CIS Amazon Web Services Foundations v7.0.0 L2

Audit Details

Name: CIS Amazon Web Services Foundations v7.0.0 L2

Updated: 4/14/2026

Authority: CIS

Plugin: amazon_aws

Revision: 1.0

Estimated Item Count: 29

File Details

Filename: CIS_Amazon_Web_Services_Foundations_v7.0.0_L2.audit

Size: 132 kB

MD5: e2c3d9f87652b716ec350764e6d159b0
SHA256: 93fbadb4f2d2c43c7feec5bf78d10b848b9696b68ced3f07e865c3c3b5084dab

Audit Items

DescriptionCategories
2.1.1 Ensure centralized root access in AWS Organizations

ACCESS CONTROL

2.1.2 Ensure authorization guardrails for all AWS Organization accounts

ACCESS CONTROL

2.1.3 Ensure Organizations management account is not used for workloads

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 Ensure Organizational Units are structured by environment and sensitivity

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.5 Ensure delegated admin manages AWS Organizations policies

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.1.6 Ensure delegated admins manage AWS Organizations-integrated services

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.6 Ensure hardware MFA is enabled for the 'root' user account

IDENTIFICATION AND AUTHENTICATION

2.16 Ensure IAM instance roles are used for AWS resource access from instances

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.19 Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environments

ACCESS CONTROL

3.1.1 Ensure S3 Bucket Policy is set to deny HTTP requests

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Ensure MFA Delete is enabled on S3 buckets

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

3.1.3 Ensure all data in Amazon S3 has been discovered, classified, and secured when necessary

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.2 Ensure CloudTrail log file validation is enabled

AUDIT AND ACCOUNTABILITY

4.3 Ensure AWS Config is enabled in all regions

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

4.5 Ensure CloudTrail logs are encrypted at rest using KMS CMKs

AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.6 Ensure rotation for customer-created symmetric CMKs is enabled

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.7 Ensure VPC flow logging is enabled in all VPCs

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.8 Ensure that object-level logging for write events is enabled for S3 buckets

AUDIT AND ACCOUNTABILITY

4.9 Ensure that object-level logging for read events is enabled for S3 buckets

AUDIT AND ACCOUNTABILITY

5.1 Ensure unauthorized API calls are monitored

AUDIT AND ACCOUNTABILITY

5.6 Ensure AWS Management Console authentication failures are monitored

AUDIT AND ACCOUNTABILITY

5.7 Ensure disabling or scheduled deletion of customer created CMKs is monitored

AUDIT AND ACCOUNTABILITY

5.9 Ensure AWS Config configuration changes are monitored

AUDIT AND ACCOUNTABILITY

5.10 Ensure security group changes are monitored

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

5.11 Ensure Network Access Control List (NACL) changes are monitored

AUDIT AND ACCOUNTABILITY

5.16 Ensure AWS Security Hub is enabled

RISK ASSESSMENT

6.5 Ensure the default security group of every VPC restricts all traffic

ACCESS CONTROL, MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

6.6 Ensure routing tables for VPC peering are "least access"

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.8 Ensure VPC Endpoints are used for access to AWS Services

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION