Security Hub controls reference
This controls reference provides a list of available AWS Security Hub controls with links to more information about each control. The overview table displays the controls in alphabetical order by control ID. The table provides the following information for each control:
-
Security control ID – This ID applies across standards and indicates the AWS service and resource that the control relates to. The Security Hub console displays security control IDs, regardless of whether consolidated control findings is turned on or off in your account. However, Security Hub findings reference security control IDs only if consolidated control findings is turned on in your account. If consolidated control findings is turned off in your account, Security Hub findings reference standard-specific control IDs.
-
Linked standards – Indicates which standards a control applies to. Select a control to see specific requirements from third-party compliance frameworks.
-
Security control title – This title applies across standards. The Security Hub console displays security control titles, regardless of whether consolidated control findings is turned on or off in your account. However, Security Hub findings reference security control titles only if consolidated control findings is turned on in your account. If consolidated control findings is turned off in your account, Security Hub findings reference standard-specific control titles.
-
Severity – The severity of a control identifies its importance from a security standpoint. For information about how Security Hub determines control severity, see Assigning severity to control findings.
-
Schedule type – Indicates when the control is evaluated. For more information, see Schedule for running security checks.
Select a control to view further details. Controls are listed in alphabetical order of the service name.
Note
Consolidated controls view and consolidated control findings aren't supported in the AWS GovCloud (US) Region and China Regions. In these Regions, control IDs and titles remain the same and may reference standard-specific information. For a list of control IDs and titles in these Regions, see How consolidation impacts control IDs and titles.
Security control ID | Security control title | Linked standards | Severity | Schedule type |
---|---|---|---|---|
Security contact information should be provided for an AWS account |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
AWS account should be part of an AWS Organizations organization |
NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
Imported and ACM-issued certificates should be renewed after a specified time period |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RSA certificates managed by ACM should use a key length of at least 2,048 bits |
AWS Foundational Security Best Practices v1.0.0 |
HIGH |
Change triggered |
|
API Gateway REST and WebSocket API execution logging should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
API Gateway REST API stages should be configured to use SSL certificates for backend authentication |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
API Gateway REST API stages should have AWS X-Ray tracing enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
API Gateway should be associated with a WAF Web ACL |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
API Gateway REST API cache data should be encrypted at rest |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
API Gateway routes should specify an authorization type |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Access logging should be configured for API Gateway V2 Stages |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
AWS AppSync should have request-level and field-level logging turned on |
AWS Foundational Security Best Practices v1.0.0 |
MEDIUM |
Change triggered |
|
Auto scaling groups associated with a Classic Load Balancer should use load balancer health checks |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
Amazon EC2 Auto Scaling group should cover multiple Availability Zones |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Auto Scaling group launch configurations should configure EC2 instances to require Instance Metadata Service Version 2 (IMDSv2) |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Auto Scaling group launch configuration should not have a metadata response hop limit greater than 1 |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Amazon EC2 instances launched using Auto Scaling group launch configurations should not have Public IP addresses |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Auto Scaling groups should use multiple instance types in multiple Availability Zones |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
EC2 Auto Scaling groups should use EC2 launch templates |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
CloudFormation stacks should be integrated with Simple Notification Service (SNS) |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
CloudFront distributions should have a default root object configured |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
CRITICAL |
Change triggered |
|
CloudFront distributions should have origin access identity enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
CloudFront distributions should require encryption in transit |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
CloudFront distributions should have origin failover configured |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
CloudFront distributions should have logging enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
CloudFront distributions should have WAF enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
CloudFront distributions should use custom SSL/TLS certificates |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
CloudFront distributions should use SNI to serve HTTPS requests |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
CloudFront distributions should encrypt traffic to custom origins |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
CloudFront distributions should not use deprecated SSL protocols between edge locations and custom origins |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
CloudFront distributions should not point to non-existent S3 origins |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
CloudFront distributions should use origin access control |
AWS Foundational Security Best Practices v1.0.0 |
MEDIUM |
Change triggered |
|
CloudTrail should be enabled and configured with at least one multi-Region trail that includes read and write management events |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
CloudTrail should have encryption at-rest enabled |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
CloudTrail should be enabled |
PCI DSS v3.2.1 |
HIGH |
Periodic |
|
CloudTrail log file validation should be enabled |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
