aws-cis-controls-assessment 1.1.4__tar.gz → 1.2.2__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (123) hide show
  1. aws_cis_controls_assessment-1.2.2/PKG-INFO +320 -0
  2. aws_cis_controls_assessment-1.2.2/README.md +263 -0
  3. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/__init__.py +4 -4
  4. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/config/rules/cis_controls_ig1.yaml +365 -2
  5. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/base_control.py +106 -24
  6. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/__init__.py +144 -15
  7. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_4_1.py +4 -4
  8. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_access_analyzer.py +198 -0
  9. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_access_asset_mgmt.py +360 -0
  10. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_access_control.py +323 -0
  11. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_backup_security.py +579 -0
  12. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_cloudfront_logging.py +215 -0
  13. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_configuration_mgmt.py +407 -0
  14. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_data_classification.py +255 -0
  15. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_dynamodb_encryption.py +279 -0
  16. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_ebs_encryption.py +177 -0
  17. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_efs_encryption.py +243 -0
  18. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_elb_logging.py +195 -0
  19. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_guardduty.py +156 -0
  20. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_inspector.py +184 -0
  21. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_inventory.py +511 -0
  22. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_macie.py +165 -0
  23. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_messaging_encryption.py +419 -0
  24. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_mfa.py +485 -0
  25. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_network_security.py +247 -0
  26. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_patch_management.py +626 -0
  27. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_rds_encryption.py +228 -0
  28. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_s3_encryption.py +383 -0
  29. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_tls_ssl.py +556 -0
  30. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_version_mgmt.py +337 -0
  31. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_vpc_flow_logs.py +205 -0
  32. aws_cis_controls_assessment-1.2.2/aws_cis_assessment/controls/ig1/control_waf_logging.py +226 -0
  33. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/core/assessment_engine.py +160 -11
  34. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/core/aws_client_factory.py +17 -5
  35. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/core/models.py +20 -1
  36. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/core/scoring_engine.py +102 -1
  37. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/reporters/base_reporter.py +58 -13
  38. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/reporters/html_reporter.py +186 -9
  39. aws_cis_controls_assessment-1.2.2/aws_cis_controls_assessment.egg-info/PKG-INFO +320 -0
  40. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_controls_assessment.egg-info/SOURCES.txt +24 -0
  41. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_controls_assessment.egg-info/top_level.txt +1 -0
  42. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/developer-guide.md +204 -5
  43. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/user-guide.md +137 -4
  44. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/pyproject.toml +1 -1
  45. aws_cis_controls_assessment-1.1.4/PKG-INFO +0 -404
  46. aws_cis_controls_assessment-1.1.4/README.md +0 -347
  47. aws_cis_controls_assessment-1.1.4/aws_cis_assessment/controls/ig1/control_network_security.py +0 -672
  48. aws_cis_controls_assessment-1.1.4/aws_cis_controls_assessment.egg-info/PKG-INFO +0 -404
  49. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/LICENSE +0 -0
  50. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/MANIFEST.in +0 -0
  51. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/cli/__init__.py +0 -0
  52. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/cli/examples.py +0 -0
  53. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/cli/main.py +0 -0
  54. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/cli/utils.py +0 -0
  55. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/config/__init__.py +0 -0
  56. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/config/config_loader.py +0 -0
  57. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/config/rules/cis_controls_ig2.yaml +0 -0
  58. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/config/rules/cis_controls_ig3.yaml +0 -0
  59. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/__init__.py +0 -0
  60. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_1_1.py +0 -0
  61. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_2_2.py +0 -0
  62. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_3_3.py +0 -0
  63. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_3_4.py +0 -0
  64. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_access_keys.py +0 -0
  65. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_advanced_security.py +0 -0
  66. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_aws_backup_service.py +0 -0
  67. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_backup_recovery.py +0 -0
  68. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_cloudtrail_logging.py +0 -0
  69. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_critical_security.py +0 -0
  70. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_data_protection.py +0 -0
  71. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_iam_advanced.py +0 -0
  72. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_iam_governance.py +0 -0
  73. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_iam_policies.py +0 -0
  74. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_instance_optimization.py +0 -0
  75. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_network_enhancements.py +0 -0
  76. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_s3_enhancements.py +0 -0
  77. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_s3_security.py +0 -0
  78. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig1/control_vpc_security.py +0 -0
  79. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/__init__.py +0 -0
  80. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_3_10.py +0 -0
  81. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_3_11.py +0 -0
  82. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_4_5_6_access_configuration.py +0 -0
