWS Backup Service Controls
260
+ Six new controls added to assess AWS Backup infrastructure:
261
+
262
+ **IG1 Controls (3)**:
263
+ 1. **backup-plan-min-frequency-and-min-retention-check** - Validates backup plans have appropriate frequency and retention policies
264
+ - Ensures backup plans have at least one rule defined
265
+ - Validates schedule expressions (cron or rate)
266
+ - Checks retention periods meet minimum requirements (default: 7 days)
267
+ - Validates lifecycle policies for cold storage transitions
268
+
269
+ 2. **backup-vault-access-policy-check** - Ensures backup vaults have secure access policies
270
+ - Detects publicly accessible backup vaults
271
+ - Identifies overly permissive access policies
272
+ - Warns about dangerous permissions (DeleteBackupVault, DeleteRecoveryPoint)
273
+ - Validates principle of least privilege
274
+
275
+ 3. **backup-selection-resource-coverage-check** - Validates backup plans cover critical resources
276
+ - Ensures backup plans have at least one selection
277
+ - Validates selections target specific resources or use tags
278
+ - Checks that selections are not empty
279
+
280
+ **IG2 Controls (3)**:
281
+ 4. **backup-vault-lock-check** - Verifies vault lock for ransomware protection
282
+ - Ensures critical vaults have Vault Lock enabled
283
+ - Validates immutable backup configuration (WORM)
284
+ - Checks minimum and maximum retention periods
285
+
286
+ 5. **backup-report-plan-exists-check** - Validates backup compliance reporting
287
+ - Ensures at least one report plan exists
288
+ - Validates report delivery configuration
289
+ - Checks for active report generation
290
+
291
+ 6. **backup-restore-testing-plan-exists-check** - Ensures backups are recoverable
292
+ - Validates restore testing plans exist
293
+ - Checks testing schedules are configured
294
+ - Ensures backups are actually tested for recoverability
295
+
296
+ These controls complement the existing 12 resource-specific backup controls by assessing the centralized AWS Backup service infrastructure itself. Total backup controls: 17 (12 resource-specific + 5 service-level). See [AWS Backup Controls Guide](docs/adding-aws-backup-controls.md) for detailed documentation.
@@ -1,16 +1,16 @@
1
- aws_cis_assessment/__init__.py,sha256=EO4JEYzH1KqBsVY47ECD1ctR40yddm7WEfZRGfctQf8,480
1
+ aws_cis_assessment/__init__.py,sha256=Kf2-Oe7QXfomiClATeX3xR_SoB0Gl7eVtWLb5gayD1E,481
2
2
  aws_cis_assessment/cli/__init__.py,sha256=DYaGVAIoy5ucs9ubKQxX6Z3ZD46AGz9AaIaDQXzrzeY,100
3
3
  aws_cis_assessment/cli/examples.py,sha256=F9K2Fe297kUfwoq6Ine9Aj_IXNU-KwO9hd7SAPWeZHI,12884
4
4
  aws_cis_assessment/cli/main.py,sha256=i5QoqHXsPG_Kw0W7jM3Zj2YaAaCJnxxnfz82QBBHq-U,49441
5
5
  aws_cis_assessment/cli/utils.py,sha256=ufdsifIPIE9HKVZAvFXfeJgEk_aAmz01tDrEukVyL0g,9783
6
6
  aws_cis_assessment/config/__init__.py,sha256=aSQyaKGEQ7WgldC8IocY-YK7nduzfgjI6EuDE4Xti6s,77
7
7
  aws_cis_assessment/config/config_loader.py,sha256=Wk6gfblj8RWU5QctHjPu5tTJMIb8lbEW3Ic9z-se4uQ,13165
8
- aws_cis_assessment/config/rules/cis_controls_ig1.yaml,sha256=_fzD09kHEeriBmNp-6GPsuZZFFfoY4d-OiNexM8mbGA,28310
9
- aws_cis_assessment/config/rules/cis_controls_ig2.yaml,sha256=sMQXkLWFgpbVhfrjvGwwWnOj-5TKu-wTQPnOWveARns,18464
8
+ aws_cis_assessment/config/rules/cis_controls_ig1.yaml,sha256=K6GDBnhqeHqATcgYYmJ816sOplpPfp8e7S3o7fAmzPM,32388
9
+ aws_cis_assessment/config/rules/cis_controls_ig2.yaml,sha256=qt4zrmfeV-Lu8k06HxwCtSYqr5yZszFGN6LEYwa09w4,22102
10
10
  aws_cis_assessment/config/rules/cis_controls_ig3.yaml,sha256=YSghyCmwKF5UNZXdQQQNsaidQ95VDUgnwvh4jsV6kQU,4347
11
11
  aws_cis_assessment/controls/__init__.py,sha256=oVTM94UAt0Vu7Hy-V84p6LAxZHORs-RRAj9j86r_730,72
12
12
  aws_cis_assessment/controls/base_control.py,sha256=DpjRrYdz3FzpuU_WtbvtqUBRgEoMW7Qgah-iD5Y_HJI,17227
13
- aws_cis_assessment/controls/ig1/__init__.py,sha256=fbBhuwDcekiSJJ5hCm4W76Rb66QDhGj7NRtTSU8ZamE,7748
