CIS Amazon Web Services Foundations Benchmark v1.4.0
CIS Amazon Web Services Foundations Benchmark v1.4.0
Benchmark
v1.4.0 - 05-28-2021
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/
1|Page
Table of Contents
2|Page
1.16 Ensure IAM policies that allow full "*:*" administrative privileges are not
attached (Automated) ................................................................................................................... 54
1.17 Ensure a support role has been created to manage incidents with AWS
Support (Automated) .................................................................................................................... 57
1.18 Ensure IAM instance roles are used for AWS resource access from instances
(Manual) ............................................................................................................................................. 60
1.19 Ensure that all the expired SSL/TLS certificates stored in AWS IAM are
removed (Automated) .................................................................................................................. 63
1.20 Ensure that IAM Access analyzer is enabled for all regions (Automated) ...... 66
1.21 Ensure IAM users are managed centrally via identity federation or AWS
Organizations for multi-account environments (Manual) .............................................. 69
2 Storage ........................................................................................................................................................... 71
2.1 Simple Storage Service (S3) .......................................................................................................... 72
2.1.1 Ensure all S3 buckets employ encryption-at-rest (Manual) ............................... 73
2.1.2 Ensure S3 Bucket Policy is set to deny HTTP requests (Manual) ..................... 76
2.1.3 Ensure MFA Delete is enable on S3 buckets (Automated) ................................... 80
2.1.4 Ensure all data in Amazon S3 has been discovered, classified and secured
when required. (Manual) ............................................................................................................. 82
2.1.5 Ensure that S3 Buckets are configured with 'Block public access (bucket
settings)' (Automated) .................................................................................................................. 85
2.2 Elastic Compute Cloud (EC2) ........................................................................................................ 89
2.2.1 Ensure EBS volume encryption is enabled (Manual) ............................................. 90
2.3 Relational Database Service (RDS) ............................................................................................. 92
2.3.1 Ensure that encryption is enabled for RDS Instances (Automated) ................ 93
3 Logging .......................................................................................................................................................... 97
3.1 Ensure CloudTrail is enabled in all regions (Automated)........................................ 98
3.2 Ensure CloudTrail log file validation is enabled (Automated) ............................. 101
3.3 Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible
(Automated) .................................................................................................................................... 103
3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs (Automated)
.............................................................................................................................................................. 106
3.5 Ensure AWS Config is enabled in all regions (Automated) ................................... 109
3|Page
3.6 Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket
(Automated) .................................................................................................................................... 113
3.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs (Automated)
.............................................................................................................................................................. 116
3.8 Ensure rotation for customer created CMKs is enabled (Automated).............. 121
3.9 Ensure VPC flow logging is enabled in all VPCs (Automated) .............................. 123
3.10 Ensure that Object-level logging for write events is enabled for S3 bucket
(Automated) .................................................................................................................................... 126
3.11 Ensure that Object-level logging for read events is enabled for S3 bucket
(Automated) .................................................................................................................................... 129
4 Monitoring.................................................................................................................................................. 132
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls
(Automated) .................................................................................................................................... 133
4.2 Ensure a log metric filter and alarm exist for Management Console sign-in
without MFA (Automated) ........................................................................................................ 137
4.3 Ensure a log metric filter and alarm exist for usage of 'root' account
(Automated) .................................................................................................................................... 141
4.4 Ensure a log metric filter and alarm exist for IAM policy changes (Automated)
.............................................................................................................................................................. 145
4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes
(Automated) .................................................................................................................................... 149
4.6 Ensure a log metric filter and alarm exist for AWS Management Console
authentication failures (Automated)..................................................................................... 153
4.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of
customer created CMKs (Automated) .................................................................................. 157
4.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes
(Automated) .................................................................................................................................... 161
4.9 Ensure a log metric filter and alarm exist for AWS Config configuration
changes (Automated) .................................................................................................................. 165
4.10 Ensure a log metric filter and alarm exist for security group changes
(Automated) .................................................................................................................................... 169
4.11 Ensure a log metric filter and alarm exist for changes to Network Access
Control Lists (NACL) (Automated)......................................................................................... 173
4|Page
4.12 Ensure a log metric filter and alarm exist for changes to network gateways
(Automated) .................................................................................................................................... 177
4.13 Ensure a log metric filter and alarm exist for route table changes
(Automated) .................................................................................................................................... 181
4.14 Ensure a log metric filter and alarm exist for VPC changes (Automated) .... 185
4.15 Ensure a log metric filter and alarm exists for AWS Organizations changes
(Automated) .................................................................................................................................... 189
5 Networking ................................................................................................................................................ 193
5.1 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server
administration ports (Automated) ........................................................................................ 194
5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server
administration ports (Automated) ........................................................................................ 196
5.3 Ensure the default security group of every VPC restricts all traffic (Automated)
.............................................................................................................................................................. 198
5.4 Ensure routing tables for VPC peering are "least access" (Manual) .................. 201
Appendix: Recommendation Summary Table ...................................................................................... 203
Appendix: Change History ............................................................................................................................ 207
5|Page
Overview
This document provides prescriptive guidance for configuring security options for a subset
of Amazon Web Services with an emphasis on foundational, testable, and architecture
agnostic settings. Some of the specific Amazon Web Services in scope for this document
include:
Intended Audience
This document is intended for system and application administrators, security specialists,
auditors, help desk, platform deployment, and/or DevOps personnel who plan to develop,
deploy, assess, or secure solutions in Amazon Web Services.
Consensus Guidance
This benchmark was created using a consensus review process comprised of subject
matter experts. Consensus participants provide perspective from a diverse set of
backgrounds including consulting, software development, audit and compliance, security
research, operations, government, and legal.
Each CIS benchmark undergoes two phases of consensus review. The first phase occurs
during initial benchmark development. During this phase, subject matter experts convene
to discuss, create, and test working drafts of the benchmark. This discussion occurs until
consensus has been reached on benchmark recommendations. The second phase begins
6|Page
after the benchmark has been published. During this phase, all feedback provided by the
Internet community is reviewed by the consensus team for incorporation in the
benchmark. If you are interested in participating in the consensus process, please visit
https://workbench.cisecurity.org/.
7|Page
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Stylized Monospace font Used for blocks of code, command, and script examples.
Text should be interpreted exactly as presented.
Monospace font Used for inline code, commands, or examples. Text should
be interpreted exactly as presented.
<italic font in brackets> Italic texts set in angle brackets denote a variable
requiring substitution for a real value.
Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual steps
to implement. Both statuses are equally important and are determined and supported as
defined below:
Automated
Manual
8|Page
Profile Definitions
The following configuration profiles are defined by this Benchmark:
Level 1
Level 2
This profile extends the "Level 1" profile. Items in this profile exhibit one or more of
the following characteristics:
o are intended for environments or use cases where security is more critical
than manageability and usability
o acts as defense in depth measure
o may impact the utility or performance of the technology
o may include additional licensing, cost, or addition of third party software
9|Page
Acknowledgements
This benchmark exemplifies the great things a community of users, vendors, and subject matter
experts can accomplish through consensus collaboration. The CIS community thanks the entire
consensus team with special recognition to the following individuals who contributed greatly to
the creation of this guide:
Contributor
Cindy Spiess
Gavin Fitzpatrick
Amol Pathak
James Covington
John Martinez
Tim Sandage
Mike De Libero
Darwin Sanoy
Gregory Frascadore
Ionut Dragoi
John Robel
Brent Harrison
Mike Wicks
Aditi Sahasrabudhe
Jeremy Phillips
Ankit Rao
Steve Laino
Lawrence Sica
Bhushan Bhat
Nick Gibbon
Editor
Iben Rodriguez
Parag Patil
Pradeep R B
Gregory Carpenter
Maril Vernon
Paul Campbell
10 | P a g e
11 | P a g e
Recommendations
1 Identity and Access Management
This section contains recommendations for configuring identity and access management
related options.