  83. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_5_2.py +0 -0
  84. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_8_audit_logging.py +0 -0
  85. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_advanced_encryption.py +0 -0
  86. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_aws_backup_ig2.py +0 -0
  87. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_codebuild_security.py +0 -0
  88. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_encryption_rest.py +0 -0
  89. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_encryption_transit.py +0 -0
  90. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_network_ha.py +0 -0
  91. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_remaining_encryption.py +0 -0
  92. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_remaining_rules.py +0 -0
  93. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig2/control_service_logging.py +0 -0
  94. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig3/__init__.py +0 -0
  95. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig3/control_12_8.py +0 -0
  96. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig3/control_13_1.py +0 -0
  97. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig3/control_3_14.py +0 -0
  98. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/controls/ig3/control_7_1.py +0 -0
  99. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/core/__init__.py +0 -0
  100. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/core/accuracy_validator.py +0 -0
  101. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/core/audit_trail.py +0 -0
  102. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/core/error_handler.py +0 -0
  103. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/reporters/__init__.py +0 -0
  104. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/reporters/csv_reporter.py +0 -0
  105. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_assessment/reporters/json_reporter.py +0 -0
  106. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_controls_assessment.egg-info/dependency_links.txt +0 -0
  107. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_controls_assessment.egg-info/entry_points.txt +0 -0
  108. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/aws_cis_controls_assessment.egg-info/requires.txt +0 -0
  109. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/deprecation-package/aws_cis_assessment_deprecated/__init__.py +0 -0
  110. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/README.md +0 -0
  111. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/adding-aws-backup-controls.md +0 -0
  112. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/assessment-logic.md +0 -0
  113. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/cli-reference.md +0 -0
  114. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/config-rule-mappings.md +0 -0
  115. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/dual-scoring-implementation.md +0 -0
  116. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/html-report-improvements.md +0 -0
  117. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/installation.md +0 -0
  118. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/scoring-comparison-aws-config.md +0 -0
  119. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/scoring-methodology.md +0 -0
  120. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/docs/troubleshooting.md +0 -0
  121. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/pytest.ini +0 -0
  122. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/requirements.txt +0 -0
  123. {aws_cis_controls_assessment-1.1.4 → aws_cis_controls_assessment-1.2.2}/setup.cfg +0 -0
@@ -0,0 +1,320 @@
1
+ Metadata-Version: 2.4
2
+ Name: aws-cis-controls-assessment
3
+ Version: 1.2.2
4
+ Summary: Production-ready AWS CIS Controls compliance assessment framework with 175 comprehensive rules and 75%+ IG1 coverage
5
+ Author-email: AWS CIS Assessment Team <security@example.com>
6
+ Maintainer-email: AWS CIS Assessment Team <security@example.com>
7
+ License: MIT
8
+ Project-URL: Homepage, https://github.com/yourusername/aws-cis-controls-assessment
9
+ Project-URL: Documentation, https://github.com/yourusername/aws-cis-controls-assessment/blob/main/README.md
10
+ Project-URL: Repository, https://github.com/yourusername/aws-cis-controls-assessment.git
11
+ Project-URL: Bug Reports, https://github.com/yourusername/aws-cis-controls-assessment/issues
12
+ Project-URL: Changelog, https://github.com/yourusername/aws-cis-controls-assessment/blob/main/CHANGELOG.md
13
+ Project-URL: Source Code, https://github.com/yourusername/aws-cis-controls-assessment
14
+ Keywords: aws,security,compliance,cis,controls,assessment,audit,enterprise,production
15
+ Classifier: Development Status :: 5 - Production/Stable
16
+ Classifier: Intended Audience :: System Administrators
17
+ Classifier: Intended Audience :: Information Technology
18
+ Classifier: Intended Audience :: Developers
19
+ Classifier: License :: OSI Approved :: MIT License
20
+ Classifier: Operating System :: OS Independent
21
+ Classifier: Programming Language :: Python :: 3
22
+ Classifier: Programming Language :: Python :: 3.8
23
+ Classifier: Programming Language :: Python :: 3.9
24
+ Classifier: Programming Language :: Python :: 3.10
25
+ Classifier: Programming Language :: Python :: 3.11
26
+ Classifier: Programming Language :: Python :: 3.12
27
+ Classifier: Topic :: Security
28
+ Classifier: Topic :: System :: Systems Administration
29
+ Classifier: Topic :: Software Development :: Quality Assurance
30
+ Classifier: Environment :: Console
31
+ Classifier: Environment :: No Input/Output (Daemon)
32
+ Requires-Python: >=3.8
33
+ Description-Content-Type: text/markdown
34
+ License-File: LICENSE
35
+ Requires-Dist: boto3<2.0.0,>=1.26.0
36
+ Requires-Dist: PyYAML<7.0,>=6.0
37
+ Requires-Dist: click<9.0,>=8.0
38
+ Requires-Dist: jinja2<4.0,>=3.0
39
+ Requires-Dist: tabulate<1.0,>=0.9.0
40
+ Provides-Extra: dev
41
+ Requires-Dist: pytest<8.0,>=7.0.0; extra == "dev"
42
+ Requires-Dist: pytest-mock<4.0,>=3.10.0; extra == "dev"
43
+ Requires-Dist: pytest-cov<5.0,>=4.0.0; extra == "dev"
44
+ Requires-Dist: black<24.0,>=22.0.0; extra == "dev"
45
+ Requires-Dist: flake8<7.0,>=5.0.0; extra == "dev"
46
+ Requires-Dist: mypy<2.0,>=1.0.0; extra == "dev"
47
+ Requires-Dist: bandit<2.0,>=1.7.0; extra == "dev"
48
+ Requires-Dist: safety<3.0,>=2.0.0; extra == "dev"
49
+ Provides-Extra: test
50
+ Requires-Dist: pytest<8.0,>=7.0.0; extra == "test"
51
+ Requires-Dist: pytest-mock<4.0,>=3.10.0; extra == "test"
52
+ Requires-Dist: pytest-cov<5.0,>=4.0.0; extra == "test"
53
+ Provides-Extra: security
54
+ Requires-Dist: bandit<2.0,>=1.7.0; extra == "security"
55
+ Requires-Dist: safety<3.0,>=2.0.0; extra == "security"
56
+ Dynamic: license-file
57
+
58
+ # AWS CIS Controls Compliance Assessment Framework
59
+
60
+ A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **Enhanced CIS Controls coverage** with 125 IG1 rules implemented.
61
+
62
+ > **Production Status**: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend [AWS Config](https://aws.amazon.com/config/) for ongoing continuous compliance monitoring and automated remediation.
63
+
64
+ ## 🎯 Key Features
65
+
66
+ - **✅ Enhanced IG1 Coverage**: 125 IG1 rules implemented (75%+ coverage of CIS Controls v8.1 IG1 safeguards)
67
+ - **✅ 50 New Rules Added**: Comprehensive expansion across security services, logging, encryption, inventory, configuration management, and backup security
68
+ - **✅ Dual Scoring System**: Both weighted and AWS Config-style scoring methodologies
69
+ - **✅ Enhanced HTML Reports**: Control names, working search, improved remediation display
70
+ - **✅ Enterprise Ready**: Production-tested with enterprise-grade architecture
71
+ - **✅ Performance Optimized**: Handles large-scale assessments efficiently
72
+ - **✅ Multi-Format Reports**: JSON, HTML, and CSV with detailed remediation guidance
73
+ - **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
74
+ - **✅ Comprehensive Remediation**: Every rule includes CLI commands, console steps, best practices, and AWS documentation links
75
+
76
+ ## 🚀 Quick Start
77
+
78
+ ### Installation
79
+
80
+ ```bash
81
+ # Install from PyPI (production-ready)
82
+ pip install aws-cis-controls-assessment
83
+
84
+ # Or install from source for development
85
+ git clone <repository-url>
86
+ cd aws-cis-controls-assessment
87
+ pip install -e .
88
+ ```
89
+
90
+ ### Basic Usage
91
+
92
+ ```bash
93
+ # Run complete assessment (all 163 rules) - defaults to us-east-1
94
+ aws-cis-assess assess --aws-profile my-aws-profile
95
+
96
+ # Assess multiple regions
97
+ aws-cis-assess assess --aws-profile my-aws-profile --regions us-east-1,us-west-2
98
+
99
+ # Assess specific Implementation Group using short flag (defaults to us-east-1)
100
+ aws-cis-assess assess -p my-aws-profile --implementation-groups IG1 --output-format json
101
+
102
+ # Generate comprehensive HTML report (defaults to us-east-1)
103
+ aws-cis-assess assess --aws-profile production --output-format html --output-file compliance-report.html
104
+
105
+ # Enterprise multi-region assessment with multiple formats
106
+ aws-cis-assess assess -p security-audit --implementation-groups IG1,IG2,IG3 --regions all --output-format html,json --output-dir ./reports/
107
+
108
+ # Quick assessment with default profile and default region (us-east-1)
109
+ aws-cis-assess assess --output-format json
110
+ ```
111
+
112
+ ## 📊 Implementation Groups Coverage
113
+
114
+ ### IG1 - Essential Cyber Hygiene (125 Rules) ✅
115
+ **75%+ Coverage of CIS Controls v8.1 IG1 Safeguards**
116
+
117
+ **Phase 1 - Quick Wins (13 rules)**
118
+ - **Security Services** (4 rules): GuardDuty, Inspector, Macie, IAM Access Analyzer enablement
119
+ - **Logging** (4 rules): VPC Flow Logs, ELB logging, CloudFront logging, WAF logging
120
+ - **Encryption** (5 rules): EBS, RDS, EFS, DynamoDB, S3 encryption with KMS
121
+
122
+ **Phase 2 - Core Security (15 rules)**
123
+ - **Patch Management** (3 rules): SSM Patch Manager, patch baselines, EC2 patch compliance
124
+ - **Access Control** (5 rules): AWS SSO/Identity Center, admin MFA, Cognito MFA, VPN MFA
125
+ - **TLS/SSL** (5 rules): ALB HTTPS redirection, ELB HTTPS-only, RDS SSL, API Gateway SSL, Redshift TLS
126
+ - **Additional Encryption** (3 rules): SNS KMS encryption, SQS encryption, CloudTrail S3 data events
127
+
128
+ **Phase 3 - Advanced (15 rules)**
129
+ - **Inventory** (5 rules): SSM Inventory, Config all regions, AMI tracking, Lambda runtime inventory, IAM user inventory
130
+ - **Configuration Management** (4 rules): Config conformance packs, Security Hub standards, asset tagging, Inspector assessments
131
+ - **Version Management** (3 rules): EC2 OS versions, RDS engine versions, Lambda runtime support
132
+ - **Access/Asset Management** (3 rules): IAM last access, SSM Session Manager, unauthorized asset detection
133
+
134
+ **Phase 4 - Enhanced (7 rules)**
135
+ - **Data Classification** (2 rules): Data resource classification tagging, S3 bucket classification
136
+ - **Network Security** (2 rules): AWS Network Firewall deployment, Route 53 DNS Firewall
137
+ - **Backup Security** (5 rules): Backup vault encryption, cross-region copy, vault lock, Route 53 query logging, RDS backup retention
138
+
139
+ **Original Baseline Rules (75 rules)**
140
+ - Asset Inventory and Management
141
+ - Identity and Access Management
142
+ - Data Protection and Encryption
143
+ - Network Security Controls
144
+ - Logging and Monitoring
145
+ - Backup and Recovery
146
+ - Security Services Integration
147
+ - Configuration Management
148
+ - Vulnerability Management
149
+
150
+ ### IG2 - Enhanced Security (Coming Soon)
151
+ **Planned for Future Release**
152
+ - Advanced Encryption at Rest
153
+ - Certificate Management
154
+ - Network High Availability
155
+ - Enhanced Monitoring
156
+ - CodeBuild Security
157
+ - Vulnerability Scanning
158
+ - Network Segmentation
159
+ - Auto-scaling Security
160
+ - Enhanced Access Controls
161
+
162
+ ### IG3 - Advanced Security (Coming Soon)
163
