WAFS

AWS Well-Architected Framework - Security Pillar

This framework focuses on the security pillar. This will help you meet your business and regulatory requirements by following current AWS recommendations. It’s intended for those in technology roles, such as chief technology officers (CTOs), chief information security officers (CSOs/CISOs), architects, developers, and operations team members. The security pillar describes how to take advantage of cloud technologies to protect data, systems, and assets in a way that can improve your security posture.
Read more

Summary: [Not available:35] | [Compliant:14] | [Need Attention:15]

Breakdown

Framework. AWS Well-Architected Framework - Security Pillar

CategoryRule IDCompliance StatusDescriptionReference
SEC01BP01Compliant

How do you securely operate your workload? - Separate workloads using accounts

[hasOrganization]
SEC01BP02Need Attention

How do you securely operate your workload? - Secure account root user and properties

[rootMfaActive] - Enable MFA on root user
  • [GLOBAL]User::root_id
[hasAlternateContact] - Configure AWS account contacts
  • [GLOBAL]Account::Config
[rootHasAccessKey]
[rootConsoleLogin30days]
[passwordPolicy] - Set a custom password policy.
  • [GLOBAL]Account::Config
[enableGuardDuty]
[rootConsoleLogin30days]
AWS MFA
IAM Best Practices
Alternate Contact
IAM Password Policy
SEC01BP03Compliant

How do you securely operate your workload? - Identify and validate control objectives

[SCPEnabled]
[EnableConfigService]
SEC01BP04Compliant

How do you securely operate your workload? - Stay up to date with security threats and recommendations

[enableGuardDuty]
SEC01BP05Not available

How do you securely operate your workload? - Identify and prioritize risks using a threat model

SEC01BP06Need Attention

How do you securely operate your workload? - Reduce security management scope

[Has 11 actives lambda]
[Has 2 actives rds]
[ecs] - Need at least 1 ecs
    [eks] - Need at least 1 eks
      [Has 2 actives dynamodb]
      [elasticache] - Need at least 1 elasticache


        SEC01BP07Compliant

        How do you securely operate your workload? - Automate deployment of standard security controls

        [hasOrganization]
        SEC01BP08Not available

        How do you securely operate your workload? - Evaluate and implement new security services and features regularly

        SEC02BP01Compliant

        How do you manage identities for people and machines? - Use strong sign-in mechanisms

        [mfaActive]
        [passwordPolicyWeak]
        [passwordLastChange90]
        [hasAccessKeyNoRotate30days]
        SEC02BP02Compliant

        How do you manage identities for people and machines? - Use temporary credentials

        [EC2IamProfile]
        SEC02BP03Compliant

        How do you manage identities for people and machines? - Store and use secrets securely

        [hasAccessKeyNoRotate30days]
        [DBwithoutSecretManager]
        [DBwithSomeSecretsManagerOnly]
        SEC02BP04Compliant

        How do you manage identities for people and machines? - Rely on a centralized identity provider

        [hasSSORoles]
        [hasExternalIdentityProvider]
        SEC02BP05Need Attention

        How do you manage identities for people and machines? - Audit and rotate credentials periodically

        [passwordLastChange90]
        [hasAccessKeyNoRotate30days]
        [eksClusterRoleLeastPrivilege]
        [InlinePolicyFullAccessOneServ] - Limit access in policy
        • [GLOBAL]Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role
        [InlinePolicyFullAdminAccess]
        [FullAdminAccess] - Limit permissions.
        • [GLOBAL]Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::itadmin, Role::OrganizationAccountAccessRole, Role::PACICloudFormationStackSetExecutionRole, Role::ServiceScreenerAutomationRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
        [lambdaRoleReused] - Execution Role Reused
        • [ap-southeast-1]Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-create-inventory-association, Lambda::isengard-set-default-instance-role, Lambda::isengard-set-default-patch-baseline
        • [us-east-1]Lambda::isengard-set-default-instance-role, Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-set-default-patch-baseline, Lambda::isengard-create-inventory-association
        [EC2IamProfile]
        AWS Docs
        AWS Docs
        Organization GuardRail Blog
        Lambda execution role
        SEC02BP06Need Attention

        How do you manage identities for people and machines? - Employ user groups and attributes

        [userNotUsingGroup] - Place IAM user within User Group
        • [GLOBAL]User::kuettai
        [groupEmptyUsers]
        IAM Group
        SEC03BP01Need Attention

        How do you manage permissions for people and machines? - Define access requirements

