SEC01 | BP01 | Compliant | How do you securely operate your workload? - Separate workloads using accounts- [hasOrganization]
| |
SEC01 | BP02 | Need Attention | How do you securely operate your workload? - Secure account root user and properties- [rootMfaActive] - Enable MFA on root user
- [hasAlternateContact] - Configure AWS account contacts
- [rootHasAccessKey]
- [rootConsoleLogin30days]
- [passwordPolicy] - Set a custom password policy.
- [enableGuardDuty]
- [rootConsoleLogin30days]
| AWS MFA IAM Best Practices Alternate Contact IAM Password Policy |
SEC01 | BP03 | Compliant | How do you securely operate your workload? - Identify and validate control objectives- [SCPEnabled]
- [EnableConfigService]
| |
SEC01 | BP04 | Compliant | How do you securely operate your workload? - Stay up to date with security threats and recommendations- [enableGuardDuty]
| |
SEC01 | BP05 | Not available | How do you securely operate your workload? - Identify and prioritize risks using a threat model | |
SEC01 | BP06 | Need Attention | How do you securely operate your workload? - Reduce security management scope- [Has 11 actives lambda]
- [Has 2 actives rds]
- [ecs] - Need at least 1 ecs
- [eks] - Need at least 1 eks
- [Has 2 actives dynamodb]
- [elasticache] - Need at least 1 elasticache
|
|
SEC01 | BP07 | Compliant | How do you securely operate your workload? - Automate deployment of standard security controls- [hasOrganization]
| |
SEC01 | BP08 | Not available | How do you securely operate your workload? - Evaluate and implement new security services and features regularly | |
SEC02 | BP01 | Compliant | How do you manage identities for people and machines? - Use strong sign-in mechanisms- [mfaActive]
- [passwordPolicyWeak]
- [passwordLastChange90]
- [hasAccessKeyNoRotate30days]
| |
SEC02 | BP02 | Compliant | How do you manage identities for people and machines? - Use temporary credentials- [EC2IamProfile]
| |
SEC02 | BP03 | Compliant | How do you manage identities for people and machines? - Store and use secrets securely- [hasAccessKeyNoRotate30days]
- [DBwithoutSecretManager]
- [DBwithSomeSecretsManagerOnly]
| |
SEC02 | BP04 | Compliant | How do you manage identities for people and machines? - Rely on a centralized identity provider- [hasSSORoles]
- [hasExternalIdentityProvider]
| |
SEC02 | BP05 | Need Attention | How do you manage identities for people and machines? - Audit and rotate credentials periodically- [passwordLastChange90]
- [hasAccessKeyNoRotate30days]
- [eksClusterRoleLeastPrivilege]
- [InlinePolicyFullAccessOneServ] - Limit access in policy
- [GLOBAL]Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role
- [InlinePolicyFullAdminAccess]
- [FullAdminAccess] - Limit permissions.
- [GLOBAL]Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::itadmin, Role::OrganizationAccountAccessRole, Role::PACICloudFormationStackSetExecutionRole, Role::ServiceScreenerAutomationRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
- [lambdaRoleReused] - Execution Role Reused
- [ap-southeast-1]Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-create-inventory-association, Lambda::isengard-set-default-instance-role, Lambda::isengard-set-default-patch-baseline
- [us-east-1]Lambda::isengard-set-default-instance-role, Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-set-default-patch-baseline, Lambda::isengard-create-inventory-association
- [EC2IamProfile]
| AWS Docs AWS Docs Organization GuardRail Blog Lambda execution role |
SEC02 | BP06 | Need Attention | How do you manage identities for people and machines? - Employ user groups and attributes- [userNotUsingGroup] - Place IAM user within User Group
- [groupEmptyUsers]
| IAM Group |
SEC03 | BP01 | Need Attention | How do you manage permissions for people and machines? - Define access requirements- [InlinePolicy] - Use managed policies
- [GLOBAL]User::kuettai, Role::AccessAnalyzerTrustedService, Role::AVMContainersUserRole, Role::awslogs.prod.kelex.molecule.toppatterns, Role::CloudSecAuditRole, Role::CloudSeerTrustedServiceRole, Role::CodeGuruProfilerForwardToAmazonProfiler, Role::CodeStarWorker-dojo-CloudFormation, Role::CodeStarWorker-dojo-ToolChain, Role::CodeStarWorker-dojo-WebApp, Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role, Role::DocumentUnderstandingSolutionCICD-CodeBuildRole-26NRX1QIOV08, Role::EC2AdminRole, Role::IMDSv2-automigrator, Role::OrthancRole, Role::PACICloudFormationStackSetAdministrationRole, Role::SaltyTrustedService, Role::ServiceScreenerAssumeRole, Role::ShadowTrooperRole, Role::TurtleRoleManagement
| AWS Docs |
SEC03 | BP02 | Need Attention | How do you manage permissions for people and machines? - Grant least privilege access- [eksClusterRoleLeastPrivilege]
- [InlinePolicyFullAccessOneServ] - Limit access in policy
- [GLOBAL]Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role
- [InlinePolicyFullAdminAccess]
- [FullAdminAccess] - Limit permissions.
