Skip to main content

💼 CIS AWS v1.3.0

  • Contextual name: 💼 CIS AWS v1.3.0
  • ID: /frameworks/cis-aws-v1.3.0

Description

Empty...

Similar

  • Internal
    • ID: dec-a-c6733a31

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 1 Identity and Access Management22
    💼 1.1 Maintain current contact details1
    💼 1.2 Ensure security contact information is registered1
    💼 1.3 Ensure security questions are registered in the AWS account
    💼 1.4 Ensure no root user account access key exists11
    💼 1.5 Ensure MFA is enabled for the "root user" account1
    💼 1.6 Ensure hardware MFA is enabled for the "root user" account1
    💼 1.7 Eliminate use of the root user for administrative and daily tasks11
    💼 1.8 Ensure IAM password policy requires minimum length of 14 or greater1
    💼 1.9 Ensure IAM password policy prevents password reuse11
    💼 1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password1
    💼 1.11 Do not setup access keys during initial user setup for all IAM users that have a console password11
    💼 1.12 Ensure credentials unused for 90 days or greater are disabled
    💼 1.13 Ensure there is only one active access key available for any single IAM user11
    💼 1.14 Ensure access keys are rotated every 90 days or less11
    💼 1.15 Ensure IAM Users Receive Permissions Only Through Groups11
    💼 1.16 Ensure IAM policies that allow full ":" administrative privileges are not attached11
    💼 1.17 Ensure a support role has been created to manage incidents with AWS Support1
    💼 1.18 Ensure IAM instance roles are used for AWS resource access from instances11
    💼 1.19 Ensure that all the expired SSL/TLS certificates stored in AWS IAM are removed11
    💼 1.20 Ensure that S3 Buckets are configured with 'Block public access (bucket settings)'11
    💼 1.21 Ensure that IAM Access analyzer is enabled11
    💼 1.22 Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environments1
💼 2 Storage2
    💼 2.1 Simple Storage Service (S3)2
        💼 2.1.1 Ensure all S3 buckets employ encryption-at-rest
        💼 2.1.2 Ensure S3 Bucket Policy allows HTTPS requests11
    💼 2.2 Elastic Compute Cloud (EC2)1
        💼 2.2.1 Ensure EBS volume encryption is enabled11
💼 3 Logging11
    💼 3.1 Ensure CloudTrail is enabled in all regions11
    💼 3.2 Ensure CloudTrail log file validation is enabled11
    💼 3.3 Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible
    💼 3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs
    💼 3.5 Ensure AWS Config is enabled in all regions1
    💼 3.6 Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket1
    💼 3.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs1
    💼 3.8 Ensure rotation for customer created CMKs is enabled11
    💼 3.9 Ensure VPC flow logging is enabled in all VPCs11
    💼 3.10 Ensure that Object-level logging for write events is enabled for S3 bucket1
    💼 3.11 Ensure that Object-level logging for read events is enabled for S3 bucket1
💼 4 Monitoring15
    💼 4.1 Ensure a log metric filter and alarm exist for unauthorized API calls1
    💼 4.2 Ensure a log metric filter and alarm exist for Management Console sign-in without MFA1
    💼 4.3 Ensure a log metric filter and alarm exist for usage of 'root' account1
    💼 4.4 Ensure a log metric filter and alarm exist for IAM policy changes1
    💼 4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes1
    💼 4.6 Ensure a log metric filter and alarm exist for AWS Management Console authentication failures1
    💼 4.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs1
    💼 4.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes1
    💼 4.9 Ensure a log metric filter and alarm exist for AWS Config configuration changes1
    💼 4.10 Ensure a log metric filter and alarm exist for security group changes1
    💼 4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)1
    💼 4.12 Ensure a log metric filter and alarm exist for changes to network gateways1
    💼 4.13 Ensure a log metric filter and alarm exist for route table changes1
    💼 4.14 Ensure a log metric filter and alarm exist for VPC changes1
    💼 4.15 Ensure a log metric filter and alarm exists for AWS Organizations changes1
💼 5 Networking4
    💼 5.1 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports1
    💼 5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports11
    💼 5.3 Ensure the default security group of every VPC restricts all traffic1
    💼 5.4 Ensure routing tables for VPC peering are "least access"1