+ **Planned for Future Release**
164
+ - API Gateway WAF Integration
165
+ - Advanced threat protection
166
+ - High-security environment controls
167
+
168
+ ## 🏗️ Production Architecture
169
+
170
+ ### Core Components
171
+ - **Assessment Engine**: Orchestrates compliance evaluations across all AWS regions
172
+ - **Control Assessments**: 149 individual rule implementations with robust error handling
173
+ - **Scoring Engine**: Calculates compliance scores and generates executive metrics
174
+ - **Reporting System**: Multi-format output with detailed remediation guidance
175
+ - **Resource Management**: Optimized for enterprise-scale deployments with memory management
176
+
177
+ ### Enterprise Features
178
+ - **Multi-threading**: Parallel execution for improved performance
179
+ - **Error Recovery**: Comprehensive error handling and retry mechanisms
180
+ - **Audit Trail**: Complete compliance audit and logging capabilities
181
+ - **Resource Monitoring**: Real-time performance and resource usage tracking
182
+ - **Scalable Architecture**: Handles assessments across hundreds of AWS accounts
183
+
184
+ ## 📋 Requirements
185
+
186
+ - **Python**: 3.8+ (production tested on 3.8, 3.9, 3.10, 3.11)
187
+ - **AWS Credentials**: Configured via AWS CLI, environment variables, or IAM roles
188
+ - **Permissions**: Read-only access to AWS services being assessed
189
+ - **Memory**: Minimum 2GB RAM for large-scale assessments
190
+ - **Network**: Internet access for AWS API calls
191
+ - **Default Region**: Assessments default to `us-east-1` unless `--regions` is specified
192
+
193
+ ## 📈 Business Value
194
+
195
+ ### Immediate Benefits
196
+ - **Compliance Readiness**: Instant CIS Controls compliance assessment
197
+ - **Risk Reduction**: Identify and prioritize security vulnerabilities
198
+ - **Audit Support**: Generate comprehensive compliance reports
199
+ - **Cost Optimization**: Identify misconfigured and unused resources
200
+ - **Operational Efficiency**: Automate manual compliance checking
201
+
202
+ ### Long-term Value
203
+ - **Continuous Improvement**: Track compliance posture over time
204
+ - **Regulatory Compliance**: Support for multiple compliance frameworks
205
+ - **Security Automation**: Foundation for automated remediation
206
+ - **Enterprise Integration**: Integrate with existing security tools
207
+ - **Future-Proof**: Extensible architecture for evolving requirements
208
+
209
+ ## 🛡️ Security & Compliance
210
+
211
+ ### Security Features
212
+ - **Read-Only Access**: Framework requires only read permissions
213
+ - **No Data Storage**: No sensitive data stored or transmitted
214
+ - **Audit Logging**: Complete audit trail of all assessments
215
+ - **Error Handling**: Secure error handling without data leakage
216
+
217
+ ### Compliance Support
218
+ - **CIS Controls**: 100% coverage of Implementation Groups 1, 2, and 3
219
+ - **AWS Well-Architected**: Aligned with security pillar best practices
220
+ - **Industry Standards**: Supports SOC 2, NIST, ISO 27001 mapping
221
+ - **Regulatory Requirements**: HIPAA, PCI DSS, FedRAMP compatible
222
+ - **Custom Frameworks**: Extensible for organization-specific requirements
223
+
224
+ ## 📚 Documentation
225
+
226
+ ### Core Documentation
227
+ - **[Installation Guide](docs/installation.md)**: Detailed installation instructions and requirements
228
+ - **[User Guide](docs/user-guide.md)**: Comprehensive user manual and best practices
229
+ - **[CLI Reference](docs/cli-reference.md)**: Complete command-line interface documentation
230
+ - **[Dual Scoring Guide](docs/dual-scoring-implementation.md)**: Weighted vs AWS Config scoring methodologies
231
+ - **[Scoring Methodology](docs/scoring-methodology.md)**: Detailed explanation of weighted scoring
232
+ - **[AWS Config Comparison](docs/scoring-comparison-aws-config.md)**: Comparison with AWS Config approach
233
+ - **[Troubleshooting Guide](docs/troubleshooting.md)**: Common issues and solutions
234
+ - **[Developer Guide](docs/developer-guide.md)**: Development and contribution guidelines
235
+
236
+ ### Technical Documentation
237
+ - **[Assessment Logic](docs/assessment-logic.md)**: How compliance assessments work
238
+ - **[Config Rule Mappings](docs/config-rule-mappings.md)**: CIS Controls to AWS Config rule mappings
239
+ - **[HTML Report Improvements](docs/html-report-improvements.md)**: Enhanced HTML report features and customization
240
+
241
+ ## 🤝 Support & Community
242
+
243
+ ### Getting Help
244
+ - **Documentation**: Comprehensive guides and API documentation
245
+ - **GitHub Issues**: Bug reports and feature requests
246
+ - **Enterprise Support**: Commercial support available for enterprise deployments
247
+
248
+ ### Contributing
249
+ - **Code Contributions**: Pull requests welcome with comprehensive tests
250
+ - **Documentation**: Help improve documentation and examples
251
+ - **Bug Reports**: Detailed bug reports with reproduction steps
252
+ - **Feature Requests**: Enhancement suggestions with business justification
253
+
254
+ ## 📄 License
255
+
256
+ MIT License - see [LICENSE](LICENSE) file for details.
