Skip to main content

💼 3 Storage

  • ID: /frameworks/cis-aws-v7.0.0/03

Description​

This section contains recommendations for configuring AWS Simple Storage Service (S3) buckets. These recommendations focus on securing data at rest and in transit, enforcing least privilege access, and preventing unintended public exposure of sensitive information. Proper configuration of S3 buckets helps ensure the confidentiality, integrity, and availability of stored data across AWS environments.

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 3.1 Simple Storage Service (S3)44no data
 💼 3.1.1 Ensure S3 Bucket Policy is set to deny HTTP requests (Automated)1no data
 💼 3.1.2 Ensure MFA Delete is enabled on S3 buckets (Manual)1no data
 💼 3.1.3 Ensure all data in Amazon S3 has been discovered, classified, and secured when necessary (Manual)1no data
 💼 3.1.4 Ensure that S3 is configured with 'Block Public Access' enabled (Automated)1no data
💼 3.2 Relational Database Service (RDS)44no data
 💼 3.2.1 Ensure that encryption-at-rest is enabled for RDS instances (Automated)1no data
 💼 3.2.2 Ensure the Auto Minor Version Upgrade feature is enabled for RDS instances (Automated)1no data
 💼 3.2.3 Ensure that RDS instances are not publicly accessible (Automated)1no data
 💼 3.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS (Manual)1no data
💼 3.3 Elastic File System (EFS)11no data
 💼 3.3.1 Ensure that encryption is enabled for EFS file systems (Automated)1no data