CIS Amazon Web Services Foundations v4.0.1 L1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Amazon Web Services Foundations v4.0.1 L1

Updated: 4/29/2025

Authority: CIS

Plugin: amazon_aws

Revision: 1.1

Estimated Item Count: 42

File Details

Filename: CIS_Amazon_Web_Services_Foundations_v4.0.1_L1.audit

Size: 141 kB

MD5: a615cf48c8dad1456c6d19d4f9ff3eaf
SHA256: 0567b6f6c6f9f789764374bdd62a2ab0d8b52c4f1439421b644c0c953bae2c8a

Audit Items

DescriptionCategories
1.1 Maintain current contact details
1.2 Ensure security contact information is registered
1.3 Ensure security questions are registered in the AWS account
1.4 Ensure no 'root' user account access key exists
1.5 Ensure MFA is enabled for the 'root' user account
1.7 Eliminate use of the 'root' user for administrative and daily tasks
1.8 Ensure IAM password policy requires minimum length of 14 or greater
1.9 Ensure IAM password policy prevents password reuse
1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.11 Do not create access keys during initial setup for IAM users with a console password
1.12 Ensure credentials unused for 45 days or more are disabled
1.13 Ensure there is only one active access key for any single IAM user
1.14 Ensure access keys are rotated every 90 days or less
1.15 Ensure IAM users receive permissions only through groups
1.16 Ensure IAM policies that allow full "*:*" administrative privileges are not attached
1.17 Ensure a support role has been created to manage incidents with AWS Support
1.19 Ensure that all expired SSL/TLS certificates stored in AWS IAM are removed
1.20 Ensure that IAM Access Analyzer is enabled for all regions
1.22 Ensure access to AWSCloudShellFullAccess is restricted
2.1.4 Ensure that S3 is configured with 'Block Public Access' enabled
2.2.1 Ensure that encryption-at-rest is enabled for RDS instances
2.2.2 Ensure the Auto Minor Version Upgrade feature is enabled for RDS instances
2.2.3 Ensure that RDS instances are not publicly accessible
2.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS
2.3.1 Ensure that encryption is enabled for EFS file systems
3.1 Ensure CloudTrail is enabled in all regions
3.4 Ensure that server access logging is enabled on the CloudTrail S3 bucket
4.2 Ensure management console sign-in without MFA is monitored
4.3 Ensure usage of the 'root' account is monitored
4.4 Ensure IAM policy changes are monitored
4.5 Ensure CloudTrail configuration changes are monitored
4.8 Ensure S3 bucket policy changes are monitored
4.12 Ensure changes to network gateways are monitored
4.13 Ensure route table changes are monitored
4.14 Ensure VPC changes are monitored
4.15 Ensure AWS Organizations changes are monitored
5.1.1 Ensure EBS volume encryption is enabled in all regions
5.1.2 Ensure CIFS access is restricted to trusted networks to prevent unauthorized access
5.2 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports
5.3 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports
5.4 Ensure no security groups allow ingress from ::/0 to remote server administration ports
5.7 Ensure that the EC2 Metadata Service only allows IMDSv2