257
+
258
+ ## 🏆 Project Status
259
+
260
+ **✅ Production Ready**: Complete implementation with 100% CIS Controls coverage
261
+ **✅ Enterprise Deployed**: Actively used in production environments
262
+ **✅ Continuously Maintained**: Regular updates and security patches
263
+ **✅ Community Supported**: Active development and community contributions
264
+ **✅ Future-Proof**: Extensible architecture for evolving requirements
265
+
266
+ ---
267
+
268
+ **Framework Version**: 1.2.0 (in development)
269
+ **CIS Controls v8.1 IG1 Coverage**: 125 rules (75%+ of IG1 safeguards)
270
+ **Production Status**: ✅ Ready for immediate enterprise deployment
271
+ **Last Updated**: February 2026
272
+
273
+ ## 🆕 What's New in Version 1.2.0
274
+
275
+ ### CIS Controls v8.1 IG1 Expansion (50 New Rules)
276
+ Fifty new controls added across four phases to achieve 75%+ coverage of CIS Controls v8.1 Implementation Group 1 safeguards:
277
+
278
+ **Phase 1 - Quick Wins (13 rules)**:
279
+ Security services, logging, and encryption fundamentals
280
+ - GuardDuty, Inspector, Macie, IAM Access Analyzer enablement
281
+ - VPC Flow Logs, ELB, CloudFront, WAF logging
282
+ - EBS, RDS, EFS, DynamoDB, S3 encryption with KMS
283
+
284
+ **Phase 2 - Core Security (15 rules)**:
285
+ Patch management, access control, and TLS/SSL enforcement
286
+ - SSM Patch Manager and compliance tracking
287
+ - AWS SSO/Identity Center configuration
288
+ - Admin, Cognito, and VPN MFA requirements
289
+ - HTTPS enforcement across load balancers and databases
290
+ - SNS/SQS encryption, CloudTrail S3 data events
291
+
292
+ **Phase 3 - Advanced (15 rules)**:
293
+ Inventory, configuration management, and version control
294
+ - SSM Inventory and AWS Config multi-region enablement
295
+ - AMI, Lambda runtime, and IAM user inventory tracking
296
+ - Config conformance packs and Security Hub standards
297
+ - Asset tagging compliance and unauthorized asset detection
298
+ - OS, database engine, and runtime version support validation
299
+ - IAM last access tracking and SSM Session Manager
300
+
301
+ **Phase 4 - Enhanced (7 rules)**:
302
+ Data classification, network security, and backup protection
303
+ - Data classification tagging for RDS, DynamoDB, and S3
304
+ - AWS Network Firewall and Route 53 DNS Firewall deployment
305
+ - Backup vault encryption, cross-region copy, and vault lock
306
+ - Route 53 query logging and RDS backup retention
307
+
308
+ ### Key Improvements
309
+ - **Comprehensive Remediation**: Every rule includes AWS CLI commands, console steps, best practices, priority/effort estimates, and AWS documentation links
310
+ - **Error Handling**: Graceful degradation with comprehensive error logging
311
+ - **Pattern Consistency**: All controls follow BaseConfigRuleAssessment pattern
312
+ - **YAML Configuration**: Properly merged control sections with accurate rule counts (125 total)
313
+
314
+ ### Coverage Metrics
315
+ - **Starting Coverage**: 21% of CIS Controls v8.1 IG1 safeguards (12 of 56)
316
+ - **Current Coverage**: 75%+ of CIS Controls v8.1 IG1 safeguards (42+ of 56)
317
+ - **Improvement**: +54 percentage points
318
+ - **Total IG1 Rules**: 125 (75 baseline + 50 new)
319
+
320
+ See [ALL_PHASES_IMPLEMENTATION_COMPLETE.md](ALL_PHASES_IMPLEMENTATION_COMPLETE.md) for complete implementation details.
@@ -0,0 +1,263 @@
1
+ # AWS CIS Controls Compliance Assessment Framework
2
+
3
+ A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. **Enhanced CIS Controls coverage** with 125 IG1 rules implemented.
4
+
5
+ > **Production Status**: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend [AWS Config](https://aws.amazon.com/config/) for ongoing continuous compliance monitoring and automated remediation.