- [GLOBAL]Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::itadmin, Role::OrganizationAccountAccessRole, Role::PACICloudFormationStackSetExecutionRole, Role::ServiceScreenerAutomationRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
- [lambdaRoleReused] - Execution Role Reused
- [ap-southeast-1]Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-create-inventory-association, Lambda::isengard-set-default-instance-role, Lambda::isengard-set-default-patch-baseline
- [us-east-1]Lambda::isengard-set-default-instance-role, Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-set-default-patch-baseline, Lambda::isengard-create-inventory-association
- [EC2IamProfile]
- [ManagedPolicyFullAccessOneServ] - Limit permissions.
- [GLOBAL]Role::CodeStarWorker-dojo-ToolChain, Role::OrthancRole
| AWS Docs AWS Docs Organization GuardRail Blog Lambda execution role AWS Docs |
SEC03 | BP03 | Need Attention | How do you manage permissions for people and machines? - Define permission guardrails for your organization- [EnableConfigService]
- [SCPEnabled]
- [InlinePolicy] - Use managed policies
- [GLOBAL]User::kuettai, Role::AccessAnalyzerTrustedService, Role::AVMContainersUserRole, Role::awslogs.prod.kelex.molecule.toppatterns, Role::CloudSecAuditRole, Role::CloudSeerTrustedServiceRole, Role::CodeGuruProfilerForwardToAmazonProfiler, Role::CodeStarWorker-dojo-CloudFormation, Role::CodeStarWorker-dojo-ToolChain, Role::CodeStarWorker-dojo-WebApp, Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role, Role::DocumentUnderstandingSolutionCICD-CodeBuildRole-26NRX1QIOV08, Role::EC2AdminRole, Role::IMDSv2-automigrator, Role::OrthancRole, Role::PACICloudFormationStackSetAdministrationRole, Role::SaltyTrustedService, Role::ServiceScreenerAssumeRole, Role::ShadowTrooperRole, Role::TurtleRoleManagement
| AWS Docs |
SEC03 | BP04 | Compliant | How do you manage permissions for people and machines? - Manage access based on lifecycle- [groupEmptyUsers]
- [userNoActivity90days]
- [HasDataEventsCaptured]
| |
SEC03 | BP05 | Compliant | How do you manage permissions for people and machines? - Establish emergency access process- [SCPEnabled]
- [NeedToEnableCloudTrail]
| |
SEC03 | BP06 | Need Attention | How do you manage permissions for people and machines? - Share resources securely within your organization- [SCPEnabled]
- [AccessControlList] - Enable SSE
- [ap-southeast-1]Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::kuettai-solutions-bucket-ap-southeast-1
- [us-east-1]Bucket::kuettai-dojo01
| Protecting data with IAM |
SEC03 | BP07 | Not available | How do you manage permissions for people and machines? - Reduce permissions continuously | |
SEC03 | BP08 | Not available | How do you manage permissions for people and machines? - Share resources securely with a third party | |
SEC03 | BP09 | Compliant | How do you manage permissions for people and machines? - Analyze public and cross account access- [EnableConfigService]
| |
SEC04 | BP01 | Need Attention | How do you detect and investigate security events? - Configure service and application logging- [eksClusterLogging]
- [VPCFlowLogEnabled] - Enable VPC Flow Log
- [ap-southeast-1]VPC::vpc-0229dd64
- [us-east-1]VPC::vpc-8d976df0
- [ApplicationLogs]
- [AuditLogging]
- [BucketLogging] - Enable Server Access Logging
- [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
- [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
- [ExecutionLogging]
- [accessLogging] - Enable CloudFront standard logs (access logs)
- [GLOBAL]Cloudfront::E2X390QMMYIRUF
- [NeedToEnableCloudTrail]
- [HasOneMultiRegionTrail]
- [EnableTrailS3BucketLifecycle]
- [HasInsightSelectors] - Enable Insight Selectors
- [ap-southeast-1]Cloudtrail::IsengardTrail-DO-NOT-DELETE