12 | P a g e
1.1 Maintain current contact details (Manual)
Profile Applicability:
Level 1
Description:
Ensure contact email and telephone details for AWS accounts are current and map to more
than one individual in your organization.
An AWS account supports a number of contact details, and AWS will use these to contact
the account owner if activity judged to be in breach of Acceptable Use Policy or indicative
of likely security compromise is observed by the AWS Abuse team. Contact details should
not be for a single individual, as circumstances may arise where that individual is
unavailable. Email contact details should point to a mail alias which forwards email to
multiple individuals within the organization; where feasible, phone contact details should
point to a PABX hunt group or other call-forwarding system.
Rationale:
Audit:
This activity can only be performed via the AWS Console, with a user who has permission
to read and write Billing information (aws-portal:*Billing )
1. Sign in to the AWS Management Console and open the Billing and Cost Management
console at https://console.aws.amazon.com/billing/home#/.
2. On the navigation bar, choose your account name, and then choose My Account.
3. On the Account Settings page, review and verify the current details.
4. Under Contact Information, review and verify the current details.
13 | P a g e
Remediation:
This activity can only be performed via the AWS Console, with a user who has permission
to read and write Billing information (aws-portal:*Billing ).
1. Sign in to the AWS Management Console and open the Billing and Cost Management
console at https://console.aws.amazon.com/billing/home#/.
2. On the navigation bar, choose your account name, and then choose My Account.
3. On the Account Settings page, next to Account Settings, choose Edit.
4. Next to the field that you need to update, choose Edit.
5. After you have entered your changes, choose Save changes.
6. After you have made your changes, choose Done.
7. To edit your contact information, under Contact Information, choose Edit.
8. For the fields that you want to change, type your updated information, and then
choose Update.
References:
1. https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/manage-account-
payment.html#contact-info
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
14 | P a g e
1.2 Ensure security contact information is registered (Manual)
Profile Applicability:
Level 1
Description:
AWS provides customers with the option of specifying the contact information for
account's security team. It is recommended that this information be provided.
Rationale:
Specifying security-specific contact information will help ensure that security advisories
sent by AWS reach the team in your organization that is best equipped to respond to them.
Audit:
1. Click on your account name at the top right corner of the console
2. From the drop-down menu Click My Account
3. Scroll down to the Alternate Contacts section
4. Ensure contact information is specified in the Security section
Remediation:
1. Click on your account name at the top right corner of the console.
2. From the drop-down menu Click My Account
3. Scroll down to the Alternate Contacts section
4. Enter contact information in the Security section
Note: Consider specifying an internal email distribution list to ensure emails are regularly
monitored by more than one individual.
References:
1. CCE-79200-2
15 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
16 | P a g e
1.3 Ensure security questions are registered in the AWS account
(Manual)
Profile Applicability:
Level 1
Description:
The AWS support portal allows account owners to establish security questions that can be
used to authenticate individuals calling AWS customer service for support. It is
recommended that security questions be established.
Rationale:
When creating a new AWS account, a default super user is automatically created. This
account is referred to as the 'root user' or 'root' account. It is recommended that the use of
this account be limited and highly controlled. During events in which the 'root' password is
no longer accessible or the MFA token associated with 'root' is lost/destroyed it is possible,
through authentication using secret questions and associated answers, to recover 'root'
user login access.
Audit:
From Console:
Remediation:
From Console:
17 | P a g e
From the drop-down select an appropriate question
Click on the Answer section
Enter an appropriate answer
o Follow process for all 3 questions
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
18 | P a g e
1.4 Ensure no 'root' user account access key exists (Automated)
Profile Applicability:
Level 1
Description:
The 'root' user account is the most privileged user in an AWS account. AWS Access Keys
provide programmatic access to a given AWS account. It is recommended that all access
keys associated with the 'root' user account be removed.
Rationale:
Removing access keys associated with the 'root' user account limits vectors by which the
account can be compromised. Additionally, removing the 'root' access keys encourages the
creation and use of role based accounts that are least privileged.
Audit:
Perform the following to determine if the 'root' user account has access keys:
From Console:
If no 'root' access keys exist the output will show "AccountAccessKeysPresent": 0,.
If the output shows a "1" than 'root' keys exist, refer to the remediation procedure below.
Remediation:
Perform the following to delete or disable active 'root' user access keys
From Console:
19 | P a g e
1. Sign in to the AWS Management Console as 'root' and open the IAM console at
https://console.aws.amazon.com/iam/.
2. Click on <Root_Account_Name> at the top right and select My Security Credentials
from the drop down list
3. On the pop out screen Click on Continue to Security Credentials
4. Click on Access Keys (Access Key ID and Secret Access Key)
5. Under the Status column if there are any Keys which are Active
o Click on Make Inactive - (Temporarily disable Key - may be needed again)
o Click Delete - (Deleted keys cannot be recovered)
References:
1. http://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-
practices.html
2. http://docs.aws.amazon.com/general/latest/gr/managing-aws-access-keys.html
3. http://docs.aws.amazon.com/IAM/latest/APIReference/API_GetAccountSummary.
html
4. CCE-78910-7
5. https://aws.amazon.com/blogs/security/an-easier-way-to-determine-the-
presence-of-aws-account-access-keys/
Additional Information:
IAM User account "root" for us-gov cloud regions is not enabled by default. However, on
request to AWS support enables 'root' access only through access-keys (CLI, API methods)
for us-gov cloud region.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
20 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
secondary account for elevated activities. This account should only be used for
administrative activities and not internet browsing, email, or similar activities.
21 | P a g e
1.5 Ensure MFA is enabled for the 'root' user account (Automated)
Profile Applicability:
Level 1
Description:
The 'root' user account is the most privileged user in an AWS account. Multi-factor
Authentication (MFA) adds an extra layer of protection on top of a username and
password. With MFA enabled, when a user signs in to an AWS website, they will be
prompted for their username and password as well as for an authentication code from
their AWS MFA device.
Note: When virtual MFA is used for 'root' accounts, it is recommended that the device used
is NOT a personal device, but rather a dedicated mobile device (tablet or phone) that is
managed to be kept charged and secured independent of any individual personal devices.
("non-personal virtual MFA") This lessens the risks of losing access to the MFA due to
device loss, device trade-in or if the individual owning the device is no longer employed at
the company.
Rationale:
Enabling MFA provides increased security for console access as it requires the
authenticating principal to possess a device that emits a time-sensitive key and have
knowledge of a credential.
Audit:
Perform the following to determine if the 'root' user account has MFA setup:
From Command Line:
Remediation:
Perform the following to establish MFA for the 'root' user account:
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/iam/.
22 | P a g e
Note: to manage MFA devices for the 'root' AWS account, you must use your 'root' account
credentials to sign in to AWS. You cannot manage MFA devices for the 'root' account using
other credentials.
2. Choose Dashboard , and under Security Status , expand Activate MFA on your
root account.
3. Choose Activate MFA
4. In the wizard, choose A virtual MFA device and then choose Next Step .
5. IAM generates and displays configuration information for the virtual MFA device,
including a QR code graphic. The graphic is a representation of the 'secret
configuration key' that is available for manual entry on devices that do not support
QR codes.
6. Open your virtual MFA application. (For a list of apps that you can use for hosting
virtual MFA devices, see Virtual MFA Applications.) If the virtual MFA application
supports multiple accounts (multiple virtual MFA devices), choose the option to
create a new account (a new virtual MFA device).
7. Determine whether the MFA app supports QR codes, and then do one of the
following:
o Use the app to scan the QR code. For example, you might choose the camera
icon or choose an option similar to Scan code, and then use the device's
camera to scan the code.
o In the Manage MFA Device wizard, choose Show secret key for manual
configuration, and then type the secret configuration key into your MFA
application.
When you are finished, the virtual MFA device starts generating one-time passwords.
In the Manage MFA Device wizard, in the Authentication Code 1 box, type the one-time
password that currently appears in the virtual MFA device. Wait up to 30 seconds for the
device to generate a new one-time password. Then type the second one-time password into
the Authentication Code 2 box. Choose Active Virtual MFA.
References:
1. CCE-78911-5
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#id_root-
user_manage_mfa
3. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_vi
rtual.html#enable-virt-mfa-for-root
Additional Information:
IAM User account "root" for us-gov cloud regions does not have console access. This control
is not applicable for us-gov cloud regions.
23 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
24 | P a g e
1.6 Ensure hardware MFA is enabled for the 'root' user account
(Automated)
Profile Applicability:
Level 2
Description:
The 'root' user account is the most privileged user in an AWS account. MFA adds an extra
layer of protection on top of a user name and password. With MFA enabled, when a user
signs in to an AWS website, they will be prompted for their user name and password as
well as for an authentication code from their AWS MFA device. For Level 2, it is
recommended that the 'root' user account be protected with a hardware MFA.
Rationale:
A hardware MFA has a smaller attack surface than a virtual MFA. For example, a hardware
MFA does not suffer the attack surface introduced by the mobile smartphone on which a
virtual MFA resides.
Note: Using hardware MFA for many, many AWS accounts may create a logistical device
management issue. If this is the case, consider implementing this Level 2 recommendation
selectively to the highest security AWS accounts and the Level 1 recommendation applied
to the remaining accounts.
Audit:
Perform the following to determine if the 'root' user account has a hardware MFA setup:
1. Run the following command to determine if the 'root' account has MFA setup:
The AccountMFAEnabled property is set to 1 will ensure that the 'root' user account has
MFA (Virtual or Hardware) Enabled.
If AccountMFAEnabled property is set to 0 the account is not compliant with this
recommendation.
25 | P a g e
2. If AccountMFAEnabled property is set to 1, determine 'root' account has Hardware
MFA enabled.
Run the following command to list all virtual MFA devices:
If the output contains one MFA with the following Serial Number, it means the MFA is
virtual, not hardware and the account is not compliant with this recommendation:
"SerialNumber": "arn:aws:iam::_<aws_account_number>_:mfa/root-account-mfa-
device"
Remediation:
Perform the following to establish a hardware MFA for the 'root' user account:
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/iam/.
Note: to manage MFA devices for the AWS 'root' user account, you must use your
'root' account credentials to sign in to AWS. You cannot manage MFA devices for the
'root' account using other credentials.
2. Choose Dashboard , and under Security Status , expand Activate MFA on your
root account.
3. Choose Activate MFA
4. In the wizard, choose A hardware MFA device and then choose Next Step .
5. In the Serial Number box, enter the serial number that is found on the back of the
MFA device.
6. In the Authentication Code 1 box, enter the six-digit number displayed by the
MFA device. You might need to press the button on the front of the device to display
the number.
7. Wait 30 seconds while the device refreshes the code, and then enter the next six-
digit number into the Authentication Code 2 box. You might need to press the
button on the front of the device again to display the second number.
8. Choose Next Step . The MFA device is now associated with the AWS account. The
next time you use your AWS account credentials to sign in, you must type a code
from the hardware MFA device.
References:
1. CCE-78911-5
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_vi
rtual.html
3. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_p
hysical.html#enable-hw-mfa-for-root
26 | P a g e
Additional Information:
IAM User account 'root' for us-gov cloud regions does not have console access. This control
is not applicable for us-gov cloud regions.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
27 | P a g e
1.7 Eliminate use of the 'root' user for administrative and daily tasks
(Automated)
Profile Applicability:
Level 1
Description:
With the creation of an AWS account, a 'root user' is created that cannot be disabled or
deleted. That user has unrestricted access to and control over all resources in the AWS
account. It is highly recommended that the use of this account be avoided for everyday
tasks.
Rationale:
The 'root user' has unrestricted access to and control over all account resources. Use of it is
inconsistent with the principles of least privilege and separation of duties, and can lead to
unnecessary harm due to error or account compromise.
Audit:
From Console:
28 | P a g e
Note: There are a few conditions under which the use of the 'root' user account is required.
Please see the reference links for all of the tasks that require use of the 'root' user.
Remediation:
If you find that the 'root' user account is being used for daily activity to include
administrative tasks that do not require the 'root' user:
**Remember, anyone who has 'root' user credentials for your AWS account has
unrestricted access to and control of all the resources in your account, including billing
information.
References:
1. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html
3. https://docs.aws.amazon.com/general/latest/gr/aws_tasks-that-require-root.html
Additional Information:
The 'root' user for us-gov cloud regions is not enabled by default. However, on request to
AWS support, they can enable the 'root' user and grant access only through access-keys
(CLI, API methods) for us-gov cloud region. If the 'root' user for us-gov cloud regions is
enabled, this recommendation is applicable.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
29 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
secondary account for elevated activities. This account should only be used for
administrative activities and not internet browsing, email, or similar activities.
30 | P a g e
1.8 Ensure IAM password policy requires minimum length of 14 or
greater (Automated)
Profile Applicability:
Level 1
Description:
Password policies are, in part, used to enforce password complexity requirements. IAM
password policies can be used to ensure password are at least a given length. It is
recommended that the password policy require a minimum password length 14.
Rationale:
Setting a password complexity policy increases account resiliency against brute force login
attempts.
Audit:
Remediation:
31 | P a g e
3. Click on Account Settings on the Left Pane
4. Set "Minimum password length" to 14 or greater.
5. Click "Apply password policy"
References:
1. CCE-78907-3
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_ac
count-policy.html
3. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-
practices.html#configure-strong-password-policy
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
5 Account Management
Use processes and tools to assign and manage authorization to credentials for user
v8
accounts, including administrator accounts, as well as service accounts, to enterprise
assets and software.
32 | P a g e
1.9 Ensure IAM password policy prevents password reuse (Automated)
Profile Applicability:
Level 1
Description:
IAM password policies can prevent the reuse of a given password by the same user. It is
recommended that the password policy prevent the reuse of passwords.
Rationale:
Preventing password reuse increases account resiliency against brute force login attempts.
Audit:
Remediation:
33 | P a g e
From Command Line:
References:
1. CCE-78908-1
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_ac
count-policy.html
3. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-
practices.html#configure-strong-password-policy
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
34 | P a g e
1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM
users that have a console password (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Enabling MFA provides increased security for console access as it requires the
authenticating principal to possess a device that displays a time-sensitive key and have
knowledge of a credential.
Impact:
AWS will soon end support for SMS multi-factor authentication (MFA). New customers are
not allowed to use this feature. We recommend that existing customers switch to one of the
following alternative methods of MFA.
Audit:
Perform the following to determine if a MFA device is enabled for all IAM users having a
console password:
From Console:
35 | P a g e
From Command Line:
1. Run the following command (OSX/Linux/UNIX) to generate a list of all IAM users
along with their password and MFA status:
2. The output of this command will produce a table similar to the following:
user,password_enabled,mfa_active
elise,false,false
brandon,true,true
rakesh,false,false
helene,false,false
paras,true,true
anitha,false,false
3. For any column having password_enabled set to true , ensure mfa_active is also set
to true.
Remediation:
1. Sign in to the AWS Management Console and open the IAM console at
'https://console.aws.amazon.com/iam/'
2. In the left pane, select Users.
3. In the User Name list, choose the name of the intended MFA user.
4. Choose the Security Credentials tab, and then choose Manage MFA Device.
5. In the Manage MFA Device wizard, choose Virtual MFA device, and then choose
Continue.
IAM generates and displays configuration information for the virtual MFA device, including
a QR code graphic. The graphic is a representation of the 'secret configuration key' that is
available for manual entry on devices that do not support QR codes.
6. Open your virtual MFA application. (For a list of apps that you can use for hosting
virtual MFA devices, see Virtual MFA Applications at
https://aws.amazon.com/iam/details/mfa/#Virtual_MFA_Applications). If the
virtual MFA application supports multiple accounts (multiple virtual MFA devices),
choose the option to create a new account (a new virtual MFA device).
36 | P a g e
7. Determine whether the MFA app supports QR codes, and then do one of the
following:
Use the app to scan the QR code. For example, you might choose the camera icon or
choose an option similar to Scan code, and then use the device's camera to scan the
code.
In the Manage MFA Device wizard, choose Show secret key for manual
configuration, and then type the secret configuration key into your MFA application.
When you are finished, the virtual MFA device starts generating one-time passwords.
8. In the Manage MFA Device wizard, in the MFA Code 1 box, type the one-time
password that currently appears in the virtual MFA device. Wait up to 30 seconds for
the device to generate a new one-time password. Then type the second one-time
password into the MFA Code 2 box.
9. Click Assign MFA.
References:
1. https://tools.ietf.org/html/rfc6238
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa.html
3. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#enable-
mfa-for-privileged-users
4. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable_vi
rtual.html
5. CCE-78901-6
6. https://blogs.aws.amazon.com/security/post/Tx2SJJYE082KBUK/How-to-
Delegate-Management-of-Multi-Factor-Authentication-to-AWS-IAM-Users
Additional Information:
Amazon has published a pattern that forces users to self-service setup MFA before they
have access to their complete permissions set. Until they complete this step, they cannot
access their full permissions. This pattern can be used on new AWS accounts. It can also be
used on existing accounts - it is recommended users are given instructions and a grace
period to accomplish MFA enrollment before active enforcement on existing AWS accounts.
37 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
38 | P a g e
1.11 Do not setup access keys during initial user setup for all IAM users
that have a console password (Manual)
Profile Applicability:
Level 1
Description:
AWS console defaults to no check boxes selected when creating a new IAM user. When
cerating the IAM User credentials you have to determine what type of access they require.
Programmatic access: The IAM user might need to make API calls, use the AWS CLI, or use
the Tools for Windows PowerShell. In that case, create an access key (access key ID and a
secret access key) for that user.
AWS Management Console access: If the user needs to access the AWS Management
Console, create a password for the user.
Rationale:
Requiring the additional steps be taken by the user for programmatic access after their
profile has been created will give a stronger indication of intent that access keys are [a]
necessary for their work and [b] once the access key is established on an account that the
keys may be in use somewhere in the organization.
Note: Even if it is known the user will need access keys, require them to create the keys
themselves or put in a support ticket to have them created as a separate step from user
creation.
Audit:
Perform the following to determine if access keys were created upon user creation and are
being used and rotated as prescribed:
From Console:
39 | P a g e
Keys that were created at the same time as the user profile and do not have a last
used date should be deleted. Refer to the remediation below.
1. Run the following command (OSX/Linux/UNIX) to generate a list of all IAM users
along with their access keys utilization:
2. The output of this command will produce a table similar to the following:
user,password_enabled,access_key_1_active,access_key_1_last_used_date,access_
key_2_active,access_key_2_last_used_date
elise,false,true,2015-04-16T15:14:00+00:00,false,N/A
brandon,true,true,N/A,false,N/A
rakesh,false,false,N/A,false,N/A
helene,false,true,2015-11-18T17:47:00+00:00,false,N/A
paras,true,true,2016-08-28T12:04:00+00:00,true,2016-03-04T10:11:00+00:00
anitha,true,true,2016-06-08T11:43:00+00:00,true,N/A
Remediation:
Perform the following to delete access keys that do not pass the audit:
From Console:
Click on the X (Delete) for keys that were created at the same time as the user
profile but have not been used.
7. As an IAM User
Click on the X (Delete) for keys that were created at the same time as the user
profile but have not been used.
40 | P a g e
From Command Line:
References:
1. https://docs.aws.amazon.com/cli/latest/reference/iam/delete-access-key.html
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
41 | P a g e
1.12 Ensure credentials unused for 45 days or greater are disabled
(Automated)
Profile Applicability:
Level 1
Description:
AWS IAM users can access AWS resources using different types of credentials, such as
passwords or access keys. It is recommended that all credentials that have been unused in
45 or greater days be deactivated or removed.
Rationale:
Disabling or removing unnecessary credentials will reduce the window of opportunity for
credentials associated with a compromised or abandoned account to be used.
Audit:
9. Check and ensure that Access key age is less than 45 days and that Access key
last used does not say None
If the user hasn't signed into the Console in the last 45 days or Access keys are over 45 days
old refer to the remediation.
From Command Line:
Download Credential Report:
42 | P a g e
aws iam generate-credential-report
Remediation:
From Console:
Perform the following to manage Unused Password (IAM user console access)
43 | P a g e
6. Select any access keys that are over 45 days old and that have been used and
7. Select any access keys that are over 45 days old and that have not been used and
References:
1. CCE-78900-8
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#remove-
credentials
3. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_finding-
unused.html
4. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_ad
min-change-user.html
5. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-
keys.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
44 | P a g e
1.13 Ensure there is only one active access key available for any single
IAM user (Automated)
Profile Applicability:
Level 1
Description:
Access keys are long-term credentials for an IAM user or the AWS account 'root' user. You
can use access keys to sign programmatic requests to the AWS CLI or AWS API (directly or
using the AWS SDK)
Rationale:
Access keys are long-term credentials for an IAM user or the AWS account 'root' user. You
can use access keys to sign programmatic requests to the AWS CLI or AWS API. One of the
best ways to protect your account is to not allow users to have multiple access keys.
Audit:
From Console:
Repeat steps no. 3 – 5 for each IAM user in your AWS account.
1. Run list-users command to list all IAM users within your account:
The command output should return an array that contains all your IAM user names.
45 | P a g e
2. Run list-access-keys command using the IAM user name list to return the current
status of each access key associated with the selected IAM user:
3. Check the Status property value for each key returned to determine each keys
current state. If the Status property value for more than one IAM access key is set to
Active, the user access configuration does not adhere to this recommendation, refer
to the remediation below.
Repeat steps no. 2 and 3 for each IAM user in your AWS account.
