CIS Security Controls Mapping
CIS Security Controls Mapping
This document describes the CIS Amazon Web Services Foundations Security Requirements that are directly addressed by this AWS Quick
https://benchmarks.cisecurity.org/en-us/?route=downloads.form.awsfoundations.110
It is important to note that the Description of AWS Implementation details and Additional Guidance in this document are not exhaustive,
The controls are a combination of AWS Config Rules (both AWS-managed and custom), Amazon CloudWatch rules, and Amazon CloudWa
The following preconditions must be met before the stack can be launched. This Quickstart does provide customers with an option of con
Precondition 1: AWS Config must be turned on in the region where this template will be run. This is needed for Config Rules.
Precondition 2: AWS CloudTrail must be turned on and must be delivering logs to CloudWatch Logs. This is needed for CloudWatch metri
Precondition 3: AWS Lambda must be supported in the region where this template will be launched.
See this page for AWS services region support:
https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a password (Scored)
1.3 Ensure credentials unused for 90 days or greater are disabled (Scored)
1.4 Ensure access keys are rotated every 90 days or less (Scored)
1.5 Ensure IAM password policy requires at least one uppercase letter (Scored)
1.6 Ensure IAM password policy require at least one lowercase letter (Scored)
1.7 Ensure IAM password policy require at least one symbol (Scored)
1.8 Ensure IAM password policy require at least one number (Scored)
1.9 Ensure IAM password policy requires minimum length of 14 or greater (Scored)
1.10 Ensure IAM password policy prevents password reuse (Scored)
1.11 Ensure IAM password policy expires passwords within 90 days or less (Scored)
1.12 Ensure no root account access key exists (Scored)
1.14 Ensure hardware MFA is enabled for the "root" account (Scored)
1.15 Ensure security questions are registered in the AWS account (Not Scored)
1.16 Ensure IAM policies are attached only to groups or roles (Scored)
1.19 Ensure IAM instance roles are used for AWS resource access from instances (Not Scored)
1.20 Ensure a support role has been created to manage incidents with AWS Support (Scored)
1.21 Do not setup access keys during initial user setup for all IAM users that have a console password (Not
Scored)
1.22 Ensure IAM policies that allow full "*:*" administrative privileges are not created (Scored)
2 Logging
2.1 Ensure CloudTrail is enabled in all regions (Scored)
2.3 Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible (Scored)
2.4 Ensure CloudTrail trails are integrated with CloudWatch Logs (Scored)
2.6 Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket (Scored)
2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs (Scored)
3 Monitoring
3.1 Ensure a log metric filter and alarm exist for unauthorized API calls (Scored)
3.2 Ensure a log metric filter and alarm exist for Management Console sign-in without MFA (Scored)
3.3 Ensure a log metric filter and alarm exist for usage of "root" account (Scored)
3.4 Ensure a log metric filter and alarm exist for IAM policy changes (Scored)
3.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes (Scored)
3.6 Ensure a log metric filter and alarm exist for AWS Management Console authentication failures (Scored)
3.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs
(Scored)
3.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes (Scored)
3.9 Ensure a log metric filter and alarm exist for AWS Config configuration changes (Scored)
3.10 Ensure a log metric filter and alarm exist for security group changes (Scored)
3.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) (Scored)
3.12 Ensure a log metric filter and alarm exist for changes to network gateways (Scored)
3.13 Ensure a log metric filter and alarm exist for route table changes (Scored)
3.14 Ensure a log metric filter and alarm exist for VPC changes (Scored)
4 Networking
4.1 Ensure no security groups allow ingress from 0.0.0.0/0 to port 22 (Scored)
4.2 Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 (Scored)
4.3 Ensure the default security group of every VPC restricts all traffic (Scored)
4.4 Ensure routing tables for VPC peering are "least access" (Not Scored)
y this AWS Quick Start package. Additional information about this benchmark can be found at
e not exhaustive, and must be reviewed, evaluated, assessed, and approved by the customer organization, and layered with other security features that
Amazon CloudWatch alarms. Please note that these resources will incur costs in your account; please refer to the pricing model for each service.
h an option of configuring AWS CloudTrail and AWS Config. Customers can choose to do so or choose to configure these services themselves.
ules.
loudWatch metrics and alarms.
by the customer organization, and layered with other security features that address all of the in-scope systems and applications for a holistic solution t
s in your account; please refer to the pricing model for each service.
