aws-cis-controls-assessment 1.0.9__py3-none-any.whl → 1.1.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (26) hide show
  1. aws_cis_assessment/__init__.py +2 -2
  2. aws_cis_assessment/config/rules/cis_controls_ig1.yaml +94 -1
  3. aws_cis_assessment/config/rules/cis_controls_ig2.yaml +680 -1
  4. aws_cis_assessment/controls/ig1/__init__.py +17 -0
  5. aws_cis_assessment/controls/ig1/control_aws_backup_service.py +1276 -0
  6. aws_cis_assessment/controls/ig2/__init__.py +74 -1
  7. aws_cis_assessment/controls/ig2/control_4_5_6_access_configuration.py +2638 -0
  8. aws_cis_assessment/controls/ig2/control_8_audit_logging.py +984 -0
  9. aws_cis_assessment/controls/ig2/control_aws_backup_ig2.py +23 -0
  10. aws_cis_assessment/core/assessment_engine.py +74 -0
  11. aws_cis_assessment/reporters/html_reporter.py +197 -35
  12. {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.1.0.dist-info}/METADATA +163 -12
  13. {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.1.0.dist-info}/RECORD +26 -21
  14. docs/README.md +14 -3
  15. docs/adding-aws-backup-controls.md +562 -0
  16. docs/assessment-logic.md +291 -3
  17. docs/cli-reference.md +1 -1
  18. docs/config-rule-mappings.md +465 -7
  19. docs/developer-guide.md +312 -3
  20. docs/installation.md +2 -2
  21. docs/troubleshooting.md +211 -2
  22. docs/user-guide.md +47 -2
  23. {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.1.0.dist-info}/WHEEL +0 -0
  24. {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.1.0.dist-info}/entry_points.txt +0 -0
  25. {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.1.0.dist-info}/licenses/LICENSE +0 -0
  26. {aws_cis_controls_assessment-1.0.9.dist-info → aws_cis_controls_assessment-1.1.0.dist-info}/top_level.txt +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: aws-cis-controls-assessment
3
- Version: 1.0.9
3
+ Version: 1.1.0
4
4
  Summary: Production-ready AWS CIS Controls compliance assessment framework with 145 comprehensive rules
5
5
  Author-email: AWS CIS Assessment Team <security@example.com>
6
6
  Maintainer-email: AWS CIS Assessment Team <security@example.com>
@@ -57,19 +57,22 @@ Dynamic: license-file
57
57
 
58
58
  # AWS CIS Controls Compliance Assessment Framework
59
59
 
60
- A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 131 implemented rules plus 5 bonus security enhancements.
60
+ A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **100% CIS Controls coverage achieved** with 163 implemented rules (131 CIS Controls + 32 bonus security enhancements).
61
61
 
62
62
  > **Production Status**: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend [AWS Config](https://aws.amazon.com/config/) for ongoing continuous compliance monitoring and automated remediation.
63
63
 
64
64
  ## 🎯 Key Features
65
65
 
66
- - **✅ Complete Coverage**: 131/131 CIS Controls rules implemented (100% coverage)
66
+ - **✅ Complete Coverage**: 163 total rules implemented (131 CIS Controls + 32 bonus)
67
67
  - **✅ Dual Scoring System**: Both weighted and AWS Config-style scoring methodologies
68
+ - **✅ Enhanced HTML Reports**: Control names, working search, improved remediation display
68
69
  - **✅ Enterprise Ready**: Production-tested with enterprise-grade architecture
69
70
  - **✅ Performance Optimized**: Handles large-scale assessments efficiently
70
71
  - **✅ Multi-Format Reports**: JSON, HTML, and CSV with detailed remediation guidance
71
72
  - **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
72
- - **✅ Bonus Security Rules**: 5 additional security enhancements beyond CIS requirements
73
+ - **✅ AWS Backup Controls**: 6 comprehensive backup infrastructure controls (3 IG1 + 3 IG2)
74
+ - **✅ Audit Logging Controls**: 7 comprehensive audit log management controls (CIS Control 8)
75
+ - **✅ Access & Configuration Controls**: 14 comprehensive identity, access, and secure configuration controls (CIS Controls 4, 5, 6)
73
76
 
74
77
  ## 🚀 Quick Start
75
78
 
@@ -88,7 +91,7 @@ pip install -e .
