💼 Account | 1 | | | |
💼 [Account.1] Security contact information should be provided for an AWS account | | 1 | 1 | |
💼 AppSync | 4 | | | |
💼 [AppSync.1] AWS AppSync API caches should be encrypted at rest | | | | |
💼 [AppSync.2] AWS AppSync should have field-level logging enabled | | | | |
💼 [AppSync.5] AWS AppSync GraphQL APIs should not be authenticated with API keys | | | | |
💼 [AppSync.6] AWS AppSync API caches should be encrypted in transit | | | | |
💼 API Gateway | 7 | | | |
💼 [APIGateway.1] API Gateway REST and WebSocket API execution logging should be enabled | | 1 | 1 | |
💼 [APIGateway.2] API Gateway REST API stages should be configured to use SSL certificates for backend authentication" | | 1 | 1 | |
💼 [APIGateway.3] API Gateway REST API stages should have AWS X-Ray tracing enabled | | 1 | 1 | |
💼 [APIGateway.4] API Gateway should be associated with a WAF Web ACL | | 1 | 1 | |
💼 [APIGateway.5] API Gateway REST API cache data should be encrypted at rest | | | | |
💼 [APIGateway.8] API Gateway routes should specify an authorization type | | 1 | 1 | |
💼 [APIGateway.9] Access logging should be configured for API Gateway V2 Stages | | 1 | 1 | |
💼 Athena | 1 | | | |
💼 [Athena.4] Athena workgroups should have logging enabled | | | 1 | |
💼 Auto Scaling | 6 | | | |
💼 [Autoscaling.5] Amazon EC2 instances launched using Auto Scaling group launch configurations should not have Public IP addresses | | | | |
💼 [AutoScaling.1] Auto Scaling groups associated with a load balancer should use ELB health checks | | 1 | 1 | |
💼 [AutoScaling.2] Amazon EC2 Auto Scaling group should cover multiple Availability Zones | | | | |
💼 [AutoScaling.3] Auto Scaling group launch configurations should configure EC2 instances to require Instance Metadata Service Version 2 (IMDSv2) | | | | |
💼 [AutoScaling.6] Auto Scaling groups should use multiple instance types in multiple Availability Zones | | | | |
💼 [AutoScaling.9] Amazon EC2 Auto Scaling groups should use Amazon EC2 launch templates | | | | |
💼 Backup | 1 | | | |
💼 [Backup.1] AWS Backup recovery points should be encrypted at rest | | | | |
💼 Certificate Manager (ACM) | 2 | | | |
💼 [ACM.1] Imported and ACM-issued certificates should be renewed after a specified time period | | 1 | 1 | |
💼 [ACM.2] RSA certificates managed by ACM should use a key length of at least 2,048 bits | | 1 | 1 | |
💼 CloudFront | 11 | | | |
💼 [CloudFront.1] CloudFront distributions should have a default root object configured | | | | |
💼 [CloudFront.3] CloudFront distributions should require encryption in transit | | | | |
💼 [CloudFront.4] CloudFront distributions should have origin failover configured | | | | |
💼 [CloudFront.5] CloudFront distributions should have logging enabled | | | | |
💼 [CloudFront.6] CloudFront distributions should have WAF enabled | | | | |
💼 [CloudFront.7] CloudFront distributions should use custom SSL/TLS certificates | | | | |
💼 [CloudFront.8] CloudFront distributions should use SNI to serve HTTPS requests | | | | |
💼 [CloudFront.9] CloudFront distributions should encrypt traffic to custom origins | | | | |
💼 [CloudFront.10] CloudFront distributions should not use deprecated SSL protocols between edge locations and custom origins | | | | |
💼 [CloudFront.12] CloudFront distributions should not point to non-existent S3 origins | | | | |
💼 [CloudFront.13] CloudFront distributions should use origin access control | | | | |