We recommend that Root accounts should not be used and that the credentials not be shared with anyone else
should leverage IAM Groups, Roles and Users to grant access to specific AWS resources. Refer to IAM Best Practi
http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
For extra security, we recommend that customers enable multi-factor authentication (MFA) for IAM users based
by the config rule.
Refer to IAM Best Practices at the following link:
http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
If the Config rule reports NonCompliance, ensure that IAM Users with a password have MFA enabled. For remed
the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
We recommend that unused credentials be disabled by customers based on the Compliance reported by the Co
Refer to IAM Best Practices at the following link:
http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
If the Config rule reports NonCompliance, ensure that credentials unused for 90 days or greater are disabled. Fo
1.3 in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pd
We recommend that access keys be rotated by customers based on the Compliance reported by the Config rule
http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
If the Config rule reports NonCompliance, ensure that Access keys are rotated every 90 days or less. For remedia
document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
If the Config rule reports NonCompliance, ensure that the password policy meets the controls requirements. For
1.5 through 1.11 in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_B
We recommend you that create an IAM user for yourself that has administrative privileges and avoid generating
account.
Refer to IAM Best Practices at the following link:
http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
If the Config rule reports NonCompliance, ensure that no root account access key exists. For remediation, refer t
https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
If the Config rule reports NonCompliance, ensure MFA is enabled for root account. For remediation, refer to con
https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
If the Config rule reports NonCompliance, ensure hardware MFA is enabled for root account. For remediation, re
document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
Security Questions are highly recommended to be setup to help you recover root login access, if lost. For remed
the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
We recommend that you assign IAM Policies to either IAM Groups or IAM Roles to reduce the complexity of acc
of users grow.
If the Config rule reports NonCompliance, ensure IAM policies are attached only to Groups or Roles. For remedia
document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
We recommend that current contact details be maintained. AWS Uses this contact the account owner when pro
are observed within an account.
For remediation, refer to control 1.17 in the document
https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
We recommend that the Security contact information be kept current. Specifying security-specific contact inform
security advisories sent by AWS reach the team in your organization that is best equipped to respond to them.
We recommend that IAM Roles be attached to an EC2 Instance to provide temporary credentials for the applicati
Instances
Refer to IAM Best Practices at the following link:
http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
If the Config rule reports NonCompliance, ensure IAM Instance roles are used for EC2 Instances. For remediation
document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
Note: IAM Roles can be atached to running Instances. See this documentation
https://aws.amazon.com/blogs/security/new-attach-an-aws-iam-role-to-an-existing-amazon-ec2-instance-by-us
sc_channel=sm&sc_campaign=rolesforrunninginstances&sc_publisher=tw&sc_medium=social&sc_content=read
post&sc_country=global&sc_geo=global&sc_category=ec2&sc_outcome=launch
It is recommended that customers create an IAM Role to allow authorized users to manage incidents with AWS
If the Config rule reports NonCompliance, ensure that atleast 1 IAM Role,User,Group has the AWSSupportAcces
remediation, refer to control 1.20 in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CI
It is recommended that additional steps be taken by their user upon profile creation to understand the intent of
For remediation, refer to control 1.21 in the document
https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
It is recommended that IAM policies do not allow full administrative privileges and that the policies follow the p
If the Config rule reports NonCompliance, ensure that IAM Policies provide least previlige access to AWS resourc
control 1.22 in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Bench
This quickstart provides customers an option to automatically configure CloudTrail in the AWS region where this
accounts which do not have Cloudtrail configured, should choose this option for the CIS Cloudformation templat
If the Config rule reports NonCompliance, customers can choose to enable Cloudtrail in all regions and configure
remediation, refer to control 2.1 in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_
If the Config rule reports NonCompliance, ensure Cloudtrail log file validation is enabled. For remediation, refer
https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
If the Config rule reports NonCompliance, ensure S3 Bucket configured for Cloudtrail to log to is not publicly acc
to control 2.3 in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benc
If the Config rule reports NonCompliance, ensure that Cloudtrail trails are integrated with Cloudwatch logs. For r
in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
This quickstart provides customers an option to automatically configure AWS Config at a regional level. Custome
have Config configured, should choose this option for the CIS Cloudformation template to execute successfully.