88
91
  ### Basic Usage
89
92
 
90
93
  ```bash
91
- # Run complete assessment (all 136 rules) - defaults to us-east-1
94
+ # Run complete assessment (all 163 rules) - defaults to us-east-1
92
95
  aws-cis-assess assess --aws-profile my-aws-profile
93
96
 
94
97
  # Assess multiple regions
@@ -109,19 +112,19 @@ aws-cis-assess assess --output-format json
109
112
 
110
113
  ## 📊 Implementation Groups Coverage
111
114
 
112
- ### IG1 - Essential Cyber Hygiene (93 Rules) ✅
115
+ ### IG1 - Essential Cyber Hygiene (96 Rules) ✅
113
116
  **100% Coverage Achieved**
114
117
  - Asset Inventory and Management (6 rules)
115
118
  - Identity and Access Management (15 rules)
116
119
  - Data Protection and Encryption (8 rules)
117
120
  - Network Security Controls (20 rules)
118
121
  - Logging and Monitoring (13 rules)
119
- - Backup and Recovery (12 rules)
122
+ - Backup and Recovery (17 rules) - **6 AWS Backup service controls (3 IG1 + 3 IG2)**
120
123
  - Security Services Integration (5 rules)
121
124
  - Configuration Management (9 rules)
122
125
  - Vulnerability Management (5 rules)
123
126
 
124
- ### IG2 - Enhanced Security (+37 Rules) ✅
127
+ ### IG2 - Enhanced Security (+74 Rules) ✅
125
128
  **100% Coverage Achieved**
126
129
  - Advanced Encryption at Rest (6 rules)
127
130
  - Certificate Management (2 rules)
@@ -132,6 +135,11 @@ aws-cis-assess assess --output-format json
132
135
  - Network Segmentation (5 rules)
133
136
  - Auto-scaling Security (1 rule)
134
137
  - Enhanced Access Controls (8 rules)
138
+ - AWS Backup Advanced Controls (3 rules) - **Vault lock, reporting, restore testing**
139
+ - Audit Log Management (7 rules) - **Control 8 comprehensive logging coverage**
140
+ - Secure Configuration (5 rules) - **Control 4: session duration, security groups, VPC DNS, RDS admin, EC2 least privilege**
141
+ - Account Management (4 rules) - **Control 5: service account docs, admin policies, SSO, inline policies**
142
+ - Access Control Management (5 rules) - **Control 6: Access Analyzer, permission boundaries, SCPs, Cognito MFA, VPN MFA**
135
143
 
136
144
  ### IG3 - Advanced Security (+1 Rule) ✅
137
145
  **100% Coverage Achieved**
@@ -139,19 +147,82 @@ aws-cis-assess assess --output-format json
139
147
  - Critical for preventing application-layer attacks
140
148
  - Required for high-security environments
141
149
 
142
- ### Bonus Security Rules (+5 Rules) ✅
150
+ ### Bonus Security Rules (+32 Rules) ✅
143
151
  **Additional Value Beyond CIS Requirements**
144
152
  - Enhanced logging security (`cloudwatch-log-group-encrypted`)
145
153
  - Network security enhancement (`incoming-ssh-disabled`)
146
154
  - Data streaming encryption (`kinesis-stream-encrypted`)
147
155
  - Network access control (`restricted-incoming-traffic`)
148
156
  - Message queue encryption (`sqs-queue-encrypted-kms`)
157
+ - Route 53 DNS query logging (`route53-query-logging-enabled`)
158
+ - Plus 26 additional security enhancements
159
+ - Application Load Balancer access logs (`alb-access-logs-enabled`)
160
+ - CloudFront distribution access logs (`cloudfront-access-logs-enabled`)
161
+ - WAF web ACL logging (`waf-logging-enabled`)
162
+
163
+ ### 🔍 CIS Control 8: Audit Log Management (13 Rules)
164
+ **Comprehensive Audit Logging Coverage**
165
+
166
+ Control 8 focuses on collecting, alerting, reviewing, and retaining audit logs of events that could help detect, understand, or recover from an attack. Our implementation provides comprehensive coverage across AWS services:
167
+
168
+ **DNS Query Logging**
169
+ - `route53-query-logging-enabled`: Validates Route 53 hosted zones have query logging enabled to track DNS queries for security investigations
170
+
171
+ **Load Balancer & CDN Logging**
172
+ - `alb-access-logs-enabled`: Ensures Application Load Balancers capture access logs for traffic analysis
173
+ - `elb-logging-enabled`: Validates Classic Load Balancers have access logging enabled
174
+ - `cloudfront-access-logs-enabled`: Ensures CloudFront distributions log content delivery requests
175
+
176
+ **Log Retention & Management**
177
+ - `cloudwatch-log-retention-check`: Validates log groups have appropriate retention periods (minimum 90 days)
178
+ - `cw-loggroup-retention-period-check`: Additional log retention validation
179
+
180
+ **CloudTrail Monitoring**
181
+ - `cloudtrail-insights-enabled`: Enables anomaly detection for unusual API activity