CloudTrail trails should be integrated with Amazon CloudWatch Logs |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
LOW |
Periodic |
|
Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
CRITICAL |
Periodic and change triggered |
|
Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
A log metric filter and alarm should exist for usage of the "root" user |
CIS AWS Foundations Benchmark v1.2.0, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for unauthorized API calls |
CIS AWS Foundations Benchmark v1.2.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for Management Console sign-in without MFA |
CIS AWS Foundations Benchmark v1.2.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for IAM policy changes |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for CloudTrail configuration changes |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for AWS Management Console authentication failures |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for S3 bucket policy changes |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for AWS Config configuration changes |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for security group changes |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for changes to network gateways |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for route table changes |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure a log metric filter and alarm exist for VPC changes |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
CloudWatch Alarms should have an action configured for the |
NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
CloudWatch log groups should be retained for at least 1 year |
NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
CloudWatch alarm actions should be enabled |
NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
CodeBuild GitHub or Bitbucket source repository URLs should use OAuth |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Change triggered |
|
CodeBuild project environment variables should not contain clear text credentials |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Change triggered |
|
CodeBuild S3 logs should be encrypted |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
CodeBuild project environments should have a logging configuration |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
CodeBuild project environments should not have privileged mode enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
AWS Config should be enabled |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Database Migration Service replication instances should not be public |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic |
|
DynamoDB tables should automatically scale capacity with demand |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
DynamoDB tables should have point-in-time recovery enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
DynamoDB Accelerator (DAX) clusters should be encrypted at rest |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
DynamoDB tables should be present in a backup plan |
NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
EBS snapshots should not be publicly restorable |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic |
|
The VPC default security group should not allow inbound and outbound traffic |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Attached EBS volumes should be encrypted at-rest |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Stopped EC2 instances should be removed after a specified time period |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
VPC flow logging should be enabled in all VPCs |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
EBS default encryption should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
EC2 instances should use Instance Metadata Service Version 2 (IMDSv2) |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
EC2 instances should not have a public IPv4 address |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Amazon EC2 should be configured to use VPC endpoints that are created for the Amazon EC2 service |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Unused EC2 EIPs should be removed |
PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
Security groups should not allow ingress from 0.0.0.0/0 to port 22 |
CIS AWS Foundations Benchmark v1.2.0, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 |
CIS AWS Foundations Benchmark v1.2.0 |
HIGH |
Change triggered |
|
EC2 subnets should not automatically assign public IP addresses |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Unused Network Access Control Lists should be removed |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
EC2 instances should not use multiple ENIs |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
Security groups should only allow unrestricted incoming traffic for authorized ports |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Security groups should not allow unrestricted access to ports with high risk |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
CRITICAL |
Change triggered |
|
Both VPN tunnels for an AWS Site-to-Site VPN connection should be up |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389 |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Unused EC2 security groups should be removed |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
EC2 Transit Gateways should not automatically accept VPC attachment requests |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
EC2 paravirtual instance types should not be used |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
EC2 launch templates should not assign public IPs to network interfaces |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
EBS volumes should be in a backup plan |
NIST SP 800-53 Rev. 5 |
LOW |
Periodic |
|
EC2 instances should be inside of a VPC |
NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
ECR private repositories should have image scanning configured |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
ECR private repositories should have tag immutability configured |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
ECR repositories should have at least one lifecycle policy configured |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Amazon ECS task definitions should have secure networking modes and user definitions. |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
ECS services should not have public IP addresses assigned to them automatically |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
ECS task definitions should not share the host's process namespace |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
ECS containers should run as non-privileged |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
ECS containers should be limited to read-only access to root filesystems |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Secrets should not be passed as container environment variables |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