13
+ aws_cis_assessment/controls/ig1/__init__.py,sha256=hV_Amiwd-6wcrQcSp8O_gTaqujiPkZ0BY20DdboTfkc,8411
14
14
  aws_cis_assessment/controls/ig1/control_1_1.py,sha256=MwxaFCayJmFrBeGrVyTcLUksrPqRHId76m2Du1Vuk4I,28070
15
15
  aws_cis_assessment/controls/ig1/control_2_2.py,sha256=yPp4aGGGzroAFqoTSaujjALSPq4jPxcaDiDIhwC11P0,11504
16
16
  aws_cis_assessment/controls/ig1/control_3_3.py,sha256=f4ZuiMR6qSXCmVwP3OflEeZn48qpzQqq0XfjZgbq3Go,35668
@@ -18,6 +18,7 @@ aws_cis_assessment/controls/ig1/control_3_4.py,sha256=Flw_cA8_Qxv8zuIbOWv6JAYUdj
18
18
  aws_cis_assessment/controls/ig1/control_4_1.py,sha256=-lIoa0XRGwiRdtG9L9f00Wud525FZbv3961bXMuiQIE,22362
19
19
  aws_cis_assessment/controls/ig1/control_access_keys.py,sha256=Hj3G0Qpwa2EcJE-u49nvADjbESZh9YClElfP4dWYQfk,14424
20
20
  aws_cis_assessment/controls/ig1/control_advanced_security.py,sha256=PNtPfqSKGu7UYDx6PccO8tVT5ZL6YmzeH45Cew_UjLM,24256
21
+ aws_cis_assessment/controls/ig1/control_aws_backup_service.py,sha256=_bUc6x7jXhav0Cm5jfX0_tk1UOa8qoso2ND1-6xsPtI,54651
21
22
  aws_cis_assessment/controls/ig1/control_backup_recovery.py,sha256=Y5za_4lCZmA5MYhHp4OCGyL4z97cj6dbO0KfabQ5Hr0,21465
22
23
  aws_cis_assessment/controls/ig1/control_cloudtrail_logging.py,sha256=lQOjshW8BBymvzphtWuwg4wIyv6nH2mOSiogBe_Ejfo,8514
23
24
  aws_cis_assessment/controls/ig1/control_critical_security.py,sha256=1MVMkfOAWcH5ppFv7psZvJvcOtpww6Pl5WFXrMyN158,20942
@@ -31,11 +32,12 @@ aws_cis_assessment/controls/ig1/control_network_security.py,sha256=DyaXzpMuZ5Ba9
31
32
  aws_cis_assessment/controls/ig1/control_s3_enhancements.py,sha256=uP0Ko6cjTvmpg47vNtdaFgdjVPMS6Yjww-WZQIzvk8o,7759
32
33
  aws_cis_assessment/controls/ig1/control_s3_security.py,sha256=8vt2rnNPdgQrvO5Ds3yV74mQ7qkF0f_LpKqQLjg0AQc,18308
33
34
  aws_cis_assessment/controls/ig1/control_vpc_security.py,sha256=RCtBUozvdIPrXKFU0ssxjBF6A9l_HMcAbRv0K87Bbhc,10639
34
- aws_cis_assessment/controls/ig2/__init__.py,sha256=mMOtjYH_CcH-ioswgVLse4XOh-i_-TDoLenJbSxiuFQ,5985
35
+ aws_cis_assessment/controls/ig2/__init__.py,sha256=GbrrOjhA-IXxxIMbL-H7zBZoUpO_ylSgAOiVMCe0_Hw,6359
35
36
  aws_cis_assessment/controls/ig2/control_3_10.py,sha256=xv2F85SB1Jd5g7HWZzrqGntTH3az8BbCcZLlDV2Di7g,33762
36
37
  aws_cis_assessment/controls/ig2/control_3_11.py,sha256=Xrn1PRWQp3kK3won-AieUMIweEPQAF3Sb4OcFsUTj2A,65245
37
38
  aws_cis_assessment/controls/ig2/control_5_2.py,sha256=5-3eHaltXP_UiMTlk3pLv4VafzBf41Vjh_8DpWfhqrw,19060
38
39
  aws_cis_assessment/controls/ig2/control_advanced_encryption.py,sha256=S3wU0f46FIc8e50fd4zvyrLe8J5j9Ryb94he32XWVdQ,14201
40
+ aws_cis_assessment/controls/ig2/control_aws_backup_ig2.py,sha256=FApHDPLQFDvfyvCClbdQC-9ap6I6wpW1d6D85bvHmMQ,907
39
41
  aws_cis_assessment/controls/ig2/control_codebuild_security.py,sha256=k2f8Xh6l09o1rb3B_J412qDsHI_Y8to3Ap8FbTGQ05g,11517
40
42
  aws_cis_assessment/controls/ig2/control_encryption_rest.py,sha256=EQ2wK1uz9LWpZiep_kMB4zccg9keh0XMiy44fIKt49Q,18002
41
43
  aws_cis_assessment/controls/ig2/control_encryption_transit.py,sha256=g9BOuA9ovTDT2WZ18k0i4YiZoz_Fsovihth4Kd4rE9k,18801
@@ -50,7 +52,7 @@ aws_cis_assessment/controls/ig3/control_3_14.py,sha256=fY2MZATcicuP1Zich5L7J6-MM
50
52
  aws_cis_assessment/controls/ig3/control_7_1.py,sha256=GZQt0skGJVlUbGoH4MD5AoJJONf0nT9k7WQT-8F3le4,18499
51
53
  aws_cis_assessment/core/__init__.py,sha256=aXt5Z3mqaaDvFyZPyMaJYFy66A_phfFIhhH_eyaic8Q,52
52
54
  aws_cis_assessment/core/accuracy_validator.py,sha256=jnN2O32PpdDfWAp6erV4v4zKugC9ziJkDYnVF93FVuY,18386
53
- aws_cis_assessment/core/assessment_engine.py,sha256=-dxww7Qp-dww3pUmyLOBAt44U2CrcP_8WmhjFrJ8sMw,62509
55
+ aws_cis_assessment/core/assessment_engine.py,sha256=oKJa7562YFHqijCjk-IJ0XXEBNlNDuBoagtouKE0e84,63682
54
56
  aws_cis_assessment/core/audit_trail.py,sha256=qapCkI2zjbAPHlHQcgYonfDYyjU2MoX5Sc2IXtYj3eE,18395
55
57
  aws_cis_assessment/core/aws_client_factory.py,sha256=1qTLfQ3fgPBH3mWRpX1_i3bbHlQQYsmSE8vsKxKTz8w,13143
56
58
  aws_cis_assessment/core/error_handler.py,sha256=5JgH3Y2yG1-ZSuEJR7o0ZMzqlwGWFRW2N4SjcL2gnBw,24219
@@ -61,22 +63,23 @@ aws_cis_assessment/reporters/base_reporter.py,sha256=joy_O4IL4Hs_qwAuPtl81GIPxLA
61
63
  aws_cis_assessment/reporters/csv_reporter.py,sha256=r83xzfP1t5AO9MfKawgN4eTeOU6eGZwJQgvNDLEd7NI,31419
62
64
  aws_cis_assessment/reporters/html_reporter.py,sha256=i5HBLAjZB1TKAUrc6X7-Qbzr7QTQOwLplDu-ZnDzTUs,113444
63
65
  aws_cis_assessment/reporters/json_reporter.py,sha256=MObCzTc9nlGTEXeWc7P8tTMeKCpEaJNfcSYc79cHXhc,22250
64
- aws_cis_controls_assessment-1.0.9.dist-info/licenses/LICENSE,sha256=T_p0qKH4RoI3ejr3tktf3rx2Zart_9KeUmJd5iiqXW8,1079
66
+ aws_cis_controls_assessment-1.0.10.dist-info/licenses/LICENSE,sha256=T_p0qKH4RoI3ejr3tktf3rx2Zart_9KeUmJd5iiqXW8,1079
65
67
  deprecation-package/aws_cis_assessment_deprecated/__init__.py,sha256=WOaufqanKNhvWQ3frj8e627tS_kZnyk2R2hwqPFqydw,1892
66
- docs/README.md,sha256=8UaAzc2pI1nhMFf_pGSFAf0UfeaM1MXw9X93IrN-z5A,4264
67
- docs/assessment-logic.md,sha256=7t1YPkLPI3-MpvF3cLpO4x4LeNMfM950-es4vn0W4Zc,27123
68
- docs/cli-reference.md,sha256=zyTacw3neOJ2lQmq8E7WPJUDGMIDgUzQCqutu0lJ3SY,17854
69
- docs/config-rule-mappings.md,sha256=Jk31ZqnSn1JAR3iXHlhGnVxVpPukVuCZtK4H58j08Nk,18508
70
- docs/developer-guide.md,sha256=uC0DvgmBoOQ2LnBNManTe_rdOccvjWbzvqd93huO4jE,31026
68
+ docs/README.md,sha256=MXnfbPRmxir-7ihG2lNmLI9TJG0Pp0QWqoDZtXiH_Mk,4912
69
+ docs/adding-aws-backup-controls.md,sha256=l_H0H8W71n-6NbeplNujC_li2NiaQcYPr0hQMhEPbrc,21081
70
+ docs/assessment-logic.md,sha256=necuK7Ufk7zusuoGq5FKjOv0Z6Ih6s4m-yfLaJCfRto,38908
71
+ docs/cli-reference.md,sha256=a6u_153XcDq43bw_a5CF53I9yklDxgAJ1vTG5f-5HZs,17854
72
+ docs/config-rule-mappings.md,sha256=IT4O5wsD0WyuTi6YLqgVZi30ZTvIyUfINf9LEzLBLr8,21755
73
+ docs/developer-guide.md,sha256=SqT2VEwDyIcLRcIn9BmM5J-V0qN9ctPa2JZ6wxvnqvo,43935
71
74
  docs/dual-scoring-implementation.md,sha256=n8xwurAAx4iOyCeITE9Anvz6W6YupejVYWt6ARtmmTY,8567
72
75
  docs/html-report-improvements.md,sha256=a0OzKvQC_KpcielntTHXMPObwulfWIDgBKnF66iaxp4,11432
73
- docs/installation.md,sha256=y_CQE44yE3ENeAcBANonJUqsl9pLQsGOX92tui-t2OU,9576
76
+ docs/installation.md,sha256=GAyHN3LseuN2dRogemnwGaDo-Udp0V23KUd_m-9SrJQ,9576
74
77
  docs/scoring-comparison-aws-config.md,sha256=8BBe1tQsaAT0BAE3OdGIRFjuT1VJcOlM1qBWFmZKaIo,11801
75
78
  docs/scoring-methodology.md,sha256=C86FisBxKt6pyr-Kp6rAVPz45yPZpgsGibjgq8obIsg,9404
76
- docs/troubleshooting.md,sha256=JcYw6qS9G9YsM0MxxxZUGfPZmmZBxDYTV8tAIK0Sa2U,13175
77
- docs/user-guide.md,sha256=4azuL1RWewtA2wRH0ejHkCvVKV3dBfyRJ28THahlmaA,10352
78
- aws_cis_controls_assessment-1.0.9.dist-info/METADATA,sha256=UjpUaAlo77AoGVHC8-okG5bo5DlWjwR7boXomQsPrKk,11809
79
- aws_cis_controls_assessment-1.0.9.dist-info/WHEEL,sha256=wUyA8OaulRlbfwMtmQsvNngGrxQHAvkKcvRmdizlJi0,92
80
- aws_cis_controls_assessment-1.0.9.dist-info/entry_points.txt,sha256=-AxPn5Y7yau0pQh33F5_uyWfvcnm2Kg1_nMQuLrZ7SY,68
81
- aws_cis_controls_assessment-1.0.9.dist-info/top_level.txt,sha256=4OHmV6RAEWkz-Se50kfmuGCd-mUSotDZz3iLGF9CmkI,44
82
- aws_cis_controls_assessment-1.0.9.dist-info/RECORD,,
79
+ docs/troubleshooting.md,sha256=mGmWgrc3A1dn-Uk_XxWFh04OQxjmqkeax8vQX7takg0,18220
80
+ docs/user-guide.md,sha256=lBDgU40tIPstOdNx4YqVkPTIDntn4o2y2tr2CPQt7b8,11942
81
+ aws_cis_controls_assessment-1.0.10.dist-info/METADATA,sha256=JCDYrRLJz3PXZflczN6RPUwkPn7RPiO-hdW6WSfYBAg,14191
82
+ aws_cis_controls_assessment-1.0.10.dist-info/WHEEL,sha256=wUyA8OaulRlbfwMtmQsvNngGrxQHAvkKcvRmdizlJi0,92
83
+ aws_cis_controls_assessment-1.0.10.dist-info/entry_points.txt,sha256=-AxPn5Y7yau0pQh33F5_uyWfvcnm2Kg1_nMQuLrZ7SY,68
84
+ aws_cis_controls_assessment-1.0.10.dist-info/top_level.txt,sha256=4OHmV6RAEWkz-Se50kfmuGCd-mUSotDZz3iLGF9CmkI,44
85
+ aws_cis_controls_assessment-1.0.10.dist-info/RECORD,,
docs/README.md CHANGED
@@ -2,6 +2,15 @@
2
2
 
3
3
  Welcome to the comprehensive documentation for the AWS CIS Controls Compliance Assessment Framework. This production-ready, enterprise-grade framework evaluates AWS account security posture against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications without requiring AWS Config to be enabled.
4
4
 
5
+ ## 🆕 Latest Updates (Version 1.0.10)
6
+
7
+ ### New AWS Backup Service Controls
8
+ Two new controls added to assess AWS Backup infrastructure security:
9
+ - **backup-plan-min-frequency-and-min-retention-check** - Validates backup plan policies
10
+ - **backup-vault-access-policy-check** - Ensures backup vault security
11
+
12
+ See the [AWS Backup Controls Guide](adding-aws-backup-controls.md) for detailed documentation.
13
+
5
14
  ## Documentation Structure
6
15
 
7
16
  ### User Documentation
@@ -15,6 +24,7 @@ Welcome to the comprehensive documentation for the AWS CIS Controls Compliance A
15
24
  - **[Assessment Logic](assessment-logic.md)** - Detailed assessment logic documentation
16
25
  - **[Config Rule Mappings](config-rule-mappings.md)** - Complete mapping of CIS Controls to AWS Config rules
17
26
  - **[HTML Report Improvements](html-report-improvements.md)** - Enhanced HTML report features and customization
27
+ - **[AWS Backup Controls Guide](adding-aws-backup-controls.md)** - **NEW:** Comprehensive guide for AWS Backup service controls
18
28
 
19
29
  ## Quick Start
20
30
 
@@ -25,16 +35,17 @@ Welcome to the comprehensive documentation for the AWS CIS Controls Compliance A
25
35
 
26
36
  ## Key Features
27
37
 
28
- - **✅ Complete Coverage**: 136 AWS Config rules (131 CIS Controls + 5 bonus security rules)
38
+ - **✅ Complete Coverage**: 138 AWS Config rules (133 CIS Controls + 5 bonus security rules)
29
39
  - **✅ Production Ready**: Enterprise-tested with comprehensive error handling
30
40
  - **✅ Performance Optimized**: Handles large-scale assessments efficiently
31
41
  - **✅ Multiple Output Formats**: JSON, HTML, and CSV reports with detailed remediation guidance
32
42
  - **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
33
43
  - **✅ Enterprise Architecture**: Scalable, maintainable framework with audit trails
44
+ - **✅ AWS Backup Controls**: Comprehensive backup infrastructure assessment
34
45
 
35
46
  ## Implementation Groups Overview
36
47
 
37
- ### IG1 - Essential Cyber Hygiene (93 Config Rules) ✅
48
+ ### IG1 - Essential Cyber Hygiene (95 Config Rules) ✅
38
49
  **100% Coverage Achieved**
39
50
  Foundational safeguards for all enterprises:
40
51
  - Asset Inventory and Management (6 rules)
@@ -42,7 +53,7 @@ Foundational safeguards for all enterprises:
42
53
  - Data Protection and Encryption (8 rules)
43
54
  - Network Security Controls (20 rules)
44
55
  - Logging and Monitoring (13 rules)
45
- - Backup and Recovery (12 rules)
56
+ - Backup and Recovery (14 rules) - **NEW: AWS Backup service controls**
46
57
  - Security Services Integration (5 rules)
47
58
  - Configuration Management (9 rules)
48
59
  - Vulnerability Management (5 rules)