182
+
183
+ **Configuration Tracking**
184
+ - `config-recording-all-resources`: Ensures AWS Config tracks all resource configuration changes
185
+
186
+ **Application Security Logging**
187
+ - `waf-logging-enabled`: Validates WAF web ACLs capture firewall events
188
+ - `wafv2-logging-enabled`: Ensures WAFv2 web ACLs have logging enabled
189
+
190
+ **Database & Service Logging**
191
+ - `rds-logging-enabled`: Validates RDS instances have appropriate logging enabled
192
+ - `elasticsearch-logs-to-cloudwatch`: Ensures Elasticsearch domains send logs to CloudWatch
193
+ - `codebuild-project-logging-enabled`: Validates CodeBuild projects capture build logs
194
+ - `redshift-cluster-configuration-check`: Ensures Redshift clusters have audit logging enabled
195
+
196
+ ### 🔐 CIS Controls 4, 5, 6: Access & Configuration Controls (14 Rules)
197
+ **Comprehensive Identity, Access Management, and Secure Configuration Coverage**
198
+
199
+ These controls focus on secure configuration of enterprise assets, account management, and access control management. Our implementation provides comprehensive coverage across AWS IAM, networking, and identity services:
200
+
201
+ **Control 4 - Secure Configuration (5 rules)**
202
+ - `iam-max-session-duration-check`: Validates IAM role session duration does not exceed 12 hours to limit credential exposure
203
+ - `security-group-default-rules-check`: Ensures default security groups have no inbound or outbound rules to prevent unintended access
204
+ - `vpc-dns-resolution-enabled`: Validates VPC DNS settings (enableDnsHostnames and enableDnsSupport) are properly configured
205
+ - `rds-default-admin-check`: Ensures RDS instances don't use default admin usernames (postgres, admin, root, mysql, administrator)
206
+ - `ec2-instance-profile-least-privilege`: Validates EC2 instance profile permissions follow least privilege principles
207
+
208
+ **Control 5 - Account Management (4 rules)**
209
+ - `iam-service-account-inventory-check`: Validates service accounts have required documentation tags (Purpose, Owner, LastReviewed)
210
+ - `iam-admin-policy-attached-to-role-check`: Ensures administrative policies are attached to roles, not directly to users
211
+ - `sso-enabled-check`: Validates AWS IAM Identity Center is configured and enabled for centralized identity management
212
+ - `iam-user-no-inline-policies`: Ensures IAM users don't have inline policies (only managed policies or group memberships)
213
+
214
+ **Control 6 - Access Control Management (5 rules)**
215
+ - `iam-access-analyzer-enabled`: Validates IAM Access Analyzer is enabled in all active regions for external access detection
216
+ - `iam-permission-boundaries-check`: Ensures permission boundaries are configured for roles with elevated privileges
217
+ - `organizations-scp-enabled-check`: Validates AWS Organizations Service Control Policies are enabled and in use
218
+ - `cognito-user-pool-mfa-enabled`: Ensures Cognito user pools have MFA enabled for enhanced authentication security
219
+ - `vpn-connection-mfa-enabled`: Validates Client VPN endpoints require MFA authentication
149
220
 
150
221
  ## 🏗️ Production Architecture
151
222
 
152
223
  ### Core Components
153
224
  - **Assessment Engine**: Orchestrates compliance evaluations across all AWS regions
154
- - **Control Assessments**: 136 individual rule implementations with robust error handling
225
+ - **Control Assessments**: 149 individual rule implementations with robust error handling
155
226
  - **Scoring Engine**: Calculates compliance scores and generates executive metrics
156
227
  - **Reporting System**: Multi-format output with detailed remediation guidance
157
228
  - **Resource Management**: Optimized for enterprise-scale deployments with memory management
@@ -247,7 +318,87 @@ MIT License - see [LICENSE](LICENSE) file for details.
247
318
 
248
319
  ---
249
320
 
250
- **Framework Version**: 1.0.0+
251
- **CIS Controls Coverage**: 131/131 rules (100%) + 5 bonus rules
321
+ **Framework Version**: 1.1.0 (in development)
322
+ **CIS Controls Coverage**: 151/151 rules (100%) + 9 bonus rules
252
323
  **Production Status**: ✅ Ready for immediate enterprise deployment
253
324
  **Last Updated**: January 2026
325
+
326
+ ## 🆕 What's New in Version 1.1.0
327
+
328
+ ### Access & Configuration Controls (CIS Controls 4, 5, 6)
329
+ Fourteen new controls added to assess identity, access management, and secure configuration:
330
+
331
+ **Control 4 - Secure Configuration (5 rules)**:
332
+ 1. **iam-max-session-duration-check** - Validates IAM role session duration does not exceed 12 hours
333
+ - Ensures temporary credentials have limited exposure window
334
+ - Checks MaxSessionDuration property on all IAM roles
335
+ - Compliant if session duration ≤ 43200 seconds (12 hours)
336
+
337
+ 2. **security-group-default-rules-check** - Ensures default security groups have no rules
338
+ - Validates default security groups are restricted (no inbound/outbound rules)
339
+ - Prevents unintended access through default security groups
340
+ - Encourages use of custom security groups with explicit rules
341
+
342
+ 3. **vpc-dns-resolution-enabled** - Validates VPC DNS configuration
343
+ - Checks both enableDnsHostnames and enableDnsSupport are enabled
344
+ - Ensures proper DNS resolution within VPCs
345
+ - Required for many AWS services to function correctly
346
+
347
+ 4. **rds-default-admin-check** - Ensures RDS instances don't use default admin usernames
348
+ - Detects default usernames: postgres, admin, root, mysql, administrator, sa
349
+ - Case-insensitive detection
350
+ - Reduces risk of credential guessing attacks
351
+
352
+ 5. **ec2-instance-profile-least-privilege** - Validates EC2 instance profile permissions
353
+ - Checks for overly permissive policies (AdministratorAccess, PowerUserAccess)
354
+ - Detects wildcard permissions (Action: "*", Resource: "*")
355
+ - Ensures least privilege principle for EC2 workloads
356
+
357
+ **Control 5 - Account Management (4 rules)**:
358
+ 6. **iam-service-account-inventory-check** - Validates service account documentation
359
+ - Ensures service accounts have required tags: Purpose, Owner, LastReviewed
360
+ - Identifies service accounts by naming convention or tags
361
+ - Supports compliance and access review processes
362
+
363
+ 7. **iam-admin-policy-attached-to-role-check** - Ensures admin policies on roles, not users
364
+ - Detects administrative policies attached directly to IAM users
365
+ - Encourages role-based access with temporary credentials
366
+ - Improves audit trail and access management
367
+
368
+ 8. **sso-enabled-check** - Validates AWS IAM Identity Center (SSO) is configured
369
+ - Checks for SSO instance existence
370
+ - Encourages centralized identity management
371
+ - Supports integration with corporate identity providers
372
+
373
+ 9. **iam-user-no-inline-policies** - Ensures IAM users don't have inline policies
374
+ - Detects inline policies attached to users
375
+ - Encourages use of managed policies for reusability
376
+ - Simplifies policy management and auditing
377
+
378
+ **Control 6 - Access Control Management (5 rules)**:
379
+ 10. **iam-access-analyzer-enabled** - Validates Access Analyzer in all regions
380
+ - Ensures IAM Access Analyzer is enabled regionally
381
+ - Detects resources shared with external entities
382
+ - Provides continuous monitoring for unintended access
383
+
384
+ 11. **iam-permission-boundaries-check** - Validates permission boundaries for elevated roles
385
+ - Identifies roles with elevated privileges
386
+ - Checks for permission boundary configuration
387
+ - Prevents privilege escalation in delegated administration
388
+
389
+ 12. **organizations-scp-enabled-check** - Validates Service Control Policies are in use
390
+ - Checks account is part of AWS Organizations
391
+ - Verifies SCPs are enabled (FeatureSet includes ALL)
392
+ - Ensures custom SCPs exist beyond default FullAWSAccess
393
+
394
+ 13. **cognito-user-pool-mfa-enabled** - Ensures Cognito user pools have MFA
395
+ - Validates MfaConfiguration is 'ON' or 'OPTIONAL'
396
+ - Supports both SMS and TOTP authentication methods
397
+ - Enhances authentication security for applications
398
+
399
+ 14. **vpn-connection-mfa-enabled** - Validates Client VPN endpoints require MFA
400
+ - Checks VPN authentication options for MFA requirement
401
+ - Supports Active Directory, SAML, and certificate-based MFA
402
+ - Ensures secure remote access to AWS resources
403
+
404
+ These controls complement the existing audit logging and backup controls by providing comprehensive coverage of identity, access management, and secure configuration practices. Total rules: 163 (149 previous + 14 new). See [Config Rule Mappings](docs/config-rule-mappings.md) for detailed documentation.
