쿠키 기본 설정 선택

당사는 사이트와 서비스를 제공하는 데 필요한 필수 쿠키 및 유사한 도구를 사용합니다. 고객이 사이트를 어떻게 사용하는지 파악하고 개선할 수 있도록 성능 쿠키를 사용해 익명의 통계를 수집합니다. 필수 쿠키는 비활성화할 수 없지만 '사용자 지정' 또는 ‘거부’를 클릭하여 성능 쿠키를 거부할 수 있습니다.

사용자가 동의하는 경우 AWS와 승인된 제3자도 쿠키를 사용하여 유용한 사이트 기능을 제공하고, 사용자의 기본 설정을 기억하고, 관련 광고를 비롯한 관련 콘텐츠를 표시합니다. 필수가 아닌 모든 쿠키를 수락하거나 거부하려면 ‘수락’ 또는 ‘거부’를 클릭하세요. 더 자세한 내용을 선택하려면 ‘사용자 정의’를 클릭하세요.

Changes that introduce high or very high security risks in your environment

포커스 모드
Changes that introduce high or very high security risks in your environment - AMS Advanced User Guide
이 페이지는 귀하의 언어로 번역되지 않았습니다. 번역 요청

The following changes introduce high or very high security risk in your environment:

AWS Identity and Access Management

  • High_Risk-IAM-001: Create access keys for root account

  • High_Risk-IAM-002: SCP policy modification to allow additional access

  • High_Risk-IAM-003: SCP policy modification that could break AMS infrastructure

  • High_Risk-IAM-004: Creation of a role/user with infrastructure mutating permissions (write, permission management or tagging) in customer account

  • High_Risk-IAM-005: IAM roles trust policies between AMS accounts and third-party accounts (not owned by the customer)

  • High_Risk-IAM-006: Cross-account policies to access any KMS key from an AMS account by a third-party account)

  • High_Risk-IAM-007: Cross-account policies from third-party accounts to access an AMS customer S3 bucket or resources where data can be stored (such as Amazon RDS, Amazon DynamoDB, or Amazon Redshift)

  • High_Risk-IAM-008: Assign the IAM permissions with any infrastructure mutating permission in customer account

  • High_Risk-IAM-009: Allow listing and reading on all the S3 buckets in the account

  • High_Risk-IAM-010: Automated IAM Provisioning with read/write permissions

Network security

  • High_Risk-NET-001: Open OS management ports SSH/22 or SSH/2222 (Not SFTP/2222), TELNET/23, RDP/3389, WinRM/5985-5986, VNC/ 5900-5901 TS/CITRIX/1494 or 1604, LDAP/389 or 636 and NETBIOS/137-139 from the internet

  • High_Risk-NET-002: Open database management ports MySQL/3306, PostgreSQL/5432, Oracle/1521, MSSQL/1433 or any management customer port from the internet

  • High_Risk-NET-003: Open application ports HTTP/80, HTTPS/8443 and HTTPS/443 on any compute resources directly. For example, EC2 instances, ECS/EKS/Fargate containers, and so on from the internet

  • High_Risk-NET-004: Any changes to the security groups which controls the access to the AMS infrastructure

  • High_Risk-NET-006: VPC peering with the third-party account (not owned by the customer)

  • High_Risk-NET-007: Adding customer firewall as egress point for all the AMS traffic

  • High_Risk-NET-008: Transit Gateway attachment with the third-party account is not allowed

  • High_Risk-S3-001: Provision or enable public access in the S3 bucket

Logging

  • High_Risk-LOG-001: Disable CloudTrail. (Ops Site Manager Approval Required)

  • High_Risk-LOG-002: Disable VPC Flow Logs. (Ops Site Manager Approval Required)

  • High_Risk-LOG-003: Log forwarding through any method (S3 event notification, SIEM agent pull, SIEM agent push etc) from an AMS managed account to third party account (not owned by customer)

  • High_Risk-LOG-004: Use non-AMS trail for CloudTrail

Host Security

  • High_Risk-HOST-001: Disable End Point Security in the account for any reason.(Ops Site Manager Approval Required)

  • High_Risk-HOST-002: Disable patching in a resource or at account level.

  • High_Risk-HOST-003: Deploying an unmanaged EC2 instance in the account.

  • High_Risk-HOST-004: Running a custom script provided by the customer.

  • High_Risk-HOST-005: Creation of Local Administrator accounts on instances.

  • High_Risk-HOST-006: Trend Micro EPS file type / extension scan exclusions or disabling malware protection on endpoints.

    Note

    Risk acceptance isn't required for EPS anti-malware exclusions or GuardDuty Suppression rules related to penetration tests or vulnerability scans or service impacting events/known performance issues warranting proactive actions. A risk notification is enough in these situations.

  • High_Risk-HOST-007: Create KeyPair for EC2

  • High_Risk-HOST-008: Disable End Point Security in the EC2

  • High_Risk-HOST-009: Accounts using End of Life(EOL) OS

Miscellaneous

  • High_Risk-ENC-001: Disable encryption in any resource if it is enabled

Managed Active Directory

  • High_Risk-AD-001: Provide admin rights to active director user or group

  • High_Risk-AD-002: GPO Policies capable of reducing security posture of the account

프라이버시사이트 이용 약관쿠키 기본 설정
© 2025, Amazon Web Services, Inc. 또는 계열사. All rights reserved.