It is recommended that Logging be enabled for all S3 Buckets. Configuring logs to be placed in a separate bucket
information which can be useful in security and incident response workflows.
If the Config rule reports NonCompliance, enable Cloudtrail S3 bucket access logging. For remediation, refer to c
https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
Configuring CloudTrail to use SSE-KMS provides additional confidentiality controls on log data as a given user mu
the corresponding log bucket and must be granted decrypt permission by the CMK policy.
If the Config rule reports NonCompliance, ensure Cloudtrail logs are encrypted at rest using KMS CMKs. For rem
the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
It is recommended to rotate encryption keys to reduce the potential impact of a compromised key as data encry
accessed with a previous key that may have been exposed.
If the Config rule reports NonCompliance, ensure rotation of customer created CMKs are enabled. For remediati
document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
It is recommended to have VPC Flow Logs enabled to provide visibility into network traffic that traverses the VPC
traffic or insight during security workflows.
If the Config rule reports NonCompliance, ensure VPC Flow logging is enabled in all VPCs. For remediation, refer
https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
It is recommended that customers monitor unauthorized API calls which will help reveal application errors and m
malicious activity.
It is recommended that customers monitor for single-factor console logins. This will increase visibility into accou
MFA.
It is recommended that customers monitor for root account logins which will provide visibility into the use of a f
opportunity to reduce the use of it.
It is recommended that customers monitor changes to IAM policies which will help ensure authentication and au
intact.
It is recommended that customers monitor changes to CloudTrail's configuration which will help ensure sustaine
performed in the AWS account.
It is recommended that customers monitor failed console logins. This may decrease lead time to detect an attem
which may provide an indicator, such as source IP, that can be used in other event correlation.
It is recommended that customers monitor deletion or disabling of CMKs. Data encrypted with disabled or delet
accessible.
It is recommended that customers monitor changes to S3 bucket policies to reduce time to detect and correct p
S3 buckets.
It is recommended that customers monitor changes to AWS Config configuration which will help ensure sustaine
items within the AWS account.
It is recommended that customers monitor changes to security group which will help ensure that resources and
exposed.
It is recommended that customers monitor changes to NACLs to help ensure that AWS resources and services ar
It is recommended that customers monitor changes to network gateways which will help ensure that all ingress/
border via a controlled path.
Monitoring changes to route tables will help ensure that all VPC traffic flows through an expected path.Monitori
configuration will help ensure that all VPCs remain intact.
It is recommended that customers remove unfettered connectivity to remote console services, such as SSH, redu
If the Config rule reports NonCompliance, ensure no security groups allow Ingress from 0.0.0.0/0 to port 22. For
4.1 in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pd
It is recommended that customers remove unfettered connectivity to remote console services, such as RDP, red
If the Config rule reports NonCompliance, ensure no security groups allow Ingress from 0.0.0.0/0 to port 3389. F
4.2 in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pd
It is recommended to configure all VPC default security groups to restrict all traffic. This will encourage least priv
development and mindful placement of AWS resources into security groups which will in-turn reduce the exposu
If the Config rule reports NonCompliance, ensure that the default security group of every VPC restricts all traffic.
control 4.3 in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchm
Being highly selective in peering routing tables is a very effective way of minimizing the impact of breach as reso
are inaccessible to the peered VPC.
If the Config rule reports NonCompliance, ensure that the routing tables for VPC peering are "least access". For r
in the document https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
Control Enforcement
Responsibility
Customer
Customer
Shared (Config Rule and Customer)
Customer
Customer