@@ -1,16 +1,16 @@
1
- aws_cis_assessment/__init__.py,sha256=EO4JEYzH1KqBsVY47ECD1ctR40yddm7WEfZRGfctQf8,480
1
+ aws_cis_assessment/__init__.py,sha256=9OlnlIo1cWbCTuav3NJ9LOgo_ixBbsyKL75BIw2kjoM,480
2
2
  aws_cis_assessment/cli/__init__.py,sha256=DYaGVAIoy5ucs9ubKQxX6Z3ZD46AGz9AaIaDQXzrzeY,100
3
3
  aws_cis_assessment/cli/examples.py,sha256=F9K2Fe297kUfwoq6Ine9Aj_IXNU-KwO9hd7SAPWeZHI,12884
4
4
  aws_cis_assessment/cli/main.py,sha256=i5QoqHXsPG_Kw0W7jM3Zj2YaAaCJnxxnfz82QBBHq-U,49441
5
5
  aws_cis_assessment/cli/utils.py,sha256=ufdsifIPIE9HKVZAvFXfeJgEk_aAmz01tDrEukVyL0g,9783
6
6
  aws_cis_assessment/config/__init__.py,sha256=aSQyaKGEQ7WgldC8IocY-YK7nduzfgjI6EuDE4Xti6s,77
7
7
  aws_cis_assessment/config/config_loader.py,sha256=Wk6gfblj8RWU5QctHjPu5tTJMIb8lbEW3Ic9z-se4uQ,13165
8
- aws_cis_assessment/config/rules/cis_controls_ig1.yaml,sha256=_fzD09kHEeriBmNp-6GPsuZZFFfoY4d-OiNexM8mbGA,28310
9
- aws_cis_assessment/config/rules/cis_controls_ig2.yaml,sha256=sMQXkLWFgpbVhfrjvGwwWnOj-5TKu-wTQPnOWveARns,18464
8
+ aws_cis_assessment/config/rules/cis_controls_ig1.yaml,sha256=keJ9QeRRKOzc8OVcSPthbFG6HP2VyZLZVFByjjUKQuQ,32388
9
+ aws_cis_assessment/config/rules/cis_controls_ig2.yaml,sha256=kX4h-TFmaohNPhhFBrzHBZkitgG_kaRb2-XW_AJwnR0,48820
10
10
  aws_cis_assessment/config/rules/cis_controls_ig3.yaml,sha256=YSghyCmwKF5UNZXdQQQNsaidQ95VDUgnwvh4jsV6kQU,4347
11
11
  aws_cis_assessment/controls/__init__.py,sha256=oVTM94UAt0Vu7Hy-V84p6LAxZHORs-RRAj9j86r_730,72
12
12
  aws_cis_assessment/controls/base_control.py,sha256=DpjRrYdz3FzpuU_WtbvtqUBRgEoMW7Qgah-iD5Y_HJI,17227
13
- aws_cis_assessment/controls/ig1/__init__.py,sha256=fbBhuwDcekiSJJ5hCm4W76Rb66QDhGj7NRtTSU8ZamE,7748
13
+ aws_cis_assessment/controls/ig1/__init__.py,sha256=hV_Amiwd-6wcrQcSp8O_gTaqujiPkZ0BY20DdboTfkc,8411
14
14
  aws_cis_assessment/controls/ig1/control_1_1.py,sha256=MwxaFCayJmFrBeGrVyTcLUksrPqRHId76m2Du1Vuk4I,28070
15
15
  aws_cis_assessment/controls/ig1/control_2_2.py,sha256=yPp4aGGGzroAFqoTSaujjALSPq4jPxcaDiDIhwC11P0,11504
16
16
  aws_cis_assessment/controls/ig1/control_3_3.py,sha256=f4ZuiMR6qSXCmVwP3OflEeZn48qpzQqq0XfjZgbq3Go,35668
@@ -18,6 +18,7 @@ aws_cis_assessment/controls/ig1/control_3_4.py,sha256=Flw_cA8_Qxv8zuIbOWv6JAYUdj
18
18
  aws_cis_assessment/controls/ig1/control_4_1.py,sha256=-lIoa0XRGwiRdtG9L9f00Wud525FZbv3961bXMuiQIE,22362
19
19
  aws_cis_assessment/controls/ig1/control_access_keys.py,sha256=Hj3G0Qpwa2EcJE-u49nvADjbESZh9YClElfP4dWYQfk,14424
20
20
  aws_cis_assessment/controls/ig1/control_advanced_security.py,sha256=PNtPfqSKGu7UYDx6PccO8tVT5ZL6YmzeH45Cew_UjLM,24256
21
+ aws_cis_assessment/controls/ig1/control_aws_backup_service.py,sha256=_bUc6x7jXhav0Cm5jfX0_tk1UOa8qoso2ND1-6xsPtI,54651
21
22
  aws_cis_assessment/controls/ig1/control_backup_recovery.py,sha256=Y5za_4lCZmA5MYhHp4OCGyL4z97cj6dbO0KfabQ5Hr0,21465
22
23
  aws_cis_assessment/controls/ig1/control_cloudtrail_logging.py,sha256=lQOjshW8BBymvzphtWuwg4wIyv6nH2mOSiogBe_Ejfo,8514
23
24
  aws_cis_assessment/controls/ig1/control_critical_security.py,sha256=1MVMkfOAWcH5ppFv7psZvJvcOtpww6Pl5WFXrMyN158,20942
@@ -31,11 +32,14 @@ aws_cis_assessment/controls/ig1/control_network_security.py,sha256=DyaXzpMuZ5Ba9
31
32
  aws_cis_assessment/controls/ig1/control_s3_enhancements.py,sha256=uP0Ko6cjTvmpg47vNtdaFgdjVPMS6Yjww-WZQIzvk8o,7759