Remediation:
From Console:
1. Using the IAM user and access key information provided in the Audit CLI, choose
one access key that is less than 90 days old. This should be the only active key used
by this IAM user to access AWS resources programmatically. Test your
application(s) to make sure that the chosen access key is working.
2. Run the update-access-key command below using the IAM user name and the non-
operational access key IDs to deactivate the unnecessary key(s). Refer to the Audit
section to identify the unnecessary access key ID for the selected IAM user
46 | P a g e
aws iam update-access-key --access-key-id <access-key-id> --status Inactive -
-user-name <user-name>
3. To confirm that the selected access key pair has been successfully deactivated run
the list-access-keys audit command again for that IAM User:
The command output should expose the metadata for each access key associated
with the IAM user. If the non-operational key pair(s) Status is set to Inactive, the
key has been successfully deactivated and the IAM user access configuration
adheres now to this recommendation.
4. Repeat steps no. 1 – 3 for each IAM user in your AWS account.
References:
1. https://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-
practices.html
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-
keys.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
5 Account Management
Use processes and tools to assign and manage authorization to credentials for
v8
user accounts, including administrator accounts, as well as service accounts, to
enterprise assets and software.
47 | P a g e
1.14 Ensure access keys are rotated every 90 days or less (Automated)
Profile Applicability:
Level 1
Description:
Access keys consist of an access key ID and secret access key, which are used to sign
programmatic requests that you make to AWS. AWS users need their own access keys to
make programmatic calls to AWS from the AWS Command Line Interface (AWS CLI), Tools
for Windows PowerShell, the AWS SDKs, or direct HTTP calls using the APIs for individual
AWS services. It is recommended that all access keys be regularly rotated.
Rationale:
Rotating access keys will reduce the window of opportunity for an access key that is
associated with a compromised or terminated account to be used.
Access keys should be rotated to ensure that data cannot be accessed with an old key which
might have been lost, cracked, or stolen.
Audit:
The access_key_1_last_rotated field in this file notes The date and time, in ISO 8601
date-time format, when the user's access key was created or last changed. If the user does
not have an active access key, the value in this field is N/A (not applicable).
48 | P a g e
Remediation:
1. While the first access key is still active, create a second access key, which is active by
default. Run the following command:
2. Update all applications and tools to use the new access key.
3. Determine whether the first access key is still in use by using this command:
4. One approach is to wait several days and then check the old access key for any use
before proceeding.
Even if step Step 3 indicates no use of the old key, it is recommended that you do not
immediately delete the first access key. Instead, change the state of the first access key to
Inactive using this command:
5. Use only the new access key to confirm that your applications are working. Any
applications and tools that still use the original access key will stop working at this
point because they no longer have access to AWS resources. If you find such an
application or tool, you can switch its state back to Active to reenable the first access
key. Then return to step Step 2 and update this application to use the new key.
49 | P a g e
6. After you wait some period of time to ensure that all applications and tools have
been updated, you can delete the first access key with this command:
References:
1. CCE-78902-4
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#rotate-
credentials
3. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_finding-
unused.html
4. https://docs.aws.amazon.com/general/latest/gr/managing-aws-access-keys.html
5. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-
keys.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
5 Account Management
Use processes and tools to assign and manage authorization to credentials for
v8
user accounts, including administrator accounts, as well as service accounts, to
enterprise assets and software.
50 | P a g e
1.15 Ensure IAM Users Receive Permissions Only Through Groups
(Automated)
Profile Applicability:
Level 1
Description:
IAM users are granted access to services, functions, and data through IAM policies. There
are three ways to define policies for a user: 1) Edit the user policy directly, aka an inline, or
user, policy; 2) attach a policy directly to a user; 3) add the user to an IAM group that has
an attached policy.
Rationale:
Assigning IAM policy only through groups unifies permissions management to a single,
flexible layer consistent with organizational functional roles. By unifying permissions
management, the likelihood of excessive permissions is reduced.
Audit:
Perform the following to determine if an inline policy is set or a policy is directly attached
to users:
2. For each user returned, run the following command to determine if any policies are
attached to them:
3. If any policies are returned, the user has an inline policy or direct policy attachment.
Remediation:
Perform the following to create an IAM group and assign a policy to it:
51 | P a g e
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/iam/.
2. In the navigation pane, click Groups and then click Create New Group .
3. In the Group Name box, type the name of the group and then click Next Step .
4. In the list of policies, select the check box for each policy that you want to apply to
all members of the group. Then click Next Step .
5. Click Create Group
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/iam/.
2. In the navigation pane, click Groups
3. Select the group to add a user to
4. Click Add Users To Group
5. Select the users to be added to the group
6. Click Add Users
Perform the following to remove a direct association between a user and policy:
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/iam/.
2. In the left navigation pane, click on Users
3. For each user:
o Select the user
o Click on the Permissions tab
o Expand Permissions policies
o Click X for each policy; then click Detach or Remove (depending on policy
type)
References:
1. http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
2. http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-
inline.html
3. CCE-78912-3
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
52 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
successfully carry out its assigned duties. Perform access control reviews of enterprise
assets to validate that all privileges are authorized, on a recurring schedule at a
minimum annually, or more frequently.
53 | P a g e
1.16 Ensure IAM policies that allow full "*:*" administrative privileges
are not attached (Automated)
Profile Applicability:
Level 1
Description:
IAM policies are the means by which privileges are granted to users, groups, or roles. It is
recommended and considered a standard security advice to grant least privilege -that is,
granting only the permissions required to perform a task. Determine what users need to do
and then craft policies for them that let the users perform only those tasks, instead of
allowing full administrative privileges.
Rationale:
It's more secure to start with a minimum set of permissions and grant additional
permissions as necessary, rather than starting with permissions that are too lenient and
then trying to tighten them later.
IAM policies that have a statement with "Effect": "Allow" with "Action": "*" over
"Resource": "*" should be removed.
Audit:
2. For each policy returned, run the following command to determine if any policies is
allowing full administrative privileges on the account:
54 | P a g e
3. In output ensure policy should not have any Statement block with "Effect":
"Allow" and Action set to "*" and Resource set to "*"
Remediation:
From Console:
Perform the following to detach the policy that has full administrative privileges:
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/iam/.
2. In the navigation pane, click Policies and then search for the policy name found in
the audit step.
3. Select the policy that needs to be deleted.
4. In the policy action menu, select first Detach
5. Select all Users, Groups, Roles that have this policy attached
6. Click Detach Policy
7. In the policy action menu, select Detach
1. Lists all IAM users, groups, and roles that the specified managed policy is attached
to.
References:
1. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-
inline.html
55 | P a g e
3. CCE-78912-3
4. https://docs.aws.amazon.com/cli/latest/reference/iam/index.html#cli-aws-iam
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
56 | P a g e
1.17 Ensure a support role has been created to manage incidents with
AWS Support (Automated)
Profile Applicability:
Level 1
Description:
AWS provides a support center that can be used for incident notification and response, as
well as technical support and customer services. Create an IAM Role to allow authorized
users to manage incidents with AWS Support.
Rationale:
By implementing least privilege for access control, an IAM Role will require an appropriate
IAM Policy to allow Support Center Access in order to manage Incidents with AWS Support.
Impact:
All AWS Support plans include an unlimited number of account and billing support cases,
with no long-term contracts. Support billing calculations are performed on a per-account
basis for all plans. Enterprise Support plan customers have the option to include multiple
enabled accounts in an aggregated monthly billing calculation. Monthly charges for the
Business and Enterprise support plans are based on each month's AWS usage charges,
subject to a monthly minimum, billed in advance.
Audit:
1. List IAM policies, filter for the 'AWSSupportAccess' managed policy, and note the
"Arn" element value:
57 | P a g e
3. In Output, Ensure PolicyRoles does not return empty. 'Example: Example:
PolicyRoles: [ ]'
Remediation:
Create a trust relationship policy document that allows <iam_user> to manage AWS
incidents, and save it locally as /tmp/TrustPolicy.json:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "<iam_user>"
},
"Action": "sts:AssumeRole"
}
]
}
References:
1. https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-
inline.html
2. https://aws.amazon.com/premiumsupport/pricing/
3. https://docs.aws.amazon.com/cli/latest/reference/iam/list-policies.html
4. https://docs.aws.amazon.com/cli/latest/reference/iam/attach-role-policy.html
5. https://docs.aws.amazon.com/cli/latest/reference/iam/list-entities-for-policy.html
58 | P a g e
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
59 | P a g e
1.18 Ensure IAM instance roles are used for AWS resource access from
instances (Manual)
Profile Applicability:
Level 2
Description:
AWS access from within AWS instances can be done by either encoding AWS keys into AWS
API calls or by assigning the instance to a role which has an appropriate permissions policy
for the required access. "AWS Access" means accessing the APIs of AWS in order to access
AWS resources or manage AWS account resources.
Rationale:
AWS IAM roles reduce the risks associated with sharing and rotating credentials that can
be used outside of AWS itself. If credentials are compromised, they can be used from
outside of the AWS account they give access to. In contrast, in order to leverage role
permissions an attacker would need to gain and maintain access to a specific instance to
use the privileges associated with it.
Additionally, if credentials are encoded into compiled applications or other hard to change
mechanisms, then they are even more unlikely to be properly rotated due to service
disruption risks. As time goes on, credentials that cannot be rotated are more likely to be
known by an increasing number of individuals who no longer work for the organization
owning the credentials.
Audit:
60 | P a g e
Where an Instance Contains Embedded Credentials:
On the instance that is known to perform AWS actions, audit all scripts and
environment variables to ensure that none of them contain AWS credentials.
Applications that run on an instance may also have credentials embedded. This is a
bad practice, but even worse if the source code is stored in a public code repository
such as github. When an application contains credentials can be determined by
eliminating all other sources of credentials and if the application can still access
AWS resources - it likely contains embedded credentials. Another method is to
examine all source code and configuration files of the application.
Remediation:
IAM roles can only be associated at the launch of an instance. To remediate an instance to
add it to a role you must create a new instance.
If the instance has no external dependencies on its current private ip or public addresses
are elastic IPs:
1. In AWS IAM create a new role. Assign a permissions policy if needed permissions
are already known.
2. In the AWS console launch a new instance with identical settings to the existing
instance, and ensure that the newly created role is selected.
3. Shutdown both the existing instance and the new instance.
4. Detach disks from both instances.
5. Attach the existing instance disks to the new instance.
6. Boot the new instance and you should have the same machine, but with the
associated role.
References:
1. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-
ec2.html
61 | P a g e
2. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-
ec2.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
62 | P a g e
1.19 Ensure that all the expired SSL/TLS certificates stored in AWS IAM
are removed (Automated)
Profile Applicability:
Level 1
Description:
To enable HTTPS connections to your website or application in AWS, you need an SSL/TLS
server certificate. You can use ACM or IAM to store and deploy server certificates. Use IAM
as a certificate manager only when you must support HTTPS connections in a region that is
not supported by ACM. IAM securely encrypts your private keys and stores the encrypted
version in IAM SSL certificate storage. IAM supports deploying server certificates in all
regions, but you must obtain your certificate from an external provider for use with AWS.
You cannot upload an ACM certificate to IAM. Additionally, you cannot manage your
certificates from the IAM Console.
Rationale:
Removing expired SSL/TLS certificates eliminates the risk that an invalid certificate will be
deployed accidentally to a resource such as AWS Elastic Load Balancer (ELB), which can
damage the credibility of the application/website behind the ELB. As a best practice, it is
recommended to delete expired certificates.
Impact:
Deleting the certificate could have implications for your application If you are using a
expired server certificate with Elastic Load Balancing, Cloudfront etc. . One has to make
configurations at respective services to ensure there is no interruption in application.
Audit:
From Console:
Getting the certificates expiration information via AWS Management Console is not
currently supported.
To request information about the SSL/TLS certificates stored in IAM via the AWS API use
the Command Line Interface (CLI).
From Command Line:
Run list-server-certificates command to list all the IAM-stored server certificates:
63 | P a g e
The command output should return an array that contains all the SSL/TLS certificates
currently stored in IAM and their metadata (name, ID, expiration date, etc):
{
"ServerCertificateMetadataList": [
{
"ServerCertificateId": "EHDGFRW7EJFYTE88D",
"ServerCertificateName": "MyServerCertificate",
"Expiration": "2018-07-10T23:59:59Z",
"Path": "/",
"Arn": "arn:aws:iam::012345678910:server-
certificate/MySSLCertificate",
"UploadDate": "2018-06-10T11:56:08Z"
}
]
}
Verify the ServerCertificateName and Expiration parameter value (expiration date) for
each SSL/TLS certificate returned by the list-server-certificates command and determine if
there are any expired server certificates currently stored in AWS IAM. If so, use the AWS
API to remove them.
If this command returns:
{ { "ServerCertificateMetadataList": [] }
This means that there are no expired certificates, It DOES NOT mean that no certificates
exist.
Remediation:
From Console:
Removing expired certificates via AWS Management Console is not currently supported. To
delete SSL/TLS certificates stored in IAM via the AWS API use the Command Line Interface
(CLI).
From Command Line:
To delete Expired Certificate run following command by replacing <CERTIFICATE_NAME>
with the name of the certificate to delete:
When the preceding command is successful, it does not return any output.
Default Value:
64 | P a g e
References:
1. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-
certs.html
2. https://docs.aws.amazon.com/cli/latest/reference/iam/delete-server-
certificate.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
v7 13 Data Protection
Data Protection
65 | P a g e
1.20 Ensure that IAM Access analyzer is enabled for all regions
(Automated)
Profile Applicability:
Level 1
Description:
Enable IAM Access analyzer for IAM policies about all resources in each region.
IAM Access Analyzer is a technology introduced at AWS reinvent 2019. After the Analyzer
is enabled in IAM, scan results are displayed on the console showing the accessible
resources. Scans show resources that other accounts and federated users can access, such
as KMS keys and IAM roles. So the results allow you to determine if an unintended user is
allowed, making it easier for administrators to monitor least privileges access. Access
Analyzer analyzes only policies that are applied to resources in the same AWS Region.
Rationale:
AWS IAM Access Analyzer helps you identify the resources in your organization and
accounts, such as Amazon S3 buckets or IAM roles, that are shared with an external entity.
This lets you identify unintended access to your resources and data. Access Analyzer
identifies resources that are shared with external principals by using logic-based reasoning
to analyze the resource-based policies in your AWS environment. IAM Access Analyzer
continuously monitors all policies for S3 bucket, IAM roles, KMS(Key Management Service)
keys, AWS Lambda functions, and Amazon SQS(Simple Queue Service) queues.
Audit:
From Console:
66 | P a g e
aws accessanalyzer list-analyzers | grep status
If an Access analyzer is not listed for each region or the status is not set to active refer to
the remediation procedure below.