        [InlinePolicy] - Use managed policies
        • [GLOBAL]User::kuettai, Role::AccessAnalyzerTrustedService, Role::AVMContainersUserRole, Role::awslogs.prod.kelex.molecule.toppatterns, Role::CloudSecAuditRole, Role::CloudSeerTrustedServiceRole, Role::CodeGuruProfilerForwardToAmazonProfiler, Role::CodeStarWorker-dojo-CloudFormation, Role::CodeStarWorker-dojo-ToolChain, Role::CodeStarWorker-dojo-WebApp, Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role, Role::DocumentUnderstandingSolutionCICD-CodeBuildRole-26NRX1QIOV08, Role::EC2AdminRole, Role::IMDSv2-automigrator, Role::OrthancRole, Role::PACICloudFormationStackSetAdministrationRole, Role::SaltyTrustedService, Role::ServiceScreenerAssumeRole, Role::ShadowTrooperRole, Role::TurtleRoleManagement
        AWS Docs
        SEC03BP02Need Attention

        How do you manage permissions for people and machines? - Grant least privilege access

        [eksClusterRoleLeastPrivilege]
        [InlinePolicyFullAccessOneServ] - Limit access in policy
        • [GLOBAL]Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role
        [InlinePolicyFullAdminAccess]
        [FullAdminAccess] - Limit permissions.
        • [GLOBAL]Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::itadmin, Role::OrganizationAccountAccessRole, Role::PACICloudFormationStackSetExecutionRole, Role::ServiceScreenerAutomationRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
        [lambdaRoleReused] - Execution Role Reused
        • [ap-southeast-1]Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-create-inventory-association, Lambda::isengard-set-default-instance-role, Lambda::isengard-set-default-patch-baseline
        • [us-east-1]Lambda::isengard-set-default-instance-role, Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-set-default-patch-baseline, Lambda::isengard-create-inventory-association
        [EC2IamProfile]
        [ManagedPolicyFullAccessOneServ] - Limit permissions.
        • [GLOBAL]Role::CodeStarWorker-dojo-ToolChain, Role::OrthancRole
        AWS Docs
        AWS Docs
        Organization GuardRail Blog
        Lambda execution role
        AWS Docs
        SEC03BP03Need Attention

        How do you manage permissions for people and machines? - Define permission guardrails for your organization

        [EnableConfigService]
        [SCPEnabled]
        [InlinePolicy] - Use managed policies
        • [GLOBAL]User::kuettai, Role::AccessAnalyzerTrustedService, Role::AVMContainersUserRole, Role::awslogs.prod.kelex.molecule.toppatterns, Role::CloudSecAuditRole, Role::CloudSeerTrustedServiceRole, Role::CodeGuruProfilerForwardToAmazonProfiler, Role::CodeStarWorker-dojo-CloudFormation, Role::CodeStarWorker-dojo-ToolChain, Role::CodeStarWorker-dojo-WebApp, Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role, Role::DocumentUnderstandingSolutionCICD-CodeBuildRole-26NRX1QIOV08, Role::EC2AdminRole, Role::IMDSv2-automigrator, Role::OrthancRole, Role::PACICloudFormationStackSetAdministrationRole, Role::SaltyTrustedService, Role::ServiceScreenerAssumeRole, Role::ShadowTrooperRole, Role::TurtleRoleManagement
        AWS Docs
        SEC03BP04Compliant

        How do you manage permissions for people and machines? - Manage access based on lifecycle

        [groupEmptyUsers]
        [userNoActivity90days]
        [HasDataEventsCaptured]
        SEC03BP05Compliant

        How do you manage permissions for people and machines? - Establish emergency access process

        [SCPEnabled]
        [NeedToEnableCloudTrail]
        SEC03BP06Need Attention

        How do you manage permissions for people and machines? - Share resources securely within your organization

        [SCPEnabled]
        [AccessControlList] - Enable SSE
        • [ap-southeast-1]Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::kuettai-solutions-bucket-ap-southeast-1
        • [us-east-1]Bucket::kuettai-dojo01
        Protecting data with IAM
        SEC03BP07Not available

        How do you manage permissions for people and machines? - Reduce permissions continuously

        SEC03BP08Not available

        How do you manage permissions for people and machines? - Share resources securely with a third party

        SEC03BP09Compliant

        How do you manage permissions for people and machines? - Analyze public and cross account access

        [EnableConfigService]
        SEC04BP01Need Attention

        How do you detect and investigate security events? - Configure service and application logging