32
33
  aws_cis_assessment/controls/ig1/control_s3_security.py,sha256=8vt2rnNPdgQrvO5Ds3yV74mQ7qkF0f_LpKqQLjg0AQc,18308
33
34
  aws_cis_assessment/controls/ig1/control_vpc_security.py,sha256=RCtBUozvdIPrXKFU0ssxjBF6A9l_HMcAbRv0K87Bbhc,10639
34
- aws_cis_assessment/controls/ig2/__init__.py,sha256=mMOtjYH_CcH-ioswgVLse4XOh-i_-TDoLenJbSxiuFQ,5985
35
+ aws_cis_assessment/controls/ig2/__init__.py,sha256=xJyhtNpaLfQ2nljPnREY3pltMcrDJJ2WsIxO8sJop74,8613
35
36
  aws_cis_assessment/controls/ig2/control_3_10.py,sha256=xv2F85SB1Jd5g7HWZzrqGntTH3az8BbCcZLlDV2Di7g,33762
36
37
  aws_cis_assessment/controls/ig2/control_3_11.py,sha256=Xrn1PRWQp3kK3won-AieUMIweEPQAF3Sb4OcFsUTj2A,65245
38
+ aws_cis_assessment/controls/ig2/control_4_5_6_access_configuration.py,sha256=BukLazjKsSzy49KjV2ajLMALUk0ygz5T7tyk3QtAe08,120785
37
39
  aws_cis_assessment/controls/ig2/control_5_2.py,sha256=5-3eHaltXP_UiMTlk3pLv4VafzBf41Vjh_8DpWfhqrw,19060
40
+ aws_cis_assessment/controls/ig2/control_8_audit_logging.py,sha256=OWPl1Xf3lGct6smclHl931CRzgVFXpGkWdqjbT8oHZg,44934
38
41
  aws_cis_assessment/controls/ig2/control_advanced_encryption.py,sha256=S3wU0f46FIc8e50fd4zvyrLe8J5j9Ryb94he32XWVdQ,14201
42
+ aws_cis_assessment/controls/ig2/control_aws_backup_ig2.py,sha256=FApHDPLQFDvfyvCClbdQC-9ap6I6wpW1d6D85bvHmMQ,907
39
43
  aws_cis_assessment/controls/ig2/control_codebuild_security.py,sha256=k2f8Xh6l09o1rb3B_J412qDsHI_Y8to3Ap8FbTGQ05g,11517
40
44
  aws_cis_assessment/controls/ig2/control_encryption_rest.py,sha256=EQ2wK1uz9LWpZiep_kMB4zccg9keh0XMiy44fIKt49Q,18002
41
45
  aws_cis_assessment/controls/ig2/control_encryption_transit.py,sha256=g9BOuA9ovTDT2WZ18k0i4YiZoz_Fsovihth4Kd4rE9k,18801
@@ -50,7 +54,7 @@ aws_cis_assessment/controls/ig3/control_3_14.py,sha256=fY2MZATcicuP1Zich5L7J6-MM
50
54
  aws_cis_assessment/controls/ig3/control_7_1.py,sha256=GZQt0skGJVlUbGoH4MD5AoJJONf0nT9k7WQT-8F3le4,18499
51
55
  aws_cis_assessment/core/__init__.py,sha256=aXt5Z3mqaaDvFyZPyMaJYFy66A_phfFIhhH_eyaic8Q,52
52
56
  aws_cis_assessment/core/accuracy_validator.py,sha256=jnN2O32PpdDfWAp6erV4v4zKugC9ziJkDYnVF93FVuY,18386
53
- aws_cis_assessment/core/assessment_engine.py,sha256=-dxww7Qp-dww3pUmyLOBAt44U2CrcP_8WmhjFrJ8sMw,62509
57
+ aws_cis_assessment/core/assessment_engine.py,sha256=I__VAJ93m3KWrIpexgF4_FpuSvH2fNM_tq8eaUNTJv4,66807
54
58
  aws_cis_assessment/core/audit_trail.py,sha256=qapCkI2zjbAPHlHQcgYonfDYyjU2MoX5Sc2IXtYj3eE,18395
55
59
  aws_cis_assessment/core/aws_client_factory.py,sha256=1qTLfQ3fgPBH3mWRpX1_i3bbHlQQYsmSE8vsKxKTz8w,13143
56
60
  aws_cis_assessment/core/error_handler.py,sha256=5JgH3Y2yG1-ZSuEJR7o0ZMzqlwGWFRW2N4SjcL2gnBw,24219
@@ -59,24 +63,25 @@ aws_cis_assessment/core/scoring_engine.py,sha256=ylx2urk_DxGzU_LZB0ip-qtUzOh4yu0
59
63
  aws_cis_assessment/reporters/__init__.py,sha256=GXdlY08kKy1Y3mMBv8Y0JuUB69u--e5DIu2jNJpc6QI,357
60
64
  aws_cis_assessment/reporters/base_reporter.py,sha256=joy_O4IL4Hs_qwAuPtl81GIPxLAbUAMFKiF8r5si2aw,18082
61
65
  aws_cis_assessment/reporters/csv_reporter.py,sha256=r83xzfP1t5AO9MfKawgN4eTeOU6eGZwJQgvNDLEd7NI,31419
62
- aws_cis_assessment/reporters/html_reporter.py,sha256=i5HBLAjZB1TKAUrc6X7-Qbzr7QTQOwLplDu-ZnDzTUs,113444
66
