RBI

Reserve Bank of India (RBI) Cloud Computing Guidelines

The Reserve Bank of India (RBI) has issued guidelines for regulated entities on cloud adoption and security. This framework maps AWS services and configurations to RBI compliance requirements, helping financial institutions in India ensure their cloud deployments meet regulatory standards.
Read more

Summary: [Not available:0] | [Compliant:16] | [Need Attention:12]

Breakdown

Framework. Reserve Bank of India (RBI) Cloud Computing Guidelines

CategoryRule IDCompliance StatusDescriptionReference
Data Security and Privacy1.1Compliant
[KeyRotationEnabled]
[KeyInPendingDeletion]
Data Security and Privacy1.2Compliant
[ServerSideEncrypted]
[SSEWithKMS]
[EBSEncrypted]
[StorageEncrypted]
[EncryptedAtRest]
[EncyptionAtRest]
Data Security and Privacy1.3Need Attention
[TlsEnforced] - Enforce Encryption of Data in Transit
  • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
  • [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
[EncryptionInTransit]
[TLSEnforced]
[NodeToNodeEncryption]
[EncryptedInTransit]
AWS Docs
Data Security and Privacy1.4Compliant
[PublicReadAccessBlock]
[PublicWriteAccessBlock]
[S3AccountPublicAccessBlock]
[EBSSnapshotIsPublic]
[PubliclyAccessible]
[SnapshotRDSIsPublic]
[PubliclyAccessible]
Data Security and Privacy1.5Need Attention
[BucketVersioning] - Enable Versioning
  • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
  • [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
[BucketLogging] - Enable Server Access Logging
  • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
  • [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
AWS Docs
Manage Versioning Example
AWS Docs
Access Control2.1Need Attention
[rootMfaActive] - Enable MFA on root user
  • [GLOBAL]User::root_id
[mfaActive]
AWS MFA
IAM Best Practices
Access Control2.2Need Attention
[passwordPolicy] - Set a custom password policy.
  • [GLOBAL]Account::Config
[passwordPolicyWeak]
IAM Password Policy
Access Control2.3Need Attention
[FullAdminAccess] - Limit permissions.
  • [GLOBAL]Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::itadmin, Role::OrganizationAccountAccessRole, Role::PACICloudFormationStackSetExecutionRole, Role::ServiceScreenerAutomationRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
[ManagedPolicyFullAccessOneServ] - Limit permissions.
  • [GLOBAL]Role::CodeStarWorker-dojo-ToolChain, Role::OrthancRole
AWS Docs
Organization GuardRail Blog
AWS Docs
Access Control2.4Compliant
[rootHasAccessKey]
Access Control2.5Need Attention
[userNotUsingGroup] - Place IAM user within User Group
  • [GLOBAL]User::kuettai
[InlinePolicy] - Use managed policies
  • [GLOBAL]User::kuettai, Role::AccessAnalyzerTrustedService, Role::AVMContainersUserRole, Role::awslogs.prod.kelex.molecule.toppatterns, Role::CloudSecAuditRole, Role::CloudSeerTrustedServiceRole, Role::CodeGuruProfilerForwardToAmazonProfiler, Role::CodeStarWorker-dojo-CloudFormation, Role::CodeStarWorker-dojo-ToolChain, Role::CodeStarWorker-dojo-WebApp, Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role, Role::DocumentUnderstandingSolutionCICD-CodeBuildRole-26NRX1QIOV08, Role::EC2AdminRole, Role::IMDSv2-automigrator, Role::OrthancRole, Role::PACICloudFormationStackSetAdministrationRole, Role::SaltyTrustedService, Role::ServiceScreenerAssumeRole, Role::ShadowTrooperRole, Role::TurtleRoleManagement