        [eksClusterLogging]
        [VPCFlowLogEnabled] - Enable VPC Flow Log
        • [ap-southeast-1]VPC::vpc-0229dd64
        • [us-east-1]VPC::vpc-8d976df0
        [ApplicationLogs]
        [AuditLogging]
        [BucketLogging] - Enable Server Access Logging
        • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
        • [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
        [ExecutionLogging]
        [accessLogging] - Enable CloudFront standard logs (access logs)
        • [GLOBAL]Cloudfront::E2X390QMMYIRUF
        [NeedToEnableCloudTrail]
        [HasOneMultiRegionTrail]
        [EnableTrailS3BucketLifecycle]
        [HasInsightSelectors] - Enable Insight Selectors
        • [ap-southeast-1]Cloudtrail::IsengardTrail-DO-NOT-DELETE
        [enableGuardDuty]
        Amazon Elastic Compute Cloud controls
        AWS Docs
        AWS Docs
        Insight events
        SEC04BP02Not available

        How do you detect and investigate security events? - Capture logs, findings, and metrics in standardized locations

        SEC04BP03Compliant

        How do you detect and investigate security events? - Initiate remediation for non-compliant resources

        [EnableConfigService]
        SEC04BP04Need Attention

        How do you detect and investigate security events? - Correlate and enrich security events

        [enableGuardDuty]
        [MacieToEnable] - Enable Macie
        • [ap-southeast-1]Macie
        • [us-east-1]Macie
        Getting started with Amazon Macie
        SEC05BP01Compliant

        How do you protect your network resources? - Create network layers

        [Has 1 actives cloudfront]
        SEC05BP02Need Attention

        How do you protect your network resources? - Control traffic within your network layers

        [SGSensitivePortOpenToAll]
        [SGAllTCPOpen]
        [SGAllUDPOpen]
        [SGDefaultInUsed]
        [SGEncryptionInTransit] - Encryption in Transit
        • [ap-southeast-1]SG::sg-34753642
        • [us-east-1]SG::sg-9b3e45a4
        [ELBListenerInsecure]
        [PubliclyAccessible]
        Data protection in Amazon EC2
        SEC05BP03Not available

        How do you protect your network resources? - Implement inspection-based protection

        SEC05BP04Not available

        How do you protect your network resources? - Automate network protection

        SEC06BP01Compliant

        How do you protect your compute resources? - Perform vulnerability management

        [enableGuardDuty]
        SEC06BP02Not available

        How do you protect your compute resources? - Provision compute from hardened images

        SEC06BP03Not available

        How do you protect your compute resources? - Validate software integrity

        SEC06BP04Not available

        How do you protect your compute resources? - Reduce manual management and interactive access

        SEC06BP05Not available

        How do you protect your compute resources? - Automate compute protection

        SEC06BP06Not available

        How do you protect your compute resources? - None of these

        SEC07BP01Not available

        How do you classify your data? - Understand your data classification scheme

        SEC07BP02Not available

        How do you classify your data? - Apply data protection controls based on data sensitivity

        SEC07BP03Not available

        How do you classify your data? - Define scalable data lifecycle management

        SEC07BP04Need Attention

        How do you classify your data? - Automate identification and classification

        [MacieToEnable] - Enable Macie
        • [ap-southeast-1]Macie
        • [us-east-1]Macie
        Getting started with Amazon Macie
        SEC08BP01Not available

        How do you protect your data at rest? - Implement secure key management

        SEC08BP02Need Attention

        How do you protect your data at rest? - Enforce encryption at rest

        [RequiresKmsKey] - Enable SSE
        • [ap-southeast-1]Cloudtrail::IsengardTrail-DO-NOT-DELETE
        [eksSecretsEncryption]
        [lambdaCMKEncryptionDisabled] - Customer Managed Key Not In Used
        • [ap-southeast-1]Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::webScrapNew, Lambda::webScrapper, Lambda::isengard-create-inventory-association, Lambda::testFunction, Lambda::isengard-set-default-instance-role, Lambda::isengard-set-default-patch-baseline
        • [us-east-1]Lambda::isengard-set-default-instance-role, Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-set-default-patch-baseline, Lambda::isengard-create-inventory-association
        [ServerSideEncrypted]
        [SSEWithKMS]
        [EBSEncrypted]
        [EncryptedAtRest]
        [StorageEncrypted]
        [EncryptedAtRest]
        [EncryptedWithKMS]
        [fieldLevelEncryption] - Set-up field-level encryption for your CloudFront distributions.
        • [GLOBAL]Cloudfront::E2X390QMMYIRUF
        [EncryptionAtRest]
        [EncryptionInTransit]
        Encrypt CloudTrail using AWS KMS
        CloudTrail Security Best Practices
        Lambda securing environment variables
        AWS Docs
        SEC08BP03Not available