+ aws_cis_assessment/reporters/html_reporter.py,sha256=vnTP831t4I1G763ZmWqtvoKXzecJOVxnH8q_DRD--qs,118917
63
67
  aws_cis_assessment/reporters/json_reporter.py,sha256=MObCzTc9nlGTEXeWc7P8tTMeKCpEaJNfcSYc79cHXhc,22250
64
- aws_cis_controls_assessment-1.0.9.dist-info/licenses/LICENSE,sha256=T_p0qKH4RoI3ejr3tktf3rx2Zart_9KeUmJd5iiqXW8,1079
68
+ aws_cis_controls_assessment-1.1.0.dist-info/licenses/LICENSE,sha256=T_p0qKH4RoI3ejr3tktf3rx2Zart_9KeUmJd5iiqXW8,1079
65
69
  deprecation-package/aws_cis_assessment_deprecated/__init__.py,sha256=WOaufqanKNhvWQ3frj8e627tS_kZnyk2R2hwqPFqydw,1892
66
- docs/README.md,sha256=8UaAzc2pI1nhMFf_pGSFAf0UfeaM1MXw9X93IrN-z5A,4264
67
- docs/assessment-logic.md,sha256=7t1YPkLPI3-MpvF3cLpO4x4LeNMfM950-es4vn0W4Zc,27123
68
- docs/cli-reference.md,sha256=zyTacw3neOJ2lQmq8E7WPJUDGMIDgUzQCqutu0lJ3SY,17854
69
- docs/config-rule-mappings.md,sha256=Jk31ZqnSn1JAR3iXHlhGnVxVpPukVuCZtK4H58j08Nk,18508
70
- docs/developer-guide.md,sha256=uC0DvgmBoOQ2LnBNManTe_rdOccvjWbzvqd93huO4jE,31026
70
+ docs/README.md,sha256=MXnfbPRmxir-7ihG2lNmLI9TJG0Pp0QWqoDZtXiH_Mk,4912
71
+ docs/adding-aws-backup-controls.md,sha256=l_H0H8W71n-6NbeplNujC_li2NiaQcYPr0hQMhEPbrc,21081
72
+ docs/assessment-logic.md,sha256=necuK7Ufk7zusuoGq5FKjOv0Z6Ih6s4m-yfLaJCfRto,38908
73
+ docs/cli-reference.md,sha256=wrifE4XDYt-sN8s4KD86IWgX5FjtXIzM3mTe1me7QsM,17881
74
+ docs/config-rule-mappings.md,sha256=rdsRavSQHFicsjizgs07WKAhOXddspKsb3zdUgKDmp0,41407
75
+ docs/developer-guide.md,sha256=SqT2VEwDyIcLRcIn9BmM5J-V0qN9ctPa2JZ6wxvnqvo,43935
71
76
  docs/dual-scoring-implementation.md,sha256=n8xwurAAx4iOyCeITE9Anvz6W6YupejVYWt6ARtmmTY,8567
72
77
  docs/html-report-improvements.md,sha256=a0OzKvQC_KpcielntTHXMPObwulfWIDgBKnF66iaxp4,11432
73
- docs/installation.md,sha256=y_CQE44yE3ENeAcBANonJUqsl9pLQsGOX92tui-t2OU,9576
78
+ docs/installation.md,sha256=GAyHN3LseuN2dRogemnwGaDo-Udp0V23KUd_m-9SrJQ,9576
74
79
  docs/scoring-comparison-aws-config.md,sha256=8BBe1tQsaAT0BAE3OdGIRFjuT1VJcOlM1qBWFmZKaIo,11801
75
80
  docs/scoring-methodology.md,sha256=C86FisBxKt6pyr-Kp6rAVPz45yPZpgsGibjgq8obIsg,9404
76
- docs/troubleshooting.md,sha256=JcYw6qS9G9YsM0MxxxZUGfPZmmZBxDYTV8tAIK0Sa2U,13175
77
- docs/user-guide.md,sha256=4azuL1RWewtA2wRH0ejHkCvVKV3dBfyRJ28THahlmaA,10352
78
- aws_cis_controls_assessment-1.0.9.dist-info/METADATA,sha256=UjpUaAlo77AoGVHC8-okG5bo5DlWjwR7boXomQsPrKk,11809
79
- aws_cis_controls_assessment-1.0.9.dist-info/WHEEL,sha256=wUyA8OaulRlbfwMtmQsvNngGrxQHAvkKcvRmdizlJi0,92
80
- aws_cis_controls_assessment-1.0.9.dist-info/entry_points.txt,sha256=-AxPn5Y7yau0pQh33F5_uyWfvcnm2Kg1_nMQuLrZ7SY,68
81
- aws_cis_controls_assessment-1.0.9.dist-info/top_level.txt,sha256=4OHmV6RAEWkz-Se50kfmuGCd-mUSotDZz3iLGF9CmkI,44
82
- aws_cis_controls_assessment-1.0.9.dist-info/RECORD,,
81
+ docs/troubleshooting.md,sha256=mGmWgrc3A1dn-Uk_XxWFh04OQxjmqkeax8vQX7takg0,18220
82
+ docs/user-guide.md,sha256=lBDgU40tIPstOdNx4YqVkPTIDntn4o2y2tr2CPQt7b8,11942
83
+ aws_cis_controls_assessment-1.1.0.dist-info/METADATA,sha256=OlnrvuCgBP2cPn7l8YQjw2TCf4d715qpQ8C8gyX8GcY,21383
84
+ aws_cis_controls_assessment-1.1.0.dist-info/WHEEL,sha256=wUyA8OaulRlbfwMtmQsvNngGrxQHAvkKcvRmdizlJi0,92
85
+ aws_cis_controls_assessment-1.1.0.dist-info/entry_points.txt,sha256=-AxPn5Y7yau0pQh33F5_uyWfvcnm2Kg1_nMQuLrZ7SY,68
86
