FTR

Foundational Technical Review

Assesses an AWS Partner's solution against a specific set of Amazon Web Services (AWS) best practices around security, performance, and operational processes that are most critical for customer success.
Read more

Summary: [Not available:37] | [Compliant:9] | [Need Attention:7]

Breakdown

Framework. Foundational Technical Review

CategoryRule IDCompliance StatusDescriptionReference
Partner hostedHOST-001Not available
Support levelSUP-001Need Attention
[supportPlanLowTier] - Subscribe to the AWS Business Support tier (or higher)
  • [GLOBAL]Account::Config
AWS Support Plan
Guide
Architecture reviewWAFR-001Not available
Architecture reviewWAFR-002Not available
AWS root accountARC-001Not available
AWS root accountARC-002Not available
AWS root accountARC-003Need Attention
[rootMfaActive] - Enable MFA on root user
  • [GLOBAL]User::root_id
AWS MFA
IAM Best Practices
AWS root accountARC-004Compliant
[rootHasAccessKey]
AWS root accountARC-005Not available
Communications from AWSACOM-001Need Attention
[hasAlternateContact] - Configure AWS account contacts
  • [GLOBAL]Account::Config
Alternate Contact
Communications from AWSACOM-002Not available
AWS CloudTrailCTL-001Not available
AWS CloudTrailCTL-002Not available
AWS CloudTrailCTL-003Not available
AWS CloudTrailCTL-004Not available
Identity and Access ManagementIAM-001Compliant
[mfaActive]
Identity and Access ManagementIAM-002Compliant
[passwordLastChange90]
[passwordLastChange365]
[hasAccessKeyNoRotate90days]
[hasAccessKeyNoRotate365days]
Identity and Access ManagementIAM-003Need Attention
[passwordPolicyWeak]
[passwordPolicy] - Set a custom password policy.
  • [GLOBAL]Account::Config
IAM Password Policy
Identity and Access ManagementIAM-004Compliant
[noUsersFound]
Identity and Access ManagementIAM-005Not available
Identity and Access ManagementIAM-006Need Attention
[InlinePolicyFullAccessOneServ] - Limit access in policy
  • [GLOBAL]Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role
[InlinePolicyFullAdminAccess]
[ManagedPolicyFullAccessOneServ] - Limit permissions.
  • [GLOBAL]Role::CodeStarWorker-dojo-ToolChain, Role::OrthancRole
[FullAdminAccess] - Limit permissions.
  • [GLOBAL]Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::itadmin, Role::OrganizationAccountAccessRole, Role::PACICloudFormationStackSetExecutionRole, Role::ServiceScreenerAutomationRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
AWS Docs
AWS Docs
AWS Docs
Organization GuardRail Blog
Identity and Access ManagementIAM-007Need Attention
[consoleLastAccess90]
[consoleLastAccess365]
[unusedRole] - Review & remove inactive roles
  • [GLOBAL]Role::AccessAnalyzerTrustedService, Role::AVMContainersUserRole, Role::aws-ec2-spot-fleet-tagging-role, Role::awslogs.prod.kelex.molecule.toppatterns, Role::AWSVAPTAudit, Role::CloudSecAuditRole, Role::CloudSeerTrustedServiceRole, Role::CodeDeployRole, Role::CodeGuruProfilerForwardToAmazonProfiler, Role::CodeStarWorker-dojo-CloudFormation, Role::CodeStarWorker-dojo-ToolChain, Role::CodeStarWorker-dojo-WebApp, Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role, Role::DocumentUnderstandingSolutionCICD-CICDHelperRole-ERDSGV99V9GT, Role::DocumentUnderstandingSolutionCICD-CodeBuildRole-26NRX1QIOV08, Role::DocumentUnderstandingSolutionCICD-CodePipelineRole-12BUYRAKNJIEQ, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::EC2CapacityReservationService, Role::IMDSv2-automigrator, Role::itadmin, Role::PACICloudFormationStackSetAdministrationRole, Role::PACICloudFormationStackSetExecutionRole, Role::SaltyTrustedService, Role::ServiceScreenerAssumeRole, Role::ServiceScreenerAutomationRole, Role::ShadowTrooperRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659, Role::TurtleRoleManagement
AWS Blog
Identity and Access ManagementIAM-008Not available
Identity and Access ManagementIAM-009Not available
Identity and Access ManagementIAM-010Not available
Identity and Access ManagementIAM-011Not available
Identity and Access ManagementIAM-012Compliant
[mfaActive]
[EC2IamProfile]
Operational securitySECOPS-001Not available
Network securityNETSEC-001Compliant
[SGDefaultInUsed]
[SGSensitivePortOpenToAll]
[SGAllOpenToAll]
[SGAllOpen]
Network securityNETSEC-002Not available
Backups and recoveryBAR-001Compliant
[EBSSnapshot]
[Backup]
[BackupTooLow]
[backupStatus]
[enabledContinuousBackup]
Backups and recoveryBAR-002Not available
ResiliencyRES-001Not available
ResiliencyRES-002Not available
ResiliencyRES-003Not available
ResiliencyRES-004Not available
ResiliencyRES-005Not available
ResiliencyRES-006Not available
ResiliencyRES-007Not available
Amazon S3 bucket accessS3-001Not available
Amazon S3 bucket accessS3-002Compliant
[PublicAccessBlock]
[S3AccountPublicAccessBlock]
Amazon S3 bucket accessS3-003Not available
Cross-account accessCAA-001Not available
Cross-account accessCAA-002Not available
Cross-account accessCAA-003Not available
Cross-account accessCAA-004Not available
Cross-account accessCAA-005Not available
Cross-account accessCAA-006Not available
Cross-account accessCAA-007Not available
Sensitive dataSDAT-001Not available
Sensitive dataSDAT-002Compliant
[EBSEncrypted]
[ServerSideEncrypted]
[StorageEncrypted]
Sensitive dataSDAT-003Need Attention
[SGEncryptionInTransit] - Encryption in Transit
  • [ap-southeast-1]SG::sg-34753642
  • [us-east-1]SG::sg-9b3e45a4
[TlsEnforced] - Enforce Encryption of Data in Transit
  • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
  • [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
Data protection in Amazon EC2
AWS Docs
Regulatory compliance validation processRCVP-001Not available