IAM Group
AWS Docs
Access Control2.6Compliant
[hasAccessKeyNoRotate90days]
[consoleLastAccess90]
Monitoring and Logging3.1Need Attention
[NeedToEnableCloudTrail]
[EnableCloudTrailLogging]
[HasOneMultiRegionTrail]
[LogFileValidationEnabled]
[RequiresKmsKey] - Enable SSE
  • [ap-southeast-1]Cloudtrail::IsengardTrail-DO-NOT-DELETE
Encrypt CloudTrail using AWS KMS
CloudTrail Security Best Practices
Monitoring and Logging3.2Need Attention
[CloudWatchLogsLogGroupArn] - CloudWatch for CloudTrail
  • [ap-southeast-1]Cloudtrail::IsengardTrail-DO-NOT-DELETE
[SetRetentionDays] - Set retention days
  • [ap-southeast-1]Log::/aws/codebuild/dojo, Log::/aws/lambda/isengard-create-inventory-association, Log::/aws/lambda/isengard-create-vpc-endpoints-for-ssm, Log::/aws/lambda/isengard-set-default-instance-role, Log::/aws/lambda/isengard-set-default-patch-baseline, Log::/aws/lambda/webScrapNew, Log::/aws/lambda/webScrapper
  • [us-east-1]Log::/aws/lambda/isengard-create-inventory-association, Log::/aws/lambda/isengard-create-vpc-endpoints-for-ssm, Log::/aws/lambda/isengard-set-default-instance-role, Log::/aws/lambda/isengard-set-default-patch-baseline
Using CloudWatch Logs with CloudTrail
CIS Cloudwatch Controls
Monitoring and Logging3.3Need Attention
[VPCFlowLogEnabled] - Enable VPC Flow Log
  • [ap-southeast-1]VPC::vpc-0229dd64
  • [us-east-1]VPC::vpc-8d976df0
Amazon Elastic Compute Cloud controls
Monitoring and Logging3.4Compliant
[ExecutionLogging]
[AuditLogging]
[ApplicationLogs]
Monitoring and Logging3.5Compliant
[enableGuardDuty]
Network Security4.1Need Attention
[SGDefaultInUsed]
[SGSensitivePortOpenToAll]
[SGAllTCPOpen]
[SGAllUDPOpen]
[SGAllPortOpen] - All ports open.
  • [ap-southeast-1]SG::sg-34753642
  • [us-east-1]SG::sg-9b3e45a4
[SGAllPortOpenToAll]
Best practices for Amazon EC2
Network Security4.2Compliant
[EC2SubnetAutoPublicIP]
[EC2InstancePublicIP]
Network Security4.3Compliant
[DomainWithinVPC]
[EnhancedVpcRouting]
Network Security4.4Compliant
[WAFWACL]
[ELBEnableWAF]
Resilience and Business Continuity5.1Compliant
[MultiAZ]
[ELBCrossZone]
[ASGELBHealthCheckEnabled]
Resilience and Business Continuity5.2Compliant
[Backup]
[disabledPointInTimeRecovery]
[AutomatedBackup]
[AutomaticSnapshots]
Resilience and Business Continuity5.3Compliant
[DeleteProtection]
Resilience and Business Continuity5.4Need Attention
[autoScalingStatus]
[lambdaReservedConcurrencyDisabled] - Provisioned Concurrency Disabled
  • [ap-southeast-1]Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::webScrapNew, Lambda::webScrapper, Lambda::isengard-create-inventory-association, Lambda::testFunction, Lambda::isengard-set-default-instance-role, Lambda::isengard-set-default-patch-baseline
  • [us-east-1]Lambda::isengard-set-default-instance-role, Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-set-default-patch-baseline, Lambda::isengard-create-inventory-association
Configuring provisioned concurrency
Compliance and Governance6.1Compliant
[hasOrganization]
Compliance and Governance6.2Need Attention
[EnableTrailS3BucketLogging] - Enable S3 Bucket Logging
  • [ap-southeast-1]Cloudtrail::IsengardTrail-DO-NOT-DELETE
Configure S3 Logging
Resilience in CloudTrail
Compliance and Governance6.3Compliant
[EC2DetailedMonitor]
[EnhancedMonitor]
Compliance and Governance6.4Compliant
[AutomaticUpgrades]