💼 CloudTrail | 4 | | | |
💼 [CloudTrail.1] CloudTrail should be enabled and configured with at least one multi-Region trail that includes read and write management events | | | 1 | |
💼 [CloudTrail.2] CloudTrail should have encryption at-rest enabled | | | 1 | |
💼 [CloudTrail.4] CloudTrail log file validation should be enabled | | 1 | 1 | |
💼 [CloudTrail.5] CloudTrail trails should be integrated with Amazon CloudWatch Logs | | | | |
💼 CodeBuild | 5 | | | |
💼 [CodeBuild.1] CodeBuild Bitbucket source repository URLs should not contain sensitive credentials | | | | |
💼 [CodeBuild.2] CodeBuild project environment variables should not contain clear text credentials | | | | |
💼 [CodeBuild.3] CodeBuild S3 logs should be encrypted | | | | |
💼 [CodeBuild.4] CodeBuild project environments should have a logging AWS Configuration | | | | |
💼 [CodeBuild.7] CodeBuild report group exports should be encrypted at rest | | | | |
💼 Config | 1 | | | |
💼 [Config.1] AWS Config should be enabled and use the service-linked role for resource recording | | | 1 | |
💼 Connect | 1 | | | |
💼 [Connect.2] Amazon Connect instances should have CloudWatch logging enabled | | | | |
💼 Data Firehouse | 1 | | | |
💼 [DataFirehose.1] Firehose delivery streams should be encrypted at rest | | | | |
💼 Database Migration Service (DMS) | 8 | | | |
💼 [DMS.1] Database Migration Service replication instances should not be public | | | | |
💼 [DMS.6] DMS replication instances should have automatic minor version upgrade enabled | | | | |
💼 [DMS.7] DMS replication tasks for the target database should have logging enabled | | | | |
💼 [DMS.8] DMS replication tasks for the source database should have logging enabled | | | | |
💼 [DMS.9] DMS endpoints should use SSL | | | | |
💼 [DMS.10] DMS endpoints for Neptune databases should have IAM authorization enabled | | | | |
💼 [DMS.11] DMS endpoints for MongoDB should have an authentication mechanism enabled | | | | |
💼 [DMS.12] DMS endpoints for Redis OSS should have TLS enabled | | | | |
💼 DataSync | 1 | | | |
💼 [DataSync.1] DataSync tasks should have logging enabled | | | | |
💼 DocumentDB | 5 | | | |
💼 [DocumentDB.1] Amazon DocumentDB clusters should be encrypted at rest | | | | |
💼 [DocumentDB.2] Amazon DocumentDB clusters should have an adequate backup retention period | | | | |
💼 [DocumentDB.3] Amazon DocumentDB manual cluster snapshots should not be public | | | | |
💼 [DocumentDB.4] Amazon DocumentDB clusters should publish audit logs to CloudWatch Logs | | | | |
💼 [DocumentDB.5] Amazon DocumentDB clusters should have deletion protection enabled | | | | |
💼 DynamoDB | 5 | | | |
💼 [DynamoDB.1] DynamoDB tables should automatically scale capacity with demand | | | | |
💼 [DynamoDB.2] DynamoDB tables should have point-in-time recovery enabled | | | | |
💼 [DynamoDB.3] DynamoDB Accelerator (DAX) clusters should be encrypted at rest | | | | |
💼 [DynamoDB.6] DynamoDB tables should have deletion protection enabled | | | | |
💼 [DynamoDB.7] DynamoDB Accelerator clusters should be encrypted in transit | | | | |
💼 Elastic Beanstalk | 3 | | | |
💼 [ElasticBeanstalk.1] Elastic Beanstalk environments should have enhanced health reporting enabled | | | | |
💼 [ElasticBeanstalk.2] Elastic Beanstalk managed platform updates should be enabled | | | | |
💼 [ElasticBeanstalk.3] Elastic Beanstalk should stream logs to CloudWatch | | | | |
|