ECS Fargate services should run on the latest Fargate platform version |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
ECS clusters should use Container Insights |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Elastic File System should be configured to encrypt file data at-rest using AWS KMS |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Amazon EFS volumes should be in backup plans |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
EFS access points should enforce a root directory |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
EFS access points should enforce a user identity |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
EKS cluster endpoints should not be publicly accessible |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
EKS clusters should run on a supported Kubernetes version |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
ElastiCache Redis clusters should have automatic backup enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
ElastiCache for Redis cache clusters should have auto minor version upgrades enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
ElastiCache replication groups should have automatic failover enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
ElastiCache replication groups should have encryption-at-rest enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
ElastiCache replication groups should have encryption-in-transit enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
ElastiCache replication groups of earlier Redis versions should have Redis AUTH enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
ElastiCache clusters should not use the default subnet group |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
Elastic Beanstalk environments should have enhanced health reporting enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
Elastic Beanstalk managed platform updates should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Elastic Beanstalk should stream logs to CloudWatch |
AWS Foundational Security Best Practices v1.0.0 |
HIGH |
Change triggered |
|
Application Load Balancer should be configured to redirect all HTTP requests to HTTPS |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Classic Load Balancers with SSL/HTTPS listeners should use a certificate provided by AWS Certificate Manager |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Classic Load Balancer listeners should be configured with HTTPS or TLS termination |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Application Load Balancer should be configured to drop http headers |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Application and Classic Load Balancers logging should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Application Load Balancer deletion protection should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Classic Load Balancers should have connection draining enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Classic Load Balancers with SSL listeners should use a predefined security policy that has strong configuration |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Classic Load Balancers should have cross-zone load balancing enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Classic Load Balancer should span multiple Availability Zones |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Application Load Balancer should be configured with defensive or strictest desync mitigation mode |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Application, Network and Gateway Load Balancers should span multiple Availability Zones |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Classic Load Balancer should be configured with defensive or strictest desync mitigation mode |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Application Load Balancers should be associated with an AWS WAF web ACL |
NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Amazon Elastic MapReduce cluster master nodes should not have public IP addresses |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
Elasticsearch domains should have encryption at-rest enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Elasticsearch domains should be in a VPC |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic |
|
Elasticsearch domains should encrypt data sent between nodes |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Elasticsearch domain error logging to CloudWatch Logs should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Elasticsearch domains should have audit logging enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Elasticsearch domains should have at least three data nodes |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Elasticsearch domains should be configured with at least three dedicated master nodes |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Connections to Elasticsearch domains should be encrypted using TLS 1.2 |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
GuardDuty should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
IAM policies should not allow full "*" administrative privileges |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
IAM users should not have IAM policies attached |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
IAM users' access keys should be rotated every 90 days or less |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
IAM root user access key should not exist |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic |
|
MFA should be enabled for all IAM users that have a console password |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Hardware MFA should be enabled for the root user |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic |
|
Password policies for IAM users should have strong configurations |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Unused IAM user credentials should be removed |
CIS AWS Foundations Benchmark v1.2.0, AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Virtual MFA should be enabled for the root user |
CIS AWS Foundations Benchmark v1.2.0, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic |
|
Password policies for IAM users should have strong configurations |
PCI DSS v3.2.1 |
MEDIUM |
Periodic |
|
Ensure IAM password policy requires at least one uppercase letter |
CIS AWS Foundations Benchmark v1.2.0 |
MEDIUM |
Periodic |
|
Ensure IAM password policy requires at least one lowercase letter |
CIS AWS Foundations Benchmark v1.2.0 |
MEDIUM |
Periodic |
|
Ensure IAM password policy requires at least one symbol |
CIS AWS Foundations Benchmark v1.2.0 |
MEDIUM |
Periodic |
|
Ensure IAM password policy requires at least one number |
CIS AWS Foundations Benchmark v1.2.0 |
MEDIUM |
Periodic |
|
Ensure IAM password policy requires minimum password length of 14 or greater |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
