0.14.0 • Published 12 months ago

@cloudgraph/policy-pack-aws-cis-1.2.0 v0.14.0

Weekly downloads
-
License
MPL-2.0
Repository
github
Last release
12 months ago

CIS Amazon Web Services Foundations 1.2.0

Policy Pack based on the AWS Foundations 1.2.0 benchmark provided by the Center for Internet Security (CIS)

First Steps

  1. Install Cloud Graph CLI.
  2. Set up the AWS Provider for CG with the cg init aws command.
  3. Add Policy Pack for CIS Amazon Web Services Foundations benchmark using cg policy add aws-cis-1.2.0 command.
  4. Execute the ruleset using the scan command cg scan aws.
  5. Query the findings using the different options:

    5a. Querying findings by provider:

    query {
      queryawsFindings {
        CISFindings {
          id
          resourceId
          result
        }
      }
    }

    5b. Querying findings by specific benchmark:

    query {
      queryawsCISFindings {
        id
        resourceId
        result
      }
    }

    5c. Querying findings by resource:

    query {
      queryawsIamUser {
        id
        arn
        accountId
        CISFindings {
          id
          resourceId
          result
        }
      }
    }

Available Ruleset

RuleDescription
AWS CIS 1.1Avoid the use of 'root' account. Show used in last 30 days
AWS CIS 1.2Ensure MFA is enabled for all IAM users that have a console password
AWS CIS 1.3Ensure credentials unused for 90 days or greater are disabled
AWS CIS 1.4Ensure access keys are rotated every 90 days or less
AWS CIS 1.5Ensure IAM password policy requires at least one uppercase letter
AWS CIS 1.6Ensure IAM password policy requires at least one lowercase letter
AWS CIS 1.7Ensure IAM password policy requires at least one symbol
AWS CIS 1.8Ensure IAM password policy requires at least one number
AWS CIS 1.9Ensure IAM password policy requires minimum length of 14 or greater
AWS CIS 1.10Ensure IAM password policy prevents password reuse
AWS CIS 1.11Ensure IAM password policy expires passwords within 90 days or less
AWS CIS 1.12Ensure no root account access key exists
AWS CIS 1.13Ensure MFA is enabled for the 'root' account
AWS CIS 1.14Ensure hardware MFA is enabled for the 'root' account
AWS CIS 1.15Ensure security questions are registered in the AWS account
AWS CIS 1.16Ensure IAM policies are attached only to groups or roles
AWS CIS 1.17Maintain current contact details
AWS CIS 1.18Ensure security contact information is registered
AWS CIS 1.19Ensure IAM instance roles are used for AWS resource access from instances
AWS CIS 1.20Ensure a support role has been created to manage incidents with AWS Support
AWS CIS 1.21Do not setup access keys during initial user setup for all IAM users that have a console password
AWS CIS 1.22Ensure IAM policies that allow full ":" administrative privileges are not created
AWS CIS 2.1Ensure CloudTrail is enabled in all regions
AWS CIS 2.2Ensure CloudTrail log file validation is enabled
AWS CIS 2.3Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible
AWS CIS 2.4Ensure CloudTrail trails are integrated with CloudWatch Logs
AWS CIS 2.5Ensure AWS Config is enabled in all regions
AWS CIS 2.6Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket
AWS CIS 2.7Ensure CloudTrail logs are encrypted at rest using KMS CMKs
AWS CIS 2.8Ensure rotation for customer created CMKs is enabled
AWS CIS 2.9Ensure VPC flow logging is enabled in all VPCs
AWS CIS 3.1Ensure a log metric filter and alarm exist for unauthorized API calls
AWS CIS 3.2Ensure a log metric filter and alarm exist for Management Console sign-in without MFA
AWS CIS 3.3Ensure a log metric filter and alarm exist for usage of 'root' account (Score)
AWS CIS 3.4Ensure a log metric filter and alarm exist for IAM policy changes (Score)
AWS CIS 3.5Ensure a log metric filter and alarm exist for CloudTrail configuration changes
AWS CIS 3.6Ensure a log metric filter and alarm exist for AWS Management Console authentication failure
AWS CIS 3.7Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs
AWS CIS 3.8Ensure a log metric filter and alarm exist for S3 bucket policy changes
AWS CIS 3.9Ensure a log metric filter and alarm exist for AWS Config configuration changes
AWS CIS 3.10Ensure a log metric filter and alarm exist for security group changes
AWS CIS 3.11Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)
AWS CIS 3.12Ensure a log metric filter and alarm exist for changes to network gateways
AWS CIS 3.13Ensure a log metric filter and alarm exist for route table changes
AWS CIS 3.14Ensure a log metric filter and alarm exist for VPC changes
AWS CIS 4.1Ensure no security groups allow ingress from 0.0.0.0/0 to port 22
AWS CIS 4.2Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389
AWS CIS 4.3Ensure the default security group of every VPC restricts all traffic
AWS CIS 4.4Ensure routing tables for VPC peering are "least access"
0.14.1-alpha.1

12 months ago

0.14.1-alpha.2

12 months ago

0.14.0

1 year ago

0.13.1-alpha.1

1 year ago

0.12.0

2 years ago

0.11.1

2 years ago

0.13.0

2 years ago

0.12.1

2 years ago

0.11.2

2 years ago

0.11.3

2 years ago

0.11.0

2 years ago

0.11.0-alpha.1

2 years ago

0.11.0-beta.1

2 years ago

0.9.3

2 years ago

0.8.4

2 years ago

0.10.0

2 years ago

0.9.0

2 years ago

0.9.2

2 years ago

0.9.1

2 years ago

0.1.0

2 years ago

0.3.0

2 years ago

0.1.2

2 years ago

0.2.0

2 years ago

0.1.1

2 years ago

0.1.0-alpha.1

2 years ago

0.8.1

2 years ago

0.8.0

2 years ago

0.8.3

2 years ago

0.8.2

2 years ago

0.5.0

2 years ago

0.4.1

2 years ago

0.4.0

2 years ago

0.3.1

2 years ago

0.7.0

2 years ago

0.6.0

2 years ago

0.4.2

2 years ago

1.1.0

2 years ago