+ aws_cis_controls_assessment-1.1.0.dist-info/top_level.txt,sha256=4OHmV6RAEWkz-Se50kfmuGCd-mUSotDZz3iLGF9CmkI,44
87
+ aws_cis_controls_assessment-1.1.0.dist-info/RECORD,,
docs/README.md CHANGED
@@ -2,6 +2,15 @@
2
2
 
3
3
  Welcome to the comprehensive documentation for the AWS CIS Controls Compliance Assessment Framework. This production-ready, enterprise-grade framework evaluates AWS account security posture against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications without requiring AWS Config to be enabled.
4
4
 
5
+ ## 🆕 Latest Updates (Version 1.0.10)
6
+
7
+ ### New AWS Backup Service Controls
8
+ Two new controls added to assess AWS Backup infrastructure security:
9
+ - **backup-plan-min-frequency-and-min-retention-check** - Validates backup plan policies
10
+ - **backup-vault-access-policy-check** - Ensures backup vault security
11
+
12
+ See the [AWS Backup Controls Guide](adding-aws-backup-controls.md) for detailed documentation.
13
+
5
14
  ## Documentation Structure
6
15
 
7
16
  ### User Documentation
@@ -15,6 +24,7 @@ Welcome to the comprehensive documentation for the AWS CIS Controls Compliance A
15
24
  - **[Assessment Logic](assessment-logic.md)** - Detailed assessment logic documentation
16
25
  - **[Config Rule Mappings](config-rule-mappings.md)** - Complete mapping of CIS Controls to AWS Config rules
17
26
  - **[HTML Report Improvements](html-report-improvements.md)** - Enhanced HTML report features and customization
27
+ - **[AWS Backup Controls Guide](adding-aws-backup-controls.md)** - **NEW:** Comprehensive guide for AWS Backup service controls
18
28
 
19
29
  ## Quick Start
20
30
 
@@ -25,16 +35,17 @@ Welcome to the comprehensive documentation for the AWS CIS Controls Compliance A
25
35
 
26
36
  ## Key Features
27
37
 
28
- - **✅ Complete Coverage**: 136 AWS Config rules (131 CIS Controls + 5 bonus security rules)
38
+ - **✅ Complete Coverage**: 138 AWS Config rules (133 CIS Controls + 5 bonus security rules)
29
39
  - **✅ Production Ready**: Enterprise-tested with comprehensive error handling
30
40
  - **✅ Performance Optimized**: Handles large-scale assessments efficiently
31
41
  - **✅ Multiple Output Formats**: JSON, HTML, and CSV reports with detailed remediation guidance
32
42
  - **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
33
43
  - **✅ Enterprise Architecture**: Scalable, maintainable framework with audit trails
44
+ - **✅ AWS Backup Controls**: Comprehensive backup infrastructure assessment
34
45
 
35
46
  ## Implementation Groups Overview
36
47
 
37
- ### IG1 - Essential Cyber Hygiene (93 Config Rules) ✅
48
+ ### IG1 - Essential Cyber Hygiene (95 Config Rules) ✅
38
49
  **100% Coverage Achieved**
39
50
  Foundational safeguards for all enterprises:
40
51
  - Asset Inventory and Management (6 rules)
@@ -42,7 +53,7 @@ Foundational safeguards for all enterprises:
42
53
  - Data Protection and Encryption (8 rules)
43
54
  - Network Security Controls (20 rules)
44
55
  - Logging and Monitoring (13 rules)
45
- - Backup and Recovery (12 rules)
56
+ - Backup and Recovery (14 rules) - **NEW: AWS Backup service controls**
46
57
  - Security Services Integration (5 rules)
47
58
  - Configuration Management (9 rules)
48
59
  - Vulnerability Management (5 rules)