MEDIUM |
Periodic |
|
Ensure IAM password policy prevents password reuse |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
Ensure IAM password policy expires passwords within 90 days or less |
CIS AWS Foundations Benchmark v1.2.0 |
LOW |
Periodic |
|
Ensure a support role has been created to manage incidents with AWS Support |
CIS AWS Foundations Benchmark v1.2.0, CIS AWS Foundations Benchmark v1.4.0 |
LOW |
Periodic |
|
MFA should be enabled for all IAM users |
PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Avoid the use of the root user |
CIS AWS Foundations Benchmark v1.2.0 |
LOW |
Periodic |
|
IAM customer managed policies that you create should not allow wildcard actions for services |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
IAM user credentials unused for 45 days should be removed |
CIS AWS Foundations Benchmark v1.4.0 |
MEDIUM |
Periodic |
|
Kinesis streams should be encrypted at rest |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
IAM customer managed policies should not allow decryption actions on all KMS keys |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
IAM principals should not have IAM inline policies that allow decryption actions on all KMS keys |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
AWS KMS keys should not be deleted unintentionally |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic |
|
AWS KMS key rotation should be enabled |
CIS AWS Foundations Benchmark v1.2.0, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Lambda function policies should prohibit public access |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Change triggered |
|
Lambda functions should use supported runtimes |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Lambda functions should be in a VPC |
PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
VPC Lambda functions should operate in more than one Availability Zone |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Network Firewall policies should have at least one rule group associated |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
The default stateless action for Network Firewall policies should be drop or forward for full packets |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
The default stateless action for Network Firewall policies should be drop or forward for fragmented packets |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Stateless network firewall rule group should not be empty |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
OpenSearch domains should have encryption at rest enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
OpenSearch domains should be in a VPC |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Change triggered |
|
OpenSearch domains should encrypt data sent between nodes |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
OpenSearch domain error logging to CloudWatch Logs should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
OpenSearch domains should have audit logging enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
OpenSearch domains should have at least three data nodes |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
OpenSearch domains should have fine-grained access control enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Connections to OpenSearch domains should be encrypted using TLS 1.2 |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RDS snapshot should be private |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Change triggered |
|
RDS DB Instances should prohibit public access, as determined by the PubliclyAccessible configuration |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Change triggered |
|
RDS DB instances should have encryption at-rest enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RDS cluster snapshots and database snapshots should be encrypted at rest |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RDS DB instances should be configured with multiple Availability Zones |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Enhanced monitoring should be configured for RDS DB instances |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
RDS clusters should have deletion protection enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
RDS DB instances should have deletion protection enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
Database logging should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
IAM authentication should be configured for RDS instances |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RDS instances should have automatic backups enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
IAM authentication should be configured for RDS clusters |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RDS automatic minor version upgrades should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Amazon Aurora clusters should have backtracking enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RDS DB clusters should be configured for multiple Availability Zones |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RDS DB clusters should be configured to copy tags to snapshots |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
RDS DB instances should be configured to copy tags to snapshots |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
RDS instances should be deployed in a VPC |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
An RDS event notifications subscription should be configured for critical cluster events |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
An RDS event notifications subscription should be configured for critical database instance events |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
An RDS event notifications subscription should be configured for critical database parameter group events |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
An RDS event notifications subscription should be configured for critical database security group events |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
RDS instances should not use a database engine default port |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
RDS Database Clusters should use a custom administrator username |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RDS database instances should use a custom administrator username |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
RDS DB instances should be protected by a backup plan |
NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Amazon Redshift clusters should prohibit public access |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Change triggered |
|
