You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
V2devTest,612801422404,us-west-2,1.1,PASS,Scored,Level 1,[check11] Avoid the use of the root account (Scored),Root user in the account wasn't accessed in the last 1 days,Software and Configuration Checks,High,iam,AwsAccount,Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark,"The ""root"" account has unrestricted access to all resources in the AWS account. It is highly recommended that the use of this account be avoided.",Follow the remediation instructions of the Ensure IAM policies are attached only to groups or roles recommendation.,http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html,IAM,
3
3
V2devTest,612801422404,us-west-2,1.2,FAIL,Scored,Level 1,[check12] Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password (Scored),User ansible-test-user has Password enabled but MFA disabled,ens-op.acc.5.aws.iam.1,High,iam,AwsIamUser,Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark,Unauthorized access to this critical account if password is not secure or it is disclosed in any way.,Enable MFA for root account. is a simple best practice that adds an extra layer of protection on top of your user name and password. Recommended to use hardware keys over virtual MFA.,https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_virtual.html,IAM,
4
4
V2devTest,612801422404,us-west-2,1.2,FAIL,Scored,Level 1,[check12] Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password (Scored),User John has Password enabled but MFA disabled,ens-op.acc.5.aws.iam.1,High,iam,AwsIamUser,Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark,Unauthorized access to this critical account if password is not secure or it is disclosed in any way.,Enable MFA for root account. is a simple best practice that adds an extra layer of protection on top of your user name and password. Recommended to use hardware keys over virtual MFA.,https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_virtual.html,IAM,
,012345678910,us-east-1,1.1,FAIL,Scored,Level 1,[check11] Avoid the use of the root account (Scored),Root user in the account wasn't accessed in the last 1 days,Software and Configuration Checks,High,iam,AwsAccount,Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark,The "root" account has unrestricted access to all resources in the AWS account. It is highly recommended that the use of this account be avoided.,Follow the remediation instructions of the Ensure IAM policies are attached only to groups or roles recommendation.,http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html,IAM
3
-
,012345678910,us-east-1,1.3,FAIL,Scored,Level 1,[check13] Ensure credentials unused for 90 days or greater are disabled (Scored),User example_user has never used access key 1 since creation and not rotated it in the past 90 days,ens-op.acc.1.aws.iam.3 ens-op.acc.5.aws.iam.4,Medium,iam,AwsIamUser,Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark,AWS IAM users can access AWS resources using different types of credentials (passwords or access keys). It is recommended that all credentials that have been unused in 90 or greater days be removed or deactivated.,Use the credential report to ensure password_last_changed is less than 90 days ago.,https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html,IAM
4
-
,012345678910,us-east-1,1.10,FAIL,Scored,Level 1,[check110] Ensure IAM password policy prevents password reuse: 24 or greater (Scored),Password Policy has weak reuse requirement (lower than 24),Software and Configuration Checks,Medium,iam,AwsAccount,Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark,Password policies are used to enforce password complexity requirements. IAM password policies can be used to ensure password are comprised of different character sets. It is recommended that the password policy require at least one uppercase letter.,Ensure "Number of passwords to remember" is set to 24.,https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_account-policy.html,IAM
5
-
,012345678910,eu-west-2,7.5,FAIL,Not Scored,Extra,[extra75] Ensure there are no Security Groups not being used (Not Scored) (Not part of CIS benchmark),eu-west-2: sg-01234567890qwerty is not being used!,ens-mp.com.4.aws.sg.3,Informational,ec2,AwsEc2SecurityGroup,Software and Configuration Checks,Having clear definition and scope for Security Groups creates a better administration environment.,List all the security groups and then use the cli to check if they are attached to an instance.,https://aws.amazon.com/premiumsupport/knowledge-center/ec2-find-security-group-resources/,Infrastructure Security
0 commit comments