Remediation:
From Console:
Perform the following to enable IAM Access analyzer for IAM policies:
References:
1. https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-
started.html
3. https://docs.aws.amazon.com/cli/latest/reference/accessanalyzer/get-
analyzer.html
4. https://docs.aws.amazon.com/cli/latest/reference/accessanalyzer/create-
analyzer.html
67 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
68 | P a g e
1.21 Ensure IAM users are managed centrally via identity federation or
AWS Organizations for multi-account environments (Manual)
Profile Applicability:
Level 2
Description:
Rationale:
Centralizing IAM user management to a single identity store reduces complexity and thus
the likelihood of access management errors.
Audit:
1. Determine the master account for identity federation or IAM user management
2. Login to that account through the AWS Management Console
3. Click Services
4. Click IAM
5. Click Identity providers
6. Verify the configuration
Then..., determine all accounts that should not have local users present. For each account...
1. Determine all accounts that should not have local users present
2. Log into the AWS Management Console
3. Switch role into each identified account
4. Click Services
5. Click IAM
6. Click Users
7. Confirm that no IAM users representing individuals are present
1. Determine all accounts that should not have local users present
69 | P a g e
2. Log into the AWS Management Console
3. Switch role into each identified account
4. Click Services
5. Click IAM
6. Click Users
7. Confirm that no IAM users representing individuals are present
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
70 | P a g e
2 Storage
This section contains recommendations for configuring AWS Storage.
71 | P a g e
2.1 Simple Storage Service (S3)
This section contains recommendations for configuring AWS Simple Storage Service (S3)
Buckets
72 | P a g e
2.1.1 Ensure all S3 buckets employ encryption-at-rest (Manual)
Profile Applicability:
Level 2
Description:
Amazon S3 provides a variety of no, or low, cost encryption options to protect data at rest.
Rationale:
Encrypting data at rest reduces the likelihood that it is unintentionally exposed and can
nullify the impact of disclosure if the encryption remains unbroken.
Impact:
Amazon S3 buckets with default bucket encryption using SSE-KMS cannot be used as
destination buckets for Amazon S3 server access logging. Only SSE-S3 default encryption is
supported for server access log destination buckets.
Audit:
From Console:
1. Login to AWS Management Console and open the Amazon S3 console using
https://console.aws.amazon.com/s3/
2. Select the Check box next to the Bucket.
3. Click on 'Properties'.
4. Verify that Default Encryption displays either AES-256 or AWS-KMS.
5. Repeat for all the buckets in your AWS account.
aws s3 ls
73 | P a g e
3. Verify that either
"SSEAlgorithm": "AES256"
or
"SSEAlgorithm": "aws:kms"```
is displayed.
Remediation:
From Console:
1. Login to AWS Management Console and open the Amazon S3 console using
https://console.aws.amazon.com/s3/
2. Select the Check box next to the Bucket.
3. Click on 'Properties'.
4. Click on Default Encryption.
5. Select either AES-256 or AWS-KMS
6. Click Save
7. Repeat for all the buckets in your AWS account lacking encryption.
or
Note: the KMSMasterKeyID can be set to the master key of your choosing; aws/s3 is an
AWS preconfigured default.
References:
1. https://docs.aws.amazon.com/AmazonS3/latest/user-guide/default-bucket-
encryption.html
2. https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-
encryption.html#bucket-encryption-related-resources
74 | P a g e
Additional Information:
S3 bucket encryption only applies to objects as they are placed in the bucket. Enabling S3
bucket encryption does not encrypt objects previously stored within the bucket.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
75 | P a g e
2.1.2 Ensure S3 Bucket Policy is set to deny HTTP requests (Manual)
Profile Applicability:
Level 2
Description:
At the Amazon S3 bucket level, you can configure permissions through a bucket policy
making the objects accessible only through HTTPS.
Rationale:
By default, Amazon S3 allows both HTTP and HTTPS requests. To achieve only allowing
access to Amazon S3 objects through HTTPS you also have to explicitly deny access to
HTTP requests. Bucket policies that allow HTTPS requests without explicitly denying HTTP
requests will not comply with this recommendation.
Audit:
To allow access to HTTPS you can use a condition that checks for the key
"aws:SecureTransport: true". This means that the request is sent through HTTPS but
that HTTP can still be used. So to make sure you do not allow HTTP access confirm that
there is a bucket policy that explicitly denies access for HTTP requests and that it contains
the key "aws:SecureTransport": "false".
From Console:
1. Login to AWS Management Console and open the Amazon S3 console using
https://console.aws.amazon.com/s3/
2. Select the Check box next to the Bucket.
3. Click on 'Permissions', then Click on Bucket Policy.
4. Ensure that a policy is listed that matches:
'{
"Sid": <optional>,
"Effect": "Deny",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::<bucket_name>/*",
"Condition": {
"Bool": {
"aws:SecureTransport": "false"
}'
76 | P a g e
5. Repeat for all the buckets in your AWS account.
aws s3 ls
Remediation:
From Console:
1. Login to AWS Management Console and open the Amazon S3 console using
https://console.aws.amazon.com/s3/
2. Select the Check box next to the Bucket.
3. Click on 'Permissions'.
4. Click 'Bucket Policy'
5. Add this to the existing policy filling in the required information
{
"Sid": <optional>",
"Effect": "Deny",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::<bucket_name>/*",
"Condition": {
"Bool": {
"aws:SecureTransport": "false"
}
}
}
6. Save
7. Repeat for all the buckets in your AWS account that contain sensitive data.
77 | P a g e
From Console
using AWS Policy Generator:
{
"Sid": <optional>",
"Effect": "Deny",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::<bucket_name>/*",
"Condition": {
"Bool": {
"aws:SecureTransport": "false"
}
}
}
References:
1. https://aws.amazon.com/premiumsupport/knowledge-center/s3-bucket-policy-
for-config-rule/
78 | P a g e
2. https://aws.amazon.com/blogs/security/how-to-use-bucket-policies-and-apply-
defense-in-depth-to-help-secure-your-amazon-s3-data/
3. https://awscli.amazonaws.com/v2/documentation/api/latest/reference/s3api/get
-bucket-policy.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
79 | P a g e
2.1.3 Ensure MFA Delete is enable on S3 buckets (Automated)
Profile Applicability:
Level 1
Description:
Once MFA Delete is enabled on your sensitive and classified S3 bucket it requires the user
to have two forms of authentication.
Rationale:
Adding MFA delete to an S3 bucket, requires additional authentication when you change
the version state of your bucket or you delete and object version adding another layer of
security in the event your security credentials are compromised or unauthorized access is
granted.
Audit:
Output example:
<VersioningConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Status>Enabled</Status>
<MfaDelete>Enabled</MfaDelete>
</VersioningConfiguration>
If the Console or the CLI output does not show Versioning and MFA Delete enabled refer to
the remediation below.
80 | P a g e
Remediation:
References:
1. https://docs.aws.amazon.com/AmazonS3/latest/dev/Versioning.html#MultiFactor
AuthenticationDelete
2. https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingMFADelete.html
3. https://aws.amazon.com/blogs/security/securing-access-to-aws-using-mfa-part-3/
4. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_lost-or-
broken.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
81 | P a g e
2.1.4 Ensure all data in Amazon S3 has been discovered, classified and
secured when required. (Manual)
Profile Applicability:
Level 2
Description:
Amazon S3 buckets can contain sensitive data, that for security purposes should be
discovered, monitored, classified and protected. Macie along with other 3rd party tools can
automatically provide an inventory of Amazon S3 buckets.
