1.6 Ensure hardware MFA is enabled for the 'root' user account | IDENTIFICATION AND AUTHENTICATION |
1.18 Ensure IAM instance roles are used for AWS resource access from instances | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.21 Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environments | ACCESS CONTROL |
2.1.1 Ensure S3 Bucket Policy is set to deny HTTP requests | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.1.2 Ensure MFA Delete is enabled on S3 buckets | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION |
2.1.3 Ensure all data in Amazon S3 has been discovered, classified and secured when required. | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
3.2 Ensure CloudTrail log file validation is enabled | AUDIT AND ACCOUNTABILITY |
3.5 Ensure AWS Config is enabled in all regions - 'Include global resources' | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
3.5 Ensure AWS Config is enabled in all regions - 'Record all resources supported in this region' | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
3.5 Ensure AWS Config is enabled in all regions - 'Recording Status' | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
3.5 Ensure AWS Config is enabled in all regions - 'Review defined S3 Bucket' | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
3.5 Ensure AWS Config is enabled in all regions - 'Review defined SNS Topic' | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
3.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.8 Ensure rotation for customer created symmetric CMKs is enabled | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.9 Ensure VPC flow logging is enabled in all VPCs | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
3.10 Ensure that Object-level logging for write events is enabled for S3 bucket | AUDIT AND ACCOUNTABILITY |
3.11 Ensure that Object-level logging for read events is enabled for S3 bucket | AUDIT AND ACCOUNTABILITY |
4.1 Ensure unauthorized API calls are monitored | AUDIT AND ACCOUNTABILITY |
4.6 Ensure AWS Management Console authentication failures are monitored | AUDIT AND ACCOUNTABILITY |
4.7 Ensure disabling or scheduled deletion of customer created CMKs is monitored | AUDIT AND ACCOUNTABILITY |
4.9 Ensure AWS Config configuration changes are monitored | AUDIT AND ACCOUNTABILITY |
4.10 Ensure security group changes are monitored | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
4.11 Ensure Network Access Control Lists (NACL) changes are monitored | AUDIT AND ACCOUNTABILITY |
4.16 Ensure AWS Security Hub is enabled | CONFIGURATION MANAGEMENT |
5.4 Ensure the default security group of every VPC restricts all traffic - 'No Inbound Rules exist | ACCESS CONTROL, MEDIA PROTECTION |
5.4 Ensure the default security group of every VPC restricts all traffic - 'No Outbound Rules exist | ACCESS CONTROL, MEDIA PROTECTION |
5.5 Ensure routing tables for VPC peering are 'least access' | ACCESS CONTROL, MEDIA PROTECTION |