1.1
|
Maintain current contact details (Manual)
|
1
|
-
|
-
|
Supported
|
1.2
|
Ensure security contact information is registered (Manual)
|
1
|
-
|
-
|
Supported
|
1.3
|
Ensure security questions are registered in the AWS account (Manual)
|
1
|
-
|
-
|
Supported
|
1.4
|
Ensure no ‘root’ user account access key exists (Automated)
|
1
|
Supported (CIS v1.4 - 1.4)
|
-
|
Supported
|
1.5
|
Ensure MFA is enabled for the ‘root’ user account (Automated)
|
1
|
Supported (CIS v1.4 - 1.5)
|
-
|
Supported
|
1.6
|
Ensure hardware MFA is enabled for the ‘root’ user account (Manual)
|
1
|
Supported (CIS v1.4 - 1.6)
|
-
|
Supported
|
1.7
|
Eliminate use of the ‘root’ user for administrative and daily tasks (Manual)
|
1
|
Supported (CIS v1.4 - 1.7)
|
-
|
Supported
|
1.8
|
Ensure IAM password policy requires minimum length of 14 or greater (Automated)
|
1
|
Supported (CIS v1.4 - 1.8)
|
-
|
Supported
|
1.9
|
Ensure IAM password policy prevents password reuse (Automated)
|
1
|
Supported (CIS v1.4 - 1.9)
|
-
|
Supported
|
1.10
|
Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password (Automated)
|
1
|
Supported (CIS v1.4 - 1.10)
|
-
|
Supported
|
1.11
|
Do not setup access keys during initial user setup for all IAM users that have a console password (Manual)
|
1
|
-
|
-
|
Supported
|
1.12
|
Ensure credentials unused for 45 days or greater are disabled (Automated)
|
1
|
Supported (CIS v1.4 - 1.12)
|
-
|
Supported
|
1.13
|
Ensure there is only one active access key available for any single IAM user (Automated)
|
1
|
-
|
-
|
Supported
|
1.14
|
Ensure access keys are rotated every 90 days or less (Automated)
|
1
|
Supported (CIS v1.4 - 1.14)
|
-
|
Supported
|
1.15
|
Ensure IAM Users Receive Permissions Only Through Groups (Automated)
|
1
|
-
|
Supported (CIS v1.4 - 1.15)
|
Supported
|
1.16
|
Ensure IAM policies that allow full “
:
” administrative privileges are not attached (Automated)
|
1
|
Supported (CIS v1.4 - 1.16)
|
Supported (CIS v1.4 - 1.16)
|
Supported
|
1.17
|
Ensure a support role has been created to manage incidents with AWS Support (Automated)
|
1
|
-
|
-
|
Supported
|
1.18
|
Ensure IAM instance roles are used for AWS resource access from instances (Automated)
|
1
|
-
|
Supported (CIS v1.4 - 1.18)
|
Supported
|
1.19
|
Ensure that all the expired SSL/TLS certificates stored in AWS IAM are removed (Automated)
|
1
|
-
|
-
|
Supported
|
1.20
|
Ensure that IAM Access analyzer is enabled for all regions (Automated)
|
1
|
-
|
-
|
Supported
|
1.21
|
Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environments (Manual)
|
1
|
-
|
-
|
Supported
|
1.22
|
Ensure access to AWSCloudShellFullAccess is restricted (Manual)
|
1
|
-
|
-
|
Supported
|