6
+
7
+ ## 🎯 Key Features
8
+
9
+ - **✅ Enhanced IG1 Coverage**: 125 IG1 rules implemented (75%+ coverage of CIS Controls v8.1 IG1 safeguards)
10
+ - **✅ 50 New Rules Added**: Comprehensive expansion across security services, logging, encryption, inventory, configuration management, and backup security
11
+ - **✅ Dual Scoring System**: Both weighted and AWS Config-style scoring methodologies
12
+ - **✅ Enhanced HTML Reports**: Control names, working search, improved remediation display
13
+ - **✅ Enterprise Ready**: Production-tested with enterprise-grade architecture
14
+ - **✅ Performance Optimized**: Handles large-scale assessments efficiently
15
+ - **✅ Multi-Format Reports**: JSON, HTML, and CSV with detailed remediation guidance
16
+ - **✅ No AWS Config Required**: Direct AWS API calls based on Config rule specifications
17
+ - **✅ Comprehensive Remediation**: Every rule includes CLI commands, console steps, best practices, and AWS documentation links
18
+
19
+ ## 🚀 Quick Start
20
+
21
+ ### Installation
22
+
23
+ ```bash
24
+ # Install from PyPI (production-ready)
25
+ pip install aws-cis-controls-assessment
26
+
27
+ # Or install from source for development
28
+ git clone <repository-url>
29
+ cd aws-cis-controls-assessment
30
+ pip install -e .
31
+ ```
32
+
33
+ ### Basic Usage
34
+
35
+ ```bash
36
+ # Run complete assessment (all 163 rules) - defaults to us-east-1
37
+ aws-cis-assess assess --aws-profile my-aws-profile
38
+
39
+ # Assess multiple regions
40
+ aws-cis-assess assess --aws-profile my-aws-profile --regions us-east-1,us-west-2
41
+
42
+ # Assess specific Implementation Group using short flag (defaults to us-east-1)
43
+ aws-cis-assess assess -p my-aws-profile --implementation-groups IG1 --output-format json
44
+
45
+ # Generate comprehensive HTML report (defaults to us-east-1)
46
+ aws-cis-assess assess --aws-profile production --output-format html --output-file compliance-report.html
47
+
48
+ # Enterprise multi-region assessment with multiple formats
49
+ aws-cis-assess assess -p security-audit --implementation-groups IG1,IG2,IG3 --regions all --output-format html,json --output-dir ./reports/
50
+
51
+ # Quick assessment with default profile and default region (us-east-1)
52
+ aws-cis-assess assess --output-format json
53
+ ```
54
+
55
+ ## 📊 Implementation Groups Coverage
56
+
57
+ ### IG1 - Essential Cyber Hygiene (125 Rules) ✅
58
+ **75%+ Coverage of CIS Controls v8.1 IG1 Safeguards**
59
+
60
+ **Phase 1 - Quick Wins (13 rules)**
61
+ - **Security Services** (4 rules): GuardDuty, Inspector, Macie, IAM Access Analyzer enablement
62
+ - **Logging** (4 rules): VPC Flow Logs, ELB logging, CloudFront logging, WAF logging
63
+ - **Encryption** (5 rules): EBS, RDS, EFS, DynamoDB, S3 encryption with KMS
64
+
65
+ **Phase 2 - Core Security (15 rules)**
66
+ - **Patch Management** (3 rules): SSM Patch Manager, patch baselines, EC2 patch compliance
67
+ - **Access Control** (5 rules): AWS SSO/Identity Center, admin MFA, Cognito MFA, VPN MFA
68
+ - **TLS/SSL** (5 rules): ALB HTTPS redirection, ELB HTTPS-only, RDS SSL, API Gateway SSL, Redshift TLS
69
+ - **Additional Encryption** (3 rules): SNS KMS encryption, SQS encryption, CloudTrail S3 data events
70
+
71
+ **Phase 3 - Advanced (15 rules)**
72
+ - **Inventory** (5 rules): SSM Inventory, Config all regions, AMI tracking, Lambda runtime inventory, IAM user inventory
73
+ - **Configuration Management** (4 rules): Config conformance packs, Security Hub standards, asset tagging, Inspector assessments
74
+ - **Version Management** (3 rules): EC2 OS versions, RDS engine versions, Lambda runtime support
75
+ - **Access/Asset Management** (3 rules): IAM last access, SSM Session Manager, unauthorized asset detection
76
+
77
+ **Phase 4 - Enhanced (7 rules)**
78
+ - **Data Classification** (2 rules): Data resource classification tagging, S3 bucket classification
79
+ - **Network Security** (2 rules): AWS Network Firewall deployment, Route 53 DNS Firewall
80
+ - **Backup Security** (5 rules): Backup vault encryption, cross-region copy, vault lock, Route 53 query logging, RDS backup retention
81
+
82
+ **Original Baseline Rules (75 rules)**
83
+ - Asset Inventory and Management
84
+ - Identity and Access Management
85
+ - Data Protection and Encryption
86
+ - Network Security Controls
87
+ - Logging and Monitoring
88
+ - Backup and Recovery
89
+ - Security Services Integration
90
+ - Configuration Management
91
+ - Vulnerability Management
92
+
93
+ ### IG2 - Enhanced Security (Coming Soon)
94
+ **Planned for Future Release**
95
+ - Advanced Encryption at Rest
96
+ - Certificate Management
97
+ - Network High Availability
98
+ - Enhanced Monitoring
99
+ - CodeBuild Security
100
+ - Vulnerability Scanning
101
+ - Network Segmentation
102
+ - Auto-scaling Security
103
+ - Enhanced Access Controls
104
+
105
+ ### IG3 - Advanced Security (Coming Soon)
106
+ **Planned for Future Release**
107
+ - API Gateway WAF Integration
108
+ - Advanced threat protection
109
+ - High-security environment controls
110
+
111
+ ## 🏗️ Production Architecture
112
+
113
+ ### Core Components
114
+ - **Assessment Engine**: Orchestrates compliance evaluations across all AWS regions
115
+ - **Control Assessments**: 149 individual rule implementations with robust error handling
116
+ - **Scoring Engine**: Calculates compliance scores and generates executive metrics
117
+ - **Reporting System**: Multi-format output with detailed remediation guidance
118
+ - **Resource Management**: Optimized for enterprise-scale deployments with memory management
119
+
120
+ ### Enterprise Features
121
+ - **Multi-threading**: Parallel execution for improved performance
122
+ - **Error Recovery**: Comprehensive error handling and retry mechanisms
123
+ - **Audit Trail**: Complete compliance audit and logging capabilities
124
+ - **Resource Monitoring**: Real-time performance and resource usage tracking
125
+ - **Scalable Architecture**: Handles assessments across hundreds of AWS accounts
126
+
127
+ ## 📋 Requirements
128
+
129
+ - **Python**: 3.8+ (production tested on 3.8, 3.9, 3.10, 3.11)
130
+ - **AWS Credentials**: Configured via AWS CLI, environment variables, or IAM roles
131
+ - **Permissions**: Read-only access to AWS services being assessed
132
+ - **Memory**: Minimum 2GB RAM for large-scale assessments
133
+ - **Network**: Internet access for AWS API calls
134
+ - **Default Region**: Assessments default to `us-east-1` unless `--regions` is specified
135
+
136
+ ## 📈 Business Value
137
+
138
+ ### Immediate Benefits
139
+ - **Compliance Readiness**: Instant CIS Controls compliance assessment
140
+ - **Risk Reduction**: Identify and prioritize security vulnerabilities
141
+ - **Audit Support**: Generate comprehensive compliance reports
142
+ - **Cost Optimization**: Identify misconfigured and unused resources
143
+ - **Operational Efficiency**: Automate manual compliance checking
144
+
145
+ ### Long-term Value
146
+ - **Continuous Improvement**: Track compliance posture over time
147
+ - **Regulatory Compliance**: Support for multiple compliance frameworks
148
+ - **Security Automation**: Foundation for automated remediation
149
+ - **Enterprise Integration**: Integrate with existing security tools
150
+ - **Future-Proof**: Extensible architecture for evolving requirements
151
+
152
+ ## 🛡️ Security & Compliance
153
+
154
+ ### Security Features
155
+ - **Read-Only Access**: Framework requires only read permissions
156
+ - **No Data Storage**: No sensitive data stored or transmitted
157
+ - **Audit Logging**: Complete audit trail of all assessments
158
+ - **Error Handling**: Secure error handling without data leakage
159
+
160
+ ### Compliance Support
161
+ - **CIS Controls**: 100% coverage of Implementation Groups 1, 2, and 3
162
+ - **AWS Well-Architected**: Aligned with security pillar best practices
163
+ - **Industry Standards**: Supports SOC 2, NIST, ISO 27001 mapping
164
+ - **Regulatory Requirements**: HIPAA, PCI DSS, FedRAMP compatible
165
+ - **Custom Frameworks**: Extensible for organization-specific requirements
166
+
167
+ ## 📚 Documentation
168
+
169
+ ### Core Documentation
170
+ - **[Installation Guide](docs/installation.md)**: Detailed installation instructions and requirements
171
+ - **[User Guide](docs/user-guide.md)**: Comprehensive user manual and best practices
172
+ - **[CLI Reference](docs/cli-reference.md)**: Complete command-line interface documentation
173
+ - **[Dual Scoring Guide](docs/dual-scoring-implementation.md)**: Weighted vs AWS Config scoring methodologies
174
+ - **[Scoring Methodology](docs/scoring-methodology.md)**: Detailed explanation of weighted scoring
175
+ - **[AWS Config Comparison](docs/scoring-comparison-aws-config.md)**: Comparison with AWS Config approach
176
+ - **[Troubleshooting Guide](docs/troubleshooting.md)**: Common issues and solutions
177
+ - **[Developer Guide](docs/developer-guide.md)**: Development and contribution guidelines
178
+
179
+ ### Technical Documentation
180
+ - **[Assessment Logic](docs/assessment-logic.md)**: How compliance assessments work
181
+ - **[Config Rule Mappings](docs/config-rule-mappings.md)**: CIS Controls to AWS Config rule mappings
182
+ - **[HTML Report Improvements](docs/html-report-improvements.md)**: Enhanced HTML report features and customization
183
+
184
+ ## 🤝 Support & Community
185
+
186
+ ### Getting Help
187
+ - **Documentation**: Comprehensive guides and API documentation
188
+ - **GitHub Issues**: Bug reports and feature requests
189
+ - **Enterprise Support**: Commercial support available for enterprise deployments
190
+
191
+ ### Contributing
192
+ - **Code Contributions**: Pull requests welcome with comprehensive tests
193
+ - **Documentation**: Help improve documentation and examples
194
+ - **Bug Reports**: Detailed bug reports with reproduction steps
195
+ - **Feature Requests**: Enhancement suggestions with business justification
196
+
197
+ ## 📄 License
198
+
199
+ MIT License - see [LICENSE](LICENSE) file for details.
