πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [APIGateway.5] API Gateway REST API cache data should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [AutoScaling.3] Auto Scaling group launch configurations should configure EC2 instances to require Instance Metadata Service Version 2 (IMDSv2) | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [AutoScaling.9] Amazon EC2 Auto Scaling groups should use Amazon EC2 launch templates | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [CloudFront.8] CloudFront distributions should use SNI to serve HTTPS requests | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [CloudTrail.2] CloudTrail should have encryption at-rest enabled | | | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [CodeBuild.3] CodeBuild S3 logs should be encrypted | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [DocumentDB.1] Amazon DocumentDB clusters should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [DocumentDB.5] Amazon DocumentDB clusters should have deletion protection enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [DynamoDB.3] DynamoDB Accelerator (DAX) clusters should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [DynamoDB.6] DynamoDB tables should have deletion protection enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EC2.3] Attached Amazon EBS volumes should be encrypted at-rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EC2.4] Stopped EC2 instances should be removed after a specified time period | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EC2.7] EBS default encryption should be enabled | | 1 | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EC2.19] Security groups should not allow unrestricted access to ports with high risk | | | 10 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EC2.21] Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389 | | | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EC2.23] Amazon EC2 Transit Gateways should not automatically accept VPC attachment requests | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ECR.2] ECR private repositories should have tag immutability configured | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ECR.3] ECR repositories should have at least one lifecycle policy configured | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ECS.3] ECS task definitions should not share the host's process namespace | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ECS.8] Secrets should not be passed as container environment variables | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EFS.1] Elastic File System should be configured to encrypt file data at-rest using AWS KMS | | 1 | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EKS.2] EKS clusters should run on a supported Kubernetes version | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ElastiCache.4] ElastiCache replication groups should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.6] Application, Gateway, and Network Load Balancers should have deletion protection enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.7] Classic Load Balancers should have connection draining enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.12] Application Load Balancer should be configured with defensive or strictest desync mitigation mode | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.14] Classic Load Balancer should be configured with defensive or strictest desync mitigation mode | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EMR.3] Amazon EMR security configurations should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ES.1] Elasticsearch domains should have encryption at-rest enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [FSx.1] FSx for OpenZFS file systems should be configured to copy tags to backups and volumes | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Kinesis.1] Kinesis streams should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Lambda.2] Lambda functions should use supported runtimes | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Macie.1] Amazon Macie should be enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Macie.2] Macie automated sensitive data discovery should be enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Neptune.1] Neptune DB clusters should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Neptune.4] Neptune DB clusters should have deletion protection enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Neptune.6] Neptune DB cluster snapshots should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Neptune.8] Neptune DB clusters should be configured to copy tags to snapshots | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [NetworkFirewall.3] Network Firewall policies should have at least one rule group associated | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [NetworkFirewall.4] The default stateless action for Network Firewall policies should be drop or forward for full packets | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [NetworkFirewall.5] The default stateless action for Network Firewall policies should be drop or forward for fragmented packets | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [NetworkFirewall.9] Network Firewall firewalls should have deletion protection enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [NetworkFirewall.10] Network Firewall firewalls should have subnet change protection enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Opensearch.1] OpenSearch domains should have encryption at rest enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [PCA.1] AWS Private CA root certificate authority should be disabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.3] RDS DB instances should have encryption at-rest enabled | | 1 | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.4] RDS cluster snapshots and database snapshots should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.16] RDS DB clusters should be configured to copy tags to snapshots | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.17] RDS DB instances should be configured to copy tags to snapshots | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.24] RDS Database clusters should use a custom administrator username | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.25] RDS database instances should use a custom administrator username | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.27] RDS DB clusters should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Redshift.6] Amazon Redshift should have automatic upgrades to major versions enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Redshift.8] Amazon Redshift clusters should not use the default Admin username | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Redshift.9] Redshift clusters should not use the default database name | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Redshift.10] Redshift clusters should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [S3.6] S3 general purpose bucket policies should restrict access to other AWS accounts | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [SQS.1] Amazon SQS queues should be encrypted at rest | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [SSM.1] Amazon EC2 instances should be managed by AWS Systems Manager | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [SSM.3] Amazon EC2 instances managed by Systems Manager should have an association compliance status of COMPLIANT | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [WAF.4] AWS WAF Classic Regional web ACLs should have at least one rule or rule group | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [WAF.6] AWS WAF Classic global rules should have at least one condition | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [WAF.7] AWS WAF Classic global rule groups should have at least one rule | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [WAF.10] AWS WAF web ACLs should have at least one rule or rule group | | | | |