Rationale:
Using a Cloud service or 3rd Party software to continuously monitor and automate the
process of data discovery and classification for S3 buckets using machine learning and
pattern matching is a strong defense in protecting that information.
Amazon Macie is a fully managed data security and data privacy service that uses machine
learning and pattern matching to discover and protect your sensitive data in AWS.
Impact:
There is a cost associated with using Amazon Macie. There is also typically a cost
associated with 3rd Party tools that perform similar processes and protection.
Audit:
When you log into the Macie console if you aren't taken to the summary page and you don't
have a job setup and running then refer to the remediation procedure below.
If you are using a 3rd Party tool to manage and protect your s3 data you meet this
recommendation.
82 | P a g e
Remediation:
1. In the left pane, click S3 buckets. Macie displays a list of all the S3 buckets for your
account.
2. Select the check box for each bucket that you want Macie to analyze as part of the
job
3. Click Create job.
4. Click Quick create.
5. For the Name and description step, enter a name and, optionally, a description of the
job.
6. Then click Next.
7. For the Review and create step, click Submit.
If you are using a 3rd Party tool to manage and protect your s3 data, follow the Vendor
documentation for implementing and configuring that tool.
83 | P a g e
References:
1. https://aws.amazon.com/macie/getting-started/
2. https://docs.aws.amazon.com/workspaces/latest/adminguide/data-
protection.html
3. https://docs.aws.amazon.com/macie/latest/user/data-classification.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
84 | P a g e
2.1.5 Ensure that S3 Buckets are configured with 'Block public access
(bucket settings)' (Automated)
Profile Applicability:
Level 1
Description:
Amazon S3 provides Block public access (bucket settings) and Block public access
(account settings) to help you manage public access to Amazon S3 resources. By default,
S3 buckets and objects are created with public access disabled. However, an IAM principal
with sufficient S3 permissions can enable public access at the bucket and/or object level.
While enabled, Block public access (bucket settings) prevents an individual bucket,
and its contained objects, from becoming publicly accessible. Similarly, Block public
access (account settings) prevents all buckets, and contained objects, from becoming
publicly accessible across the entire account.
Rationale:
Whether blocking public access to all or some buckets is an organizational decision that
should be based on data sensitivity, least privilege, and use case.
Impact:
When you apply Block Public Access settings to an account, the settings apply to all AWS
Regions globally. The settings might not take effect in all Regions immediately or
simultaneously, but they eventually propagate to all Regions.
Audit:
1. Login to AWS Management Console and open the Amazon S3 console using
https://console.aws.amazon.com/s3/
85 | P a g e
2. Select the Check box next to the Bucket.
3. Click on 'Edit public access settings'.
4. Ensure that block public access settings are set appropriately for this bucket
5. Repeat for all the buckets in your AWS account.
aws s3 ls
{
"PublicAccessBlockConfiguration": {
"BlockPublicAcls": true,
"IgnorePublicAcls": true,
"BlockPublicPolicy": true,
"RestrictPublicBuckets": true
}
}
If the output reads false for the separate configuration settings then proceed to the
remediation.
If utilizing Block Public Access (account settings)
From Console:
1. Login to AWS Management Console and open the Amazon S3 console using
https://console.aws.amazon.com/s3/
2. Choose Block public access (account settings)
3. Ensure that block public access settings are set appropriately for your AWS account.
{
"PublicAccessBlockConfiguration": {
"IgnorePublicAcls": true,
"BlockPublicPolicy": true,
"BlockPublicAcls": true,
86 | P a g e
"RestrictPublicBuckets": true
}
}
If the output reads false for the separate configuration settings then proceed to the
remediation.
Remediation:
1. Login to AWS Management Console and open the Amazon S3 console using
https://console.aws.amazon.com/s3/
2. Select the Check box next to the Bucket.
3. Click on 'Edit public access settings'.
4. Click 'Block all public access'
5. Repeat for all the buckets in your AWS account that contain sensitive data.
aws s3 ls
1. Login to AWS Management Console and open the Amazon S3 console using
https://console.aws.amazon.com/s3/
2. Choose Block Public Access (account settings)
3. Choose Edit to change the block public access settings for all the buckets in your
AWS account
4. Choose the settings you want to change, and then choose Save. For details about
each setting, pause on the i icons.
5. When you're asked for confirmation, enter confirm. Then Click Confirm to save your
changes.
87 | P a g e
From Command Line:
To set Block Public access settings for this account, run the following command:
References:
1. https://docs.aws.amazon.com/AmazonS3/latest/user-guide/block-public-access-
account.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
88 | P a g e
2.2 Elastic Compute Cloud (EC2)
This section contains recommendations for configuring AWS Elastic Compute Cloud (EC2)
89 | P a g e
2.2.1 Ensure EBS volume encryption is enabled (Manual)
Profile Applicability:
Level 1
Description:
Elastic Compute Cloud (EC2) supports encryption at rest when using the Elastic Block Store
(EBS) service. While disabled by default, forcing encryption at EBS volume creation is
supported.
Rationale:
Encrypting data at rest reduces the likelihood that it is unintentionally exposed and can
nullify the impact of disclosure if the encryption remains unbroken.
Audit:
From Console:
1. Login to AWS Management Console and open the Amazon EC2 console using
https://console.aws.amazon.com/ec2/
2. Under Account attributes, click EBS encryption.
3. Verify Always encrypt new EBS volumes displays Enabled.
4. Review every region in-use.
1. Run
Remediation:
From Console:
1. Login to AWS Management Console and open the Amazon EC2 console using
https://console.aws.amazon.com/ec2/
90 | P a g e
2. Under Account attributes, click EBS encryption.
3. Click Manage.
4. Click the Enable checkbox.
5. Click Update EBS encryption
6. Repeat for every region requiring the change.
1. Run
References:
1. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
2. https://aws.amazon.com/blogs/aws/new-opt-in-to-default-encryption-for-new-
ebs-volumes/
Additional Information:
Default EBS volume encryption only applies to newly created EBS volumes. Existing EBS
volumes are not converted automatically.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
91 | P a g e
2.3 Relational Database Service (RDS)
This section contains recommendations for configuring AWS Relational Database Services
(RDS)
92 | P a g e
2.3.1 Ensure that encryption is enabled for RDS Instances (Automated)
Profile Applicability:
Level 1
Description:
Amazon RDS encrypted DB instances use the industry standard AES-256 encryption
algorithm to encrypt your data on the server that hosts your Amazon RDS DB instances.
After your data is encrypted, Amazon RDS handles authentication of access and decryption
of your data transparently with a minimal impact on performance.
Rationale:
Databases are likely to hold sensitive and critical data, it is highly recommended to
implement encryption in order to protect your data from unauthorized access or
disclosure. With RDS encryption enabled, the data stored on the instance's underlying
storage, the automated backups, read replicas, and snapshots, are all encrypted.
Audit:
From Console:
1. Login to the AWS Management Console and open the RDS dashboard at
https://console.aws.amazon.com/rds/
2. In the navigation pane, under RDS dashboard, click Databases.
3. Select the RDS Instance that you want to examine
4. Click Instance Name to see details, then click on Configuration tab.
5. Under Configuration Details section, In Storage pane search for the Encryption
Enabled Status.
6. If the current status is set to Disabled, Encryption is not enabled for the selected
RDS Instance database instance.
7. Repeat steps 3 to 7 to verify encryption status of other RDS Instance in same region.
8. Change region from the top of