- [enableGuardDuty]
| Amazon Elastic Compute Cloud controls AWS Docs AWS Docs Insight events |
SEC04 | BP02 | Not available | How do you detect and investigate security events? - Capture logs, findings, and metrics in standardized locations | |
SEC04 | BP03 | Compliant | How do you detect and investigate security events? - Initiate remediation for non-compliant resources- [EnableConfigService]
| |
SEC04 | BP04 | Need Attention | How do you detect and investigate security events? - Correlate and enrich security events- [enableGuardDuty]
- [MacieToEnable] - Enable Macie
- [ap-southeast-1]Macie
- [us-east-1]Macie
| Getting started with Amazon Macie |
SEC05 | BP01 | Compliant | How do you protect your network resources? - Create network layers- [Has 1 actives cloudfront]
| |
SEC05 | BP02 | Need Attention | How do you protect your network resources? - Control traffic within your network layers- [SGSensitivePortOpenToAll]
- [SGAllTCPOpen]
- [SGAllUDPOpen]
- [SGDefaultInUsed]
- [SGEncryptionInTransit] - Encryption in Transit
- [ap-southeast-1]SG::sg-34753642
- [us-east-1]SG::sg-9b3e45a4
- [ELBListenerInsecure]
- [PubliclyAccessible]
| Data protection in Amazon EC2 |
SEC05 | BP03 | Not available | How do you protect your network resources? - Implement inspection-based protection | |
SEC05 | BP04 | Not available | How do you protect your network resources? - Automate network protection | |
SEC06 | BP01 | Compliant | How do you protect your compute resources? - Perform vulnerability management- [enableGuardDuty]
| |
SEC06 | BP02 | Not available | How do you protect your compute resources? - Provision compute from hardened images | |
SEC06 | BP03 | Not available | How do you protect your compute resources? - Validate software integrity | |
SEC06 | BP04 | Not available | How do you protect your compute resources? - Reduce manual management and interactive access | |
SEC06 | BP05 | Not available | How do you protect your compute resources? - Automate compute protection | |
SEC06 | BP06 | Not available | How do you protect your compute resources? - None of these | |
SEC07 | BP01 | Not available | How do you classify your data? - Understand your data classification scheme | |
SEC07 | BP02 | Not available | How do you classify your data? - Apply data protection controls based on data sensitivity | |
SEC07 | BP03 | Not available | How do you classify your data? - Define scalable data lifecycle management | |
SEC07 | BP04 | Need Attention | How do you classify your data? - Automate identification and classification- [MacieToEnable] - Enable Macie
- [ap-southeast-1]Macie
- [us-east-1]Macie
| Getting started with Amazon Macie |
SEC08 | BP01 | Not available | How do you protect your data at rest? - Implement secure key management | |
SEC08 | BP02 | Need Attention | How do you protect your data at rest? - Enforce encryption at rest- [RequiresKmsKey] - Enable SSE
- [ap-southeast-1]Cloudtrail::IsengardTrail-DO-NOT-DELETE
- [eksSecretsEncryption]
- [lambdaCMKEncryptionDisabled] - Customer Managed Key Not In Used
- [ap-southeast-1]Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::webScrapNew, Lambda::webScrapper, Lambda::isengard-create-inventory-association, Lambda::testFunction, Lambda::isengard-set-default-instance-role, Lambda::isengard-set-default-patch-baseline
- [us-east-1]Lambda::isengard-set-default-instance-role, Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-set-default-patch-baseline, Lambda::isengard-create-inventory-association
- [ServerSideEncrypted]
- [SSEWithKMS]
- [EBSEncrypted]
- [EncryptedAtRest]
- [StorageEncrypted]
- [EncryptedAtRest]
- [EncryptedWithKMS]
- [fieldLevelEncryption] - Set-up field-level encryption for your CloudFront distributions.
- [GLOBAL]Cloudfront::E2X390QMMYIRUF
- [EncryptionAtRest]
- [EncryptionInTransit]
| Encrypt CloudTrail using AWS KMS CloudTrail Security Best Practices Lambda securing environment variables AWS Docs |
SEC08 | BP03 | Not available | How do you protect your data at rest? - Automate data at rest protection | |
SEC08 | BP04 | Need Attention | How do you protect your data at rest? - Enforce access control- [eksClusterRoleLeastPrivilege]
- [InlinePolicyFullAccessOneServ] - Limit access in policy
- [GLOBAL]Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role
- [InlinePolicyFullAdminAccess]
- [FullAdminAccess] - Limit permissions.
- [GLOBAL]Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::itadmin, Role::OrganizationAccountAccessRole, Role::PACICloudFormationStackSetExecutionRole, Role::ServiceScreenerAutomationRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
- [lambdaRoleReused] - Execution Role Reused
- [ap-southeast-1]Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-create-inventory-association, Lambda::isengard-set-default-instance-role, Lambda::isengard-set-default-patch-baseline
- [us-east-1]Lambda::isengard-set-default-instance-role, Lambda::isengard-create-vpc-endpoints-for-ssm, Lambda::isengard-set-default-patch-baseline, Lambda::isengard-create-inventory-association
- [EC2IamProfile]
- [BucketVersioning] - Enable Versioning
- [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
- [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
- [ObjectLock] - Enable Object Lock
- [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
- [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
- [PublicAccessBlock]
| AWS Docs AWS Docs Organization GuardRail Blog Lambda execution role AWS Docs Manage Versioning Example AWS Docs |
SEC09 | BP01 | Not available | How do you protect your data in transit? - Implement secure key and certificate management | |
SEC09 | BP02 | Need Attention | How do you protect your data in transit? - Enforce encryption in transit- [viewerPolicyHttps] - Configure one or more cache behaviors in your CloudFront distribution to require HTTPS for communication between viewers and CloudFront.
- [GLOBAL]Cloudfront::E2X390QMMYIRUF
- [DeprecatedSSLProtocol]
- [SGEncryptionInTransit] - Encryption in Transit
- [ap-southeast-1]SG::sg-34753642
- [us-east-1]SG::sg-9b3e45a4
- [ELBListenerInsecure]
- [TlsEnforced] - Enforce Encryption of Data in Transit
- [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
- [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
- [EncryptedInTransit]
- [MSSQLorPG__TransportEncrpytionDisabled]
- [NodeToNodeEncryption]
- [TLSEnforced]
- [EncInTransitAndRest]
- [viewerPolicyHttps] - Configure one or more cache behaviors in your CloudFront distribution to require HTTPS for communication between viewers and CloudFront.
- [GLOBAL]Cloudfront::E2X390QMMYIRUF
| AWS Docs Data protection in Amazon EC2 AWS Docs AWS Docs |
SEC09 | BP03 | Not available | How do you protect your data in transit? - Authenticate network communications | |
SEC09 | BP04 | Not available | How do you protect your data in transit? - None of these | |
SEC10 | BP01 | Not available | How do you anticipate, respond to, and recover from incidents? - Identify key personnel and external resources | |
SEC10 | BP02 | Not available | How do you anticipate, respond to, and recover from incidents? - Develop incident management plans | |
SEC10 | BP03 | Not available | How do you anticipate, respond to, and recover from incidents? - Prepare forensic capabilities | |
SEC10 | BP04 | Not available | How do you anticipate, respond to, and recover from incidents? - Develop and test security incident response playbooks | |
SEC10 | BP05 | Not available | How do you anticipate, respond to, and recover from incidents? - Pre-provision access | |
SEC10 | BP06 | Not available | How do you anticipate, respond to, and recover from incidents? - Run simulations | |
SEC10 | BP07 | Not available | How do you anticipate, respond to, and recover from incidents? - Establish a framework for learning from incidents | |
SEC11 | BP01 | Not available | How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Perform regular penetration testing | |
SEC11 | BP02 | Not available | How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Deploy software programmatically | |
SEC11 | BP03 | Not available | How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Regularly assess security properties of the pipelines | |
SEC11 | BP04 | Not available | How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Train for application security | |
SEC11 | BP05 | Not available | How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Automate testing throughout the development and release lifecycle | |
SEC11 | BP06 | Not available | How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Conduct code reviews | |
SEC11 | BP07 | Not available | How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Centralize services for packages and dependencies | |
SEC11 | BP08 | Not available | How do you incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle? - Build a program that embeds security ownership in workload teams | |