200
+
201
+ ## 🏆 Project Status
202
+
203
+ **✅ Production Ready**: Complete implementation with 100% CIS Controls coverage
204
+ **✅ Enterprise Deployed**: Actively used in production environments
205
+ **✅ Continuously Maintained**: Regular updates and security patches
206
+ **✅ Community Supported**: Active development and community contributions
207
+ **✅ Future-Proof**: Extensible architecture for evolving requirements
208
+
209
+ ---
210
+
211
+ **Framework Version**: 1.2.0 (in development)
212
+ **CIS Controls v8.1 IG1 Coverage**: 125 rules (75%+ of IG1 safeguards)
213
+ **Production Status**: ✅ Ready for immediate enterprise deployment
214
+ **Last Updated**: February 2026
215
+
216
+ ## 🆕 What's New in Version 1.2.0
217
+
218
+ ### CIS Controls v8.1 IG1 Expansion (50 New Rules)
219
+ Fifty new controls added across four phases to achieve 75%+ coverage of CIS Controls v8.1 Implementation Group 1 safeguards:
220
+
221
+ **Phase 1 - Quick Wins (13 rules)**:
222
+ Security services, logging, and encryption fundamentals
223
+ - GuardDuty, Inspector, Macie, IAM Access Analyzer enablement
224
+ - VPC Flow Logs, ELB, CloudFront, WAF logging
225
+ - EBS, RDS, EFS, DynamoDB, S3 encryption with KMS
226
+
227
+ **Phase 2 - Core Security (15 rules)**:
228
+ Patch management, access control, and TLS/SSL enforcement
229
+ - SSM Patch Manager and compliance tracking
230
+ - AWS SSO/Identity Center configuration
231
+ - Admin, Cognito, and VPN MFA requirements
232
+ - HTTPS enforcement across load balancers and databases
233
+ - SNS/SQS encryption, CloudTrail S3 data events
234
+
235
+ **Phase 3 - Advanced (15 rules)**:
236
+ Inventory, configuration management, and version control
237
+ - SSM Inventory and AWS Config multi-region enablement
238
+ - AMI, Lambda runtime, and IAM user inventory tracking
239
+ - Config conformance packs and Security Hub standards
240
+ - Asset tagging compliance and unauthorized asset detection
241
+ - OS, database engine, and runtime version support validation
242
+ - IAM last access tracking and SSM Session Manager
243
+
244
+ **Phase 4 - Enhanced (7 rules)**:
245
+ Data classification, network security, and backup protection
246
+ - Data classification tagging for RDS, DynamoDB, and S3
247
+ - AWS Network Firewall and Route 53 DNS Firewall deployment
248
+ - Backup vault encryption, cross-region copy, and vault lock
249
+ - Route 53 query logging and RDS backup retention
250
+
251
+ ### Key Improvements
252
+ - **Comprehensive Remediation**: Every rule includes AWS CLI commands, console steps, best practices, priority/effort estimates, and AWS documentation links
253
+ - **Error Handling**: Graceful degradation with comprehensive error logging
254
+ - **Pattern Consistency**: All controls follow BaseConfigRuleAssessment pattern
255
+ - **YAML Configuration**: Properly merged control sections with accurate rule counts (125 total)
256
+
257
+ ### Coverage Metrics
258
+ - **Starting Coverage**: 21% of CIS Controls v8.1 IG1 safeguards (12 of 56)
259
+ - **Current Coverage**: 75%+ of CIS Controls v8.1 IG1 safeguards (42+ of 56)
260
+ - **Improvement**: +54 percentage points
261
+ - **Total IG1 Rules**: 125 (75 baseline + 50 new)
262
+
263
+ See [ALL_PHASES_IMPLEMENTATION_COMPLETE.md](ALL_PHASES_IMPLEMENTATION_COMPLETE.md) for complete implementation details.
@@ -2,10 +2,10 @@
2
2
  AWS CIS Controls Compliance Assessment Framework
3
3
 
4
4
  A production-ready, enterprise-grade framework for evaluating AWS account configurations against
5
- CIS Controls Implementation Groups (IG1, IG2, IG3). Implements 163 comprehensive AWS Config rules
6
- across all implementation groups for complete security compliance assessment.
5
+ CIS Controls Implementation Groups (IG1, IG2, IG3). Implements 175 comprehensive AWS Config rules
6
+ across all implementation groups with 75%+ coverage of CIS Controls v8.1 IG1 safeguards.
7
7
  """
8
8
 
9
- __version__ = "1.1.4"
9
+ __version__ = "1.2.2"
10
10
  __author__ = "AWS CIS Assessment Team"
11
- __description__ = "Production-ready AWS CIS Controls Compliance Assessment Framework"
11
+ __description__ = "Production-ready AWS CIS Controls Compliance Assessment Framework with Enhanced IG1 Coverage"