Connections to Amazon Redshift clusters should be encrypted in transit |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Amazon Redshift clusters should have automatic snapshots enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Amazon Redshift clusters should have audit logging enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Amazon Redshift should have automatic upgrades to major versions enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Redshift clusters should use enhanced VPC routing |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Amazon Redshift clusters should not use the default Admin username |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Redshift clusters should not use the default database name |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Redshift clusters should be encrypted at rest |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
S3 Block Public Access setting should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
S3 buckets should prohibit public read access |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic and change triggered |
|
S3 buckets should prohibit public write access |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic and change triggered |
|
S3 buckets should have server-side encryption enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
S3 buckets should require requests to use Secure Socket Layer |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
S3 permissions granted to other AWS accounts in bucket policies should be restricted |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
S3 buckets should have cross-Region replication enabled |
PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
S3 Block Public Access setting should be enabled at the bucket-level |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, CIS AWS Foundations Benchmark v1.4.0, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
S3 bucket server access logging should be enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
S3 buckets with versioning enabled should have lifecycle policies configured |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
S3 buckets should have event notifications enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
S3 access control lists (ACLs) should not be used to manage user access to buckets |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
S3 buckets should have lifecycle policies configured |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
S3 buckets should have versioning enabled |
NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
S3 buckets should be configured to use Object Lock |
NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
S3 buckets should be encrypted at rest with AWS KMS keys |
NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Amazon SageMaker notebook instances should not have direct internet access |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
HIGH |
Periodic |
|
SageMaker notebook instances should be launched in a custom VPC |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Users should not have root access to SageMaker notebook instances |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
Secrets Manager secrets should have automatic rotation enabled |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Secrets Manager secrets configured with automatic rotation should rotate successfully |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Remove unused Secrets Manager secrets |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
Secrets Manager secrets should be rotated within a specified number of days |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
SNS topics should be encrypted at-rest using AWS KMS |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Logging of delivery status should be enabled for notification messages sent to a topic |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
Amazon SQS queues should be encrypted at rest |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
EC2 instances should be managed by AWS Systems Manager |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
EC2 instances managed by Systems Manager should have a patch compliance status of COMPLIANT after a patch installation |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
HIGH |
Change triggered |
|
EC2 instances managed by Systems Manager should have an association compliance status of COMPLIANT |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, PCI DSS v3.2.1, NIST SP 800-53 Rev. 5 |
LOW |
Change triggered |
|
SSM documents should not be public |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
CRITICAL |
Periodic |
|
Step Functions state machines should have logging turned on |
AWS Foundational Security Best Practices |
MEDIUM |
Change triggered |
|
AWS WAF Classic Global Web ACL logging should be enabled |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Periodic |
|
A WAF Regional rule should have at least one condition |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
A WAF Regional rule group should have at least one rule |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
A WAF Regional web ACL should have at least one rule or rule group |
AWS Foundational Security Best Practices v1.0.0, Service-Managed Standard: AWS Control Tower, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
A WAF global rule should have at least one condition |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
A WAF global rule group should have at least one rule |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
A WAF global web ACL should have at least one rule or rule group |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
A WAFV2 web ACL should have at least one rule or rule group |
AWS Foundational Security Best Practices v1.0.0, NIST SP 800-53 Rev. 5 |
MEDIUM |
Change triggered |
|
AWS WAFv2 web ACL logging should be enabled |
NIST SP 800-53 Rev. 5 |
LOW |
Periodic |
Topics
- AWS account controls
- AWS Certificate Manager controls
- Amazon API Gateway controls
- AWS AppSync controls
- Amazon EC2 Auto Scaling controls
- AWS CloudFormation controls
- Amazon CloudFront controls
- AWS CloudTrail controls
- Amazon CloudWatch controls
- AWS CodeBuild controls
- AWS Config controls
- AWS Database Migration Service controls
- Amazon DynamoDB controls
- Amazon Elastic Container Registry controls
- Amazon ECS controls
- Amazon Elastic Compute Cloud controls
- Amazon Elastic File System controls
- Amazon Elastic Kubernetes Service controls
- Amazon ElastiCache controls
- AWS Elastic Beanstalk controls
- Elastic Load Balancing controls
- Amazon EMR controls
- Elasticsearch controls
- Amazon GuardDuty controls
- AWS Identity and Access Management controls
- Amazon Kinesis controls
- AWS Key Management Service controls
- AWS Lambda controls
- AWS Network Firewall controls
- Amazon OpenSearch Service controls
- Amazon Relational Database Service controls
- Amazon Redshift controls
- Amazon Simple Storage Service controls
- Amazon SageMaker controls
- AWS Secrets Manager controls
- Amazon Simple Notification Service controls
- Amazon Simple Queue Service controls
- Amazon EC2 Systems Manager controls
- AWS Step Functions controls
- AWS WAF controls