        How do you protect your data at rest? - Automate data at rest protection

        SEC08BP04Need Attention

        How do you protect your data at rest? - Enforce access control

        [eksClusterRoleLeastPrivilege]
        [InlinePolicyFullAccessOneServ] - Limit access in policy
        • [GLOBAL]Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role
        [InlinePolicyFullAdminAccess]
        [FullAdminAccess] - Limit permissions.
        • [GLOBAL]Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::itadmin, Role::OrganizationAccountAccessRole, Role::PACICloudFormationStackSetExecutionRole, Role::ServiceScreenerAutomationRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
        [lambdaRoleReused] - Execution Role Reused
        • [ap-southeast-1]Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-create-inventory-association, Lambda::isengard-set-default-instance-role, Lambda::isengard-set-default-patch-baseline
        • [us-east-1]Lambda::isengard-set-default-instance-role, Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-set-default-patch-baseline, Lambda::isengard-create-inventory-association
        [EC2IamProfile]
        [BucketVersioning] - Enable Versioning
        • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
        • [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
        [ObjectLock] - Enable Object Lock
        • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
        • [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
        [PublicAccessBlock]
        AWS Docs
        AWS Docs
        Organization GuardRail Blog
        Lambda execution role
        AWS Docs
        Manage Versioning Example
        AWS Docs
        SEC09BP01Not available

        How do you protect your data in transit? - Implement secure key and certificate management

        SEC09BP02Need Attention

        How do you protect your data in transit? - Enforce encryption in transit

        [viewerPolicyHttps] - Configure one or more cache behaviors in your CloudFront distribution to require HTTPS for communication between viewers and CloudFront.
        • [GLOBAL]Cloudfront::E2X390QMMYIRUF
        [DeprecatedSSLProtocol]
        [SGEncryptionInTransit] - Encryption in Transit
        • [ap-southeast-1]SG::sg-34753642
        • [us-east-1]SG::sg-9b3e45a4
        [ELBListenerInsecure]
        [TlsEnforced] - Enforce Encryption of Data in Transit
        • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
        • [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
        [EncryptedInTransit]
        [MSSQLorPG__TransportEncrpytionDisabled]
        [NodeToNodeEncryption]
        [TLSEnforced]
        [EncInTransitAndRest]
        [viewerPolicyHttps] - Configure one or more cache behaviors in your CloudFront distribution to require HTTPS for communication between viewers and CloudFront.
        • [GLOBAL]Cloudfront::E2X390QMMYIRUF
        AWS Docs
        Data protection in Amazon EC2
        AWS Docs
        AWS Docs
        SEC09BP03Not available

        How do you protect your data in transit? - Authenticate network communications

        SEC09BP04Not available

        How do you protect your data in transit? - None of these

        SEC10BP01Not available

        How do you anticipate, respond to, and recover from incidents? - Identify key personnel and external resources

        SEC10BP02Not available

        How do you anticipate, respond to, and recover from incidents? - Develop incident management plans

        SEC10BP03Not available

        How do you anticipate, respond to, and recover from incidents? - Prepare forensic capabilities

        SEC10BP04Not available

        How do you anticipate, respond to, and recover from incidents? - Develop and test security incident response playbooks

        SEC10BP05Not available

        How do you anticipate, respond to, and recover from incidents? - Pre-provision access

        SEC10BP06Not available

        How do you anticipate, respond to, and recover from incidents? - Run simulations

        SEC10BP07Not available

        How do you anticipate, respond to, and recover from incidents? - Establish a framework for learning from incidents

        SEC11BP01Not available

        How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Perform regular penetration testing

        SEC11BP02Not available

        How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Deploy software programmatically

        SEC11BP03Not available

        How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Regularly assess security properties of the pipelines

        SEC11BP04Not available

        How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Train for application security

        SEC11BP05Not available

        How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Automate testing throughout the development and release lifecycle

        SEC11BP06Not available

        How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Conduct code reviews

        SEC11BP07Not available

        How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Centralize services for packages and dependencies

        SEC11BP08Not available

        How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Build a program that embeds security ownership in workload teams