aws-cis-controls-assessment 1.0.9__py3-none-any.whl → 1.0.10__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- aws_cis_assessment/__init__.py +1 -1
- aws_cis_assessment/config/rules/cis_controls_ig1.yaml +94 -1
- aws_cis_assessment/config/rules/cis_controls_ig2.yaml +83 -1
- aws_cis_assessment/controls/ig1/__init__.py +17 -0
- aws_cis_assessment/controls/ig1/control_aws_backup_service.py +1276 -0
- aws_cis_assessment/controls/ig2/__init__.py +12 -0
- aws_cis_assessment/controls/ig2/control_aws_backup_ig2.py +23 -0
- aws_cis_assessment/core/assessment_engine.py +20 -0
- {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.0.10.dist-info}/METADATA +53 -10
- {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.0.10.dist-info}/RECORD +23 -20
- docs/README.md +14 -3
- docs/adding-aws-backup-controls.md +562 -0
- docs/assessment-logic.md +291 -3
- docs/cli-reference.md +1 -1
- docs/config-rule-mappings.md +46 -5
- docs/developer-guide.md +312 -3
- docs/installation.md +2 -2
- docs/troubleshooting.md +211 -2
- docs/user-guide.md +47 -2
- {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.0.10.dist-info}/WHEEL +0 -0
- {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.0.10.dist-info}/entry_points.txt +0 -0
- {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.0.10.dist-info}/licenses/LICENSE +0 -0
- {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.0.10.dist-info}/top_level.txt +0 -0
|
@@ -92,6 +92,13 @@ from .control_remaining_rules import (
|
|
|
92
92
|
AuditLogPolicyExistsAssessment
|
|
93
93
|
)
|
|
94
94
|
|
|
95
|
+
# Import AWS Backup IG2 controls
|
|
96
|
+
from .control_aws_backup_ig2 import (
|
|
97
|
+
BackupVaultLockCheckAssessment,
|
|
98
|
+
BackupReportPlanExistsCheckAssessment,
|
|
99
|
+
BackupRestoreTestingPlanExistsCheckAssessment
|
|
100
|
+
)
|
|
101
|
+
|
|
95
102
|
__all__ = [
|
|
96
103
|
# Control 3.10 - Encrypt Sensitive Data in Transit
|
|
97
104
|
'APIGatewaySSLEnabledAssessment',
|
|
@@ -165,6 +172,11 @@ __all__ = [
|
|
|
165
172
|
'RestrictedCommonPortsAssessment',
|
|
166
173
|
'AuditLogPolicyExistsAssessment',
|
|
167
174
|
|
|
175
|
+
# AWS Backup IG2 Controls
|
|
176
|
+
'BackupVaultLockCheckAssessment',
|
|
177
|
+
'BackupReportPlanExistsCheckAssessment',
|
|
178
|
+
'BackupRestoreTestingPlanExistsCheckAssessment',
|
|
179
|
+
|
|
168
180
|
# Control 5.2 - Use Unique Passwords
|
|
169
181
|
'MFAEnabledForIAMConsoleAccessAssessment',
|
|
170
182
|
'RootAccountMFAEnabledAssessment',
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
"""AWS Backup Service Controls for IG2 - Advanced backup infrastructure assessment.
|
|
2
|
+
|
|
3
|
+
This module implements IG2-level AWS Backup service controls that assess
|
|
4
|
+
advanced backup capabilities like vault lock, reporting, and restore testing.
|
|
5
|
+
|
|
6
|
+
Controls:
|
|
7
|
+
- backup-vault-lock-check: Verifies vault lock (ransomware protection)
|
|
8
|
+
- backup-report-plan-exists-check: Validates backup compliance reporting
|
|
9
|
+
- backup-restore-testing-plan-exists-check: Ensures backups are recoverable
|
|
10
|
+
"""
|
|
11
|
+
|
|
12
|
+
# Import the IG2 controls from the IG1 module since they're all in the same file
|
|
13
|
+
from aws_cis_assessment.controls.ig1.control_aws_backup_service import (
|
|
14
|
+
BackupVaultLockCheckAssessment,
|
|
15
|
+
BackupReportPlanExistsCheckAssessment,
|
|
16
|
+
BackupRestoreTestingPlanExistsCheckAssessment
|
|
17
|
+
)
|
|
18
|
+
|
|
19
|
+
__all__ = [
|
|
20
|
+
'BackupVaultLockCheckAssessment',
|
|
21
|
+
'BackupReportPlanExistsCheckAssessment',
|
|
22
|
+
'BackupRestoreTestingPlanExistsCheckAssessment'
|
|
23
|
+
]
|
|
@@ -95,6 +95,11 @@ from aws_cis_assessment.controls.ig1.control_backup_recovery import (
|
|
|
95
95
|
DBInstanceBackupEnabledAssessment, RedshiftBackupEnabledAssessment, DynamoDBPITREnabledAssessment,
|
|
96
96
|
ElastiCacheRedisClusterAutomaticBackupCheckAssessment, S3BucketReplicationEnabledAssessment
|
|
97
97
|
)
|
|
98
|
+
from aws_cis_assessment.controls.ig1.control_aws_backup_service import (
|
|
99
|
+
BackupPlanMinFrequencyAndMinRetentionCheckAssessment,
|
|
100
|
+
BackupVaultAccessPolicyCheckAssessment,
|
|
101
|
+
BackupSelectionResourceCoverageCheckAssessment
|
|
102
|
+
)
|
|
98
103
|
from aws_cis_assessment.controls.ig1.control_s3_enhancements import (
|
|
99
104
|
S3AccountLevelPublicAccessBlocksPeriodicAssessment, S3BucketPublicWriteProhibitedAssessment
|
|
100
105
|
)
|
|
@@ -151,6 +156,11 @@ from aws_cis_assessment.controls.ig2.control_remaining_rules import (
|
|
|
151
156
|
RedshiftEnhancedVPCRoutingEnabledAssessment, RestrictedCommonPortsAssessment,
|
|
152
157
|
AuditLogPolicyExistsAssessment
|
|
153
158
|
)
|
|
159
|
+
from aws_cis_assessment.controls.ig2.control_aws_backup_ig2 import (
|
|
160
|
+
BackupVaultLockCheckAssessment,
|
|
161
|
+
BackupReportPlanExistsCheckAssessment,
|
|
162
|
+
BackupRestoreTestingPlanExistsCheckAssessment
|
|
163
|
+
)
|
|
154
164
|
from aws_cis_assessment.controls.ig3.control_3_14 import (
|
|
155
165
|
APIGatewayExecutionLoggingEnabledAssessment, CloudTrailS3DataEventsEnabledAssessment,
|
|
156
166
|
MultiRegionCloudTrailEnabledAssessment, CloudTrailCloudWatchLogsEnabledAssessment
|
|
@@ -412,6 +422,11 @@ class AssessmentEngine:
|
|
|
412
422
|
'elasticache-redis-cluster-automatic-backup-check': ElastiCacheRedisClusterAutomaticBackupCheckAssessment(),
|
|
413
423
|
's3-bucket-replication-enabled': S3BucketReplicationEnabledAssessment(),
|
|
414
424
|
|
|
425
|
+
# AWS Backup Service Controls (IG1)
|
|
426
|
+
'backup-plan-min-frequency-and-min-retention-check': BackupPlanMinFrequencyAndMinRetentionCheckAssessment(),
|
|
427
|
+
'backup-vault-access-policy-check': BackupVaultAccessPolicyCheckAssessment(),
|
|
428
|
+
'backup-selection-resource-coverage-check': BackupSelectionResourceCoverageCheckAssessment(),
|
|
429
|
+
|
|
415
430
|
# S3 Security Enhancements
|
|
416
431
|
's3-account-level-public-access-blocks-periodic': S3AccountLevelPublicAccessBlocksPeriodicAssessment(),
|
|
417
432
|
's3-bucket-public-write-prohibited': S3BucketPublicWriteProhibitedAssessment(),
|
|
@@ -488,6 +503,11 @@ class AssessmentEngine:
|
|
|
488
503
|
'redshift-enhanced-vpc-routing-enabled': RedshiftEnhancedVPCRoutingEnabledAssessment(),
|
|
489
504
|
'restricted-common-ports': RestrictedCommonPortsAssessment(),
|
|
490
505
|
'audit-log-policy-exists (Process check)': AuditLogPolicyExistsAssessment(),
|
|
506
|
+
|
|
507
|
+
# AWS Backup Service Controls (IG2)
|
|
508
|
+
'backup-vault-lock-check': BackupVaultLockCheckAssessment(),
|
|
509
|
+
'backup-report-plan-exists-check': BackupReportPlanExistsCheckAssessment(),
|
|
510
|
+
'backup-restore-testing-plan-exists-check': BackupRestoreTestingPlanExistsCheckAssessment(),
|
|
491
511
|
},
|
|
492
512
|
'IG3': {
|
|
493
513
|
# Control 3.14 - Sensitive Data Logging
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: aws-cis-controls-assessment
|
|
3
|
-
Version: 1.0.
|
|
3
|
+
Version: 1.0.10
|
|
4
4
|
Summary: Production-ready AWS CIS Controls compliance assessment framework with 145 comprehensive rules
|
|
5
5
|
Author-email: AWS CIS Assessment Team <security@example.com>
|
|
6
6
|
Maintainer-email: AWS CIS Assessment Team <security@example.com>
|
|
@@ -57,19 +57,20 @@ Dynamic: license-file
|
|
|
57
57
|
|
|
58
58
|
# AWS CIS Controls Compliance Assessment Framework
|
|
59
59
|
|
|
60
|
-
A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with
|
|
60
|
+
A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 133 implemented rules plus 5 bonus security enhancements.
|
|
61
61
|
|
|
62
62
|
> **Production Status**: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend [AWS Config](https://aws.amazon.com/config/) for ongoing continuous compliance monitoring and automated remediation.
|
|
63
63
|
|
|
64
64
|
## 🎯 Key Features
|
|
65
65
|
|
|
66
|
-
- **✅ Complete Coverage**:
|
|
66
|
+
- **✅ Complete Coverage**: 137/137 CIS Controls rules implemented (100% coverage)
|
|
67
67
|
- **✅ Dual Scoring System**: Both weighted and AWS Config-style scoring methodologies
|
|
68
68
|
- **✅ Enterprise Ready**: Production-tested with enterprise-grade architecture
|
|
69
69
|
- **✅ Performance Optimized**: Handles large-scale assessments efficiently
|
|
70
70
|
- **✅ Multi-Format Reports**: JSON, HTML, and CSV with detailed remediation guidance
|
|
71
71
|
- **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
|
|
72
72
|
- **✅ Bonus Security Rules**: 5 additional security enhancements beyond CIS requirements
|
|
73
|
+
- **✅ AWS Backup Controls**: 6 comprehensive backup infrastructure controls (3 IG1 + 3 IG2)
|
|
73
74
|
|
|
74
75
|
## 🚀 Quick Start
|
|
75
76
|
|
|
@@ -88,7 +89,7 @@ pip install -e .
|
|
|
88
89
|
### Basic Usage
|
|
89
90
|
|
|
90
91
|
```bash
|
|
91
|
-
# Run complete assessment (all
|
|
92
|
+
# Run complete assessment (all 142 rules) - defaults to us-east-1
|
|
92
93
|
aws-cis-assess assess --aws-profile my-aws-profile
|
|
93
94
|
|
|
94
95
|
# Assess multiple regions
|
|
@@ -109,19 +110,19 @@ aws-cis-assess assess --output-format json
|
|
|
109
110
|
|
|
110
111
|
## 📊 Implementation Groups Coverage
|
|
111
112
|
|
|
112
|
-
### IG1 - Essential Cyber Hygiene (
|
|
113
|
+
### IG1 - Essential Cyber Hygiene (96 Rules) ✅
|
|
113
114
|
**100% Coverage Achieved**
|
|
114
115
|
- Asset Inventory and Management (6 rules)
|
|
115
116
|
- Identity and Access Management (15 rules)
|
|
116
117
|
- Data Protection and Encryption (8 rules)
|
|
117
118
|
- Network Security Controls (20 rules)
|
|
118
119
|
- Logging and Monitoring (13 rules)
|
|
119
|
-
- Backup and Recovery (
|
|
120
|
+
- Backup and Recovery (17 rules) - **NEW: 6 AWS Backup service controls added (3 IG1 + 3 IG2)**
|
|
120
121
|
- Security Services Integration (5 rules)
|
|
121
122
|
- Configuration Management (9 rules)
|
|
122
123
|
- Vulnerability Management (5 rules)
|
|
123
124
|
|
|
124
|
-
### IG2 - Enhanced Security (+
|
|
125
|
+
### IG2 - Enhanced Security (+40 Rules) ✅
|
|
125
126
|
**100% Coverage Achieved**
|
|
126
127
|
- Advanced Encryption at Rest (6 rules)
|
|
127
128
|
- Certificate Management (2 rules)
|
|
@@ -132,6 +133,7 @@ aws-cis-assess assess --output-format json
|
|
|
132
133
|
- Network Segmentation (5 rules)
|
|
133
134
|
- Auto-scaling Security (1 rule)
|
|
134
135
|
- Enhanced Access Controls (8 rules)
|
|
136
|
+
- AWS Backup Advanced Controls (3 rules) - **NEW: Vault lock, reporting, restore testing**
|
|
135
137
|
|
|
136
138
|
### IG3 - Advanced Security (+1 Rule) ✅
|
|
137
139
|
**100% Coverage Achieved**
|
|
@@ -151,7 +153,7 @@ aws-cis-assess assess --output-format json
|
|
|
151
153
|
|
|
152
154
|
### Core Components
|
|
153
155
|
- **Assessment Engine**: Orchestrates compliance evaluations across all AWS regions
|
|
154
|
-
- **Control Assessments**:
|
|
156
|
+
- **Control Assessments**: 138 individual rule implementations with robust error handling
|
|
155
157
|
- **Scoring Engine**: Calculates compliance scores and generates executive metrics
|
|
156
158
|
- **Reporting System**: Multi-format output with detailed remediation guidance
|
|
157
159
|
- **Resource Management**: Optimized for enterprise-scale deployments with memory management
|
|
@@ -247,7 +249,48 @@ MIT License - see [LICENSE](LICENSE) file for details.
|
|
|
247
249
|
|
|
248
250
|
---
|
|
249
251
|
|
|
250
|
-
**Framework Version**: 1.0.
|
|
251
|
-
**CIS Controls Coverage**:
|
|
252
|
+
**Framework Version**: 1.0.10 (in development)
|
|
253
|
+
**CIS Controls Coverage**: 137/137 rules (100%) + 5 bonus rules
|
|
252
254
|
**Production Status**: ✅ Ready for immediate enterprise deployment
|
|
253
255
|
**Last Updated**: January 2026
|
|
256
|
+
|
|
257
|
+
## 🆕 What's New in Version 1.0.10
|
|
258
|
+
|
|
259
|
+
### AWS Backup Service Controls
|
|
260
|
+
Six new controls added to assess AWS Backup infrastructure:
|
|
261
|
+
|
|
262
|
+
**IG1 Controls (3)**:
|
|
263
|
+
1. **backup-plan-min-frequency-and-min-retention-check** - Validates backup plans have appropriate frequency and retention policies
|
|
264
|
+
- Ensures backup plans have at least one rule defined
|
|
265
|
+
- Validates schedule expressions (cron or rate)
|
|
266
|
+
- Checks retention periods meet minimum requirements (default: 7 days)
|
|
267
|
+
- Validates lifecycle policies for cold storage transitions
|
|
268
|
+
|
|
269
|
+
2. **backup-vault-access-policy-check** - Ensures backup vaults have secure access policies
|
|
270
|
+
- Detects publicly accessible backup vaults
|
|
271
|
+
- Identifies overly permissive access policies
|
|
272
|
+
- Warns about dangerous permissions (DeleteBackupVault, DeleteRecoveryPoint)
|
|
273
|
+
- Validates principle of least privilege
|
|
274
|
+
|
|
275
|
+
3. **backup-selection-resource-coverage-check** - Validates backup plans cover critical resources
|
|
276
|
+
- Ensures backup plans have at least one selection
|
|
277
|
+
- Validates selections target specific resources or use tags
|
|
278
|
+
- Checks that selections are not empty
|
|
279
|
+
|
|
280
|
+
**IG2 Controls (3)**:
|
|
281
|
+
4. **backup-vault-lock-check** - Verifies vault lock for ransomware protection
|
|
282
|
+
- Ensures critical vaults have Vault Lock enabled
|
|
283
|
+
- Validates immutable backup configuration (WORM)
|
|
284
|
+
- Checks minimum and maximum retention periods
|
|
285
|
+
|
|
286
|
+
5. **backup-report-plan-exists-check** - Validates backup compliance reporting
|
|
287
|
+
- Ensures at least one report plan exists
|
|
288
|
+
- Validates report delivery configuration
|
|
289
|
+
- Checks for active report generation
|
|
290
|
+
|
|
291
|
+
6. **backup-restore-testing-plan-exists-check** - Ensures backups are recoverable
|
|
292
|
+
- Validates restore testing plans exist
|
|
293
|
+
- Checks testing schedules are configured
|
|
294
|
+
- Ensures backups are actually tested for recoverability
|
|
295
|
+
|
|
296
|
+
These controls complement the existing 12 resource-specific backup controls by assessing the centralized AWS Backup service infrastructure itself. Total backup controls: 17 (12 resource-specific + 5 service-level). See [AWS Backup Controls Guide](docs/adding-aws-backup-controls.md) for detailed documentation.
|
{aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.0.10.dist-info}/RECORD
RENAMED
|
@@ -1,16 +1,16 @@
|
|
|
1
|
-
aws_cis_assessment/__init__.py,sha256=
|
|
1
|
+
aws_cis_assessment/__init__.py,sha256=Kf2-Oe7QXfomiClATeX3xR_SoB0Gl7eVtWLb5gayD1E,481
|
|
2
2
|
aws_cis_assessment/cli/__init__.py,sha256=DYaGVAIoy5ucs9ubKQxX6Z3ZD46AGz9AaIaDQXzrzeY,100
|
|
3
3
|
aws_cis_assessment/cli/examples.py,sha256=F9K2Fe297kUfwoq6Ine9Aj_IXNU-KwO9hd7SAPWeZHI,12884
|
|
4
4
|
aws_cis_assessment/cli/main.py,sha256=i5QoqHXsPG_Kw0W7jM3Zj2YaAaCJnxxnfz82QBBHq-U,49441
|
|
5
5
|
aws_cis_assessment/cli/utils.py,sha256=ufdsifIPIE9HKVZAvFXfeJgEk_aAmz01tDrEukVyL0g,9783
|
|
6
6
|
aws_cis_assessment/config/__init__.py,sha256=aSQyaKGEQ7WgldC8IocY-YK7nduzfgjI6EuDE4Xti6s,77
|
|
7
7
|
aws_cis_assessment/config/config_loader.py,sha256=Wk6gfblj8RWU5QctHjPu5tTJMIb8lbEW3Ic9z-se4uQ,13165
|
|
8
|
-
aws_cis_assessment/config/rules/cis_controls_ig1.yaml,sha256=
|
|
9
|
-
aws_cis_assessment/config/rules/cis_controls_ig2.yaml,sha256=
|
|
8
|
+
aws_cis_assessment/config/rules/cis_controls_ig1.yaml,sha256=K6GDBnhqeHqATcgYYmJ816sOplpPfp8e7S3o7fAmzPM,32388
|
|
9
|
+
aws_cis_assessment/config/rules/cis_controls_ig2.yaml,sha256=qt4zrmfeV-Lu8k06HxwCtSYqr5yZszFGN6LEYwa09w4,22102
|
|
10
10
|
aws_cis_assessment/config/rules/cis_controls_ig3.yaml,sha256=YSghyCmwKF5UNZXdQQQNsaidQ95VDUgnwvh4jsV6kQU,4347
|
|
11
11
|
aws_cis_assessment/controls/__init__.py,sha256=oVTM94UAt0Vu7Hy-V84p6LAxZHORs-RRAj9j86r_730,72
|
|
12
12
|
aws_cis_assessment/controls/base_control.py,sha256=DpjRrYdz3FzpuU_WtbvtqUBRgEoMW7Qgah-iD5Y_HJI,17227
|
|
13
|
-
aws_cis_assessment/controls/ig1/__init__.py,sha256=
|
|
13
|
+
aws_cis_assessment/controls/ig1/__init__.py,sha256=hV_Amiwd-6wcrQcSp8O_gTaqujiPkZ0BY20DdboTfkc,8411
|
|
14
14
|
aws_cis_assessment/controls/ig1/control_1_1.py,sha256=MwxaFCayJmFrBeGrVyTcLUksrPqRHId76m2Du1Vuk4I,28070
|
|
15
15
|
aws_cis_assessment/controls/ig1/control_2_2.py,sha256=yPp4aGGGzroAFqoTSaujjALSPq4jPxcaDiDIhwC11P0,11504
|
|
16
16
|
aws_cis_assessment/controls/ig1/control_3_3.py,sha256=f4ZuiMR6qSXCmVwP3OflEeZn48qpzQqq0XfjZgbq3Go,35668
|
|
@@ -18,6 +18,7 @@ aws_cis_assessment/controls/ig1/control_3_4.py,sha256=Flw_cA8_Qxv8zuIbOWv6JAYUdj
|
|
|
18
18
|
aws_cis_assessment/controls/ig1/control_4_1.py,sha256=-lIoa0XRGwiRdtG9L9f00Wud525FZbv3961bXMuiQIE,22362
|
|
19
19
|
aws_cis_assessment/controls/ig1/control_access_keys.py,sha256=Hj3G0Qpwa2EcJE-u49nvADjbESZh9YClElfP4dWYQfk,14424
|
|
20
20
|
aws_cis_assessment/controls/ig1/control_advanced_security.py,sha256=PNtPfqSKGu7UYDx6PccO8tVT5ZL6YmzeH45Cew_UjLM,24256
|
|
21
|
+
aws_cis_assessment/controls/ig1/control_aws_backup_service.py,sha256=_bUc6x7jXhav0Cm5jfX0_tk1UOa8qoso2ND1-6xsPtI,54651
|
|
21
22
|
aws_cis_assessment/controls/ig1/control_backup_recovery.py,sha256=Y5za_4lCZmA5MYhHp4OCGyL4z97cj6dbO0KfabQ5Hr0,21465
|
|
22
23
|
aws_cis_assessment/controls/ig1/control_cloudtrail_logging.py,sha256=lQOjshW8BBymvzphtWuwg4wIyv6nH2mOSiogBe_Ejfo,8514
|
|
23
24
|
aws_cis_assessment/controls/ig1/control_critical_security.py,sha256=1MVMkfOAWcH5ppFv7psZvJvcOtpww6Pl5WFXrMyN158,20942
|
|
@@ -31,11 +32,12 @@ aws_cis_assessment/controls/ig1/control_network_security.py,sha256=DyaXzpMuZ5Ba9
|
|
|
31
32
|
aws_cis_assessment/controls/ig1/control_s3_enhancements.py,sha256=uP0Ko6cjTvmpg47vNtdaFgdjVPMS6Yjww-WZQIzvk8o,7759
|
|
32
33
|
aws_cis_assessment/controls/ig1/control_s3_security.py,sha256=8vt2rnNPdgQrvO5Ds3yV74mQ7qkF0f_LpKqQLjg0AQc,18308
|
|
33
34
|
aws_cis_assessment/controls/ig1/control_vpc_security.py,sha256=RCtBUozvdIPrXKFU0ssxjBF6A9l_HMcAbRv0K87Bbhc,10639
|
|
34
|
-
aws_cis_assessment/controls/ig2/__init__.py,sha256=
|
|
35
|
+
aws_cis_assessment/controls/ig2/__init__.py,sha256=GbrrOjhA-IXxxIMbL-H7zBZoUpO_ylSgAOiVMCe0_Hw,6359
|
|
35
36
|
aws_cis_assessment/controls/ig2/control_3_10.py,sha256=xv2F85SB1Jd5g7HWZzrqGntTH3az8BbCcZLlDV2Di7g,33762
|
|
36
37
|
aws_cis_assessment/controls/ig2/control_3_11.py,sha256=Xrn1PRWQp3kK3won-AieUMIweEPQAF3Sb4OcFsUTj2A,65245
|
|
37
38
|
aws_cis_assessment/controls/ig2/control_5_2.py,sha256=5-3eHaltXP_UiMTlk3pLv4VafzBf41Vjh_8DpWfhqrw,19060
|
|
38
39
|
aws_cis_assessment/controls/ig2/control_advanced_encryption.py,sha256=S3wU0f46FIc8e50fd4zvyrLe8J5j9Ryb94he32XWVdQ,14201
|
|
40
|
+
aws_cis_assessment/controls/ig2/control_aws_backup_ig2.py,sha256=FApHDPLQFDvfyvCClbdQC-9ap6I6wpW1d6D85bvHmMQ,907
|
|
39
41
|
aws_cis_assessment/controls/ig2/control_codebuild_security.py,sha256=k2f8Xh6l09o1rb3B_J412qDsHI_Y8to3Ap8FbTGQ05g,11517
|
|
40
42
|
aws_cis_assessment/controls/ig2/control_encryption_rest.py,sha256=EQ2wK1uz9LWpZiep_kMB4zccg9keh0XMiy44fIKt49Q,18002
|
|
41
43
|
aws_cis_assessment/controls/ig2/control_encryption_transit.py,sha256=g9BOuA9ovTDT2WZ18k0i4YiZoz_Fsovihth4Kd4rE9k,18801
|
|
@@ -50,7 +52,7 @@ aws_cis_assessment/controls/ig3/control_3_14.py,sha256=fY2MZATcicuP1Zich5L7J6-MM
|
|
|
50
52
|
aws_cis_assessment/controls/ig3/control_7_1.py,sha256=GZQt0skGJVlUbGoH4MD5AoJJONf0nT9k7WQT-8F3le4,18499
|
|
51
53
|
aws_cis_assessment/core/__init__.py,sha256=aXt5Z3mqaaDvFyZPyMaJYFy66A_phfFIhhH_eyaic8Q,52
|
|
52
54
|
aws_cis_assessment/core/accuracy_validator.py,sha256=jnN2O32PpdDfWAp6erV4v4zKugC9ziJkDYnVF93FVuY,18386
|
|
53
|
-
aws_cis_assessment/core/assessment_engine.py,sha256
|
|
55
|
+
aws_cis_assessment/core/assessment_engine.py,sha256=oKJa7562YFHqijCjk-IJ0XXEBNlNDuBoagtouKE0e84,63682
|
|
54
56
|
aws_cis_assessment/core/audit_trail.py,sha256=qapCkI2zjbAPHlHQcgYonfDYyjU2MoX5Sc2IXtYj3eE,18395
|
|
55
57
|
aws_cis_assessment/core/aws_client_factory.py,sha256=1qTLfQ3fgPBH3mWRpX1_i3bbHlQQYsmSE8vsKxKTz8w,13143
|
|
56
58
|
aws_cis_assessment/core/error_handler.py,sha256=5JgH3Y2yG1-ZSuEJR7o0ZMzqlwGWFRW2N4SjcL2gnBw,24219
|
|
@@ -61,22 +63,23 @@ aws_cis_assessment/reporters/base_reporter.py,sha256=joy_O4IL4Hs_qwAuPtl81GIPxLA
|
|
|
61
63
|
aws_cis_assessment/reporters/csv_reporter.py,sha256=r83xzfP1t5AO9MfKawgN4eTeOU6eGZwJQgvNDLEd7NI,31419
|
|
62
64
|
aws_cis_assessment/reporters/html_reporter.py,sha256=i5HBLAjZB1TKAUrc6X7-Qbzr7QTQOwLplDu-ZnDzTUs,113444
|
|
63
65
|
aws_cis_assessment/reporters/json_reporter.py,sha256=MObCzTc9nlGTEXeWc7P8tTMeKCpEaJNfcSYc79cHXhc,22250
|
|
64
|
-
aws_cis_controls_assessment-1.0.
|
|
66
|
+
aws_cis_controls_assessment-1.0.10.dist-info/licenses/LICENSE,sha256=T_p0qKH4RoI3ejr3tktf3rx2Zart_9KeUmJd5iiqXW8,1079
|
|
65
67
|
deprecation-package/aws_cis_assessment_deprecated/__init__.py,sha256=WOaufqanKNhvWQ3frj8e627tS_kZnyk2R2hwqPFqydw,1892
|
|
66
|
-
docs/README.md,sha256=
|
|
67
|
-
docs/
|
|
68
|
-
docs/
|
|
69
|
-
docs/
|
|
70
|
-
docs/
|
|
68
|
+
docs/README.md,sha256=MXnfbPRmxir-7ihG2lNmLI9TJG0Pp0QWqoDZtXiH_Mk,4912
|
|
69
|
+
docs/adding-aws-backup-controls.md,sha256=l_H0H8W71n-6NbeplNujC_li2NiaQcYPr0hQMhEPbrc,21081
|
|
70
|
+
docs/assessment-logic.md,sha256=necuK7Ufk7zusuoGq5FKjOv0Z6Ih6s4m-yfLaJCfRto,38908
|
|
71
|
+
docs/cli-reference.md,sha256=a6u_153XcDq43bw_a5CF53I9yklDxgAJ1vTG5f-5HZs,17854
|
|
72
|
+
docs/config-rule-mappings.md,sha256=IT4O5wsD0WyuTi6YLqgVZi30ZTvIyUfINf9LEzLBLr8,21755
|
|
73
|
+
docs/developer-guide.md,sha256=SqT2VEwDyIcLRcIn9BmM5J-V0qN9ctPa2JZ6wxvnqvo,43935
|
|
71
74
|
docs/dual-scoring-implementation.md,sha256=n8xwurAAx4iOyCeITE9Anvz6W6YupejVYWt6ARtmmTY,8567
|
|
72
75
|
docs/html-report-improvements.md,sha256=a0OzKvQC_KpcielntTHXMPObwulfWIDgBKnF66iaxp4,11432
|
|
73
|
-
docs/installation.md,sha256=
|
|
76
|
+
docs/installation.md,sha256=GAyHN3LseuN2dRogemnwGaDo-Udp0V23KUd_m-9SrJQ,9576
|
|
74
77
|
docs/scoring-comparison-aws-config.md,sha256=8BBe1tQsaAT0BAE3OdGIRFjuT1VJcOlM1qBWFmZKaIo,11801
|
|
75
78
|
docs/scoring-methodology.md,sha256=C86FisBxKt6pyr-Kp6rAVPz45yPZpgsGibjgq8obIsg,9404
|
|
76
|
-
docs/troubleshooting.md,sha256=
|
|
77
|
-
docs/user-guide.md,sha256=
|
|
78
|
-
aws_cis_controls_assessment-1.0.
|
|
79
|
-
aws_cis_controls_assessment-1.0.
|
|
80
|
-
aws_cis_controls_assessment-1.0.
|
|
81
|
-
aws_cis_controls_assessment-1.0.
|
|
82
|
-
aws_cis_controls_assessment-1.0.
|
|
79
|
+
docs/troubleshooting.md,sha256=mGmWgrc3A1dn-Uk_XxWFh04OQxjmqkeax8vQX7takg0,18220
|
|
80
|
+
docs/user-guide.md,sha256=lBDgU40tIPstOdNx4YqVkPTIDntn4o2y2tr2CPQt7b8,11942
|
|
81
|
+
aws_cis_controls_assessment-1.0.10.dist-info/METADATA,sha256=JCDYrRLJz3PXZflczN6RPUwkPn7RPiO-hdW6WSfYBAg,14191
|
|
82
|
+
aws_cis_controls_assessment-1.0.10.dist-info/WHEEL,sha256=wUyA8OaulRlbfwMtmQsvNngGrxQHAvkKcvRmdizlJi0,92
|
|
83
|
+
aws_cis_controls_assessment-1.0.10.dist-info/entry_points.txt,sha256=-AxPn5Y7yau0pQh33F5_uyWfvcnm2Kg1_nMQuLrZ7SY,68
|
|
84
|
+
aws_cis_controls_assessment-1.0.10.dist-info/top_level.txt,sha256=4OHmV6RAEWkz-Se50kfmuGCd-mUSotDZz3iLGF9CmkI,44
|
|
85
|
+
aws_cis_controls_assessment-1.0.10.dist-info/RECORD,,
|
docs/README.md
CHANGED
|
@@ -2,6 +2,15 @@
|
|
|
2
2
|
|
|
3
3
|
Welcome to the comprehensive documentation for the AWS CIS Controls Compliance Assessment Framework. This production-ready, enterprise-grade framework evaluates AWS account security posture against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications without requiring AWS Config to be enabled.
|
|
4
4
|
|
|
5
|
+
## 🆕 Latest Updates (Version 1.0.10)
|
|
6
|
+
|
|
7
|
+
### New AWS Backup Service Controls
|
|
8
|
+
Two new controls added to assess AWS Backup infrastructure security:
|
|
9
|
+
- **backup-plan-min-frequency-and-min-retention-check** - Validates backup plan policies
|
|
10
|
+
- **backup-vault-access-policy-check** - Ensures backup vault security
|
|
11
|
+
|
|
12
|
+
See the [AWS Backup Controls Guide](adding-aws-backup-controls.md) for detailed documentation.
|
|
13
|
+
|
|
5
14
|
## Documentation Structure
|
|
6
15
|
|
|
7
16
|
### User Documentation
|
|
@@ -15,6 +24,7 @@ Welcome to the comprehensive documentation for the AWS CIS Controls Compliance A
|
|
|
15
24
|
- **[Assessment Logic](assessment-logic.md)** - Detailed assessment logic documentation
|
|
16
25
|
- **[Config Rule Mappings](config-rule-mappings.md)** - Complete mapping of CIS Controls to AWS Config rules
|
|
17
26
|
- **[HTML Report Improvements](html-report-improvements.md)** - Enhanced HTML report features and customization
|
|
27
|
+
- **[AWS Backup Controls Guide](adding-aws-backup-controls.md)** - **NEW:** Comprehensive guide for AWS Backup service controls
|
|
18
28
|
|
|
19
29
|
## Quick Start
|
|
20
30
|
|
|
@@ -25,16 +35,17 @@ Welcome to the comprehensive documentation for the AWS CIS Controls Compliance A
|
|
|
25
35
|
|
|
26
36
|
## Key Features
|
|
27
37
|
|
|
28
|
-
- **✅ Complete Coverage**:
|
|
38
|
+
- **✅ Complete Coverage**: 138 AWS Config rules (133 CIS Controls + 5 bonus security rules)
|
|
29
39
|
- **✅ Production Ready**: Enterprise-tested with comprehensive error handling
|
|
30
40
|
- **✅ Performance Optimized**: Handles large-scale assessments efficiently
|
|
31
41
|
- **✅ Multiple Output Formats**: JSON, HTML, and CSV reports with detailed remediation guidance
|
|
32
42
|
- **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
|
|
33
43
|
- **✅ Enterprise Architecture**: Scalable, maintainable framework with audit trails
|
|
44
|
+
- **✅ AWS Backup Controls**: Comprehensive backup infrastructure assessment
|
|
34
45
|
|
|
35
46
|
## Implementation Groups Overview
|
|
36
47
|
|
|
37
|
-
### IG1 - Essential Cyber Hygiene (
|
|
48
|
+
### IG1 - Essential Cyber Hygiene (95 Config Rules) ✅
|
|
38
49
|
**100% Coverage Achieved**
|
|
39
50
|
Foundational safeguards for all enterprises:
|
|
40
51
|
- Asset Inventory and Management (6 rules)
|
|
@@ -42,7 +53,7 @@ Foundational safeguards for all enterprises:
|
|
|
42
53
|
- Data Protection and Encryption (8 rules)
|
|
43
54
|
- Network Security Controls (20 rules)
|
|
44
55
|
- Logging and Monitoring (13 rules)
|
|
45
|
-
- Backup and Recovery (
|
|
56
|
+
- Backup and Recovery (14 rules) - **NEW: AWS Backup service controls**
|
|
46
57
|
- Security Services Integration (5 rules)
|
|
47
58
|
- Configuration Management (9 rules)
|
|
48
59
|
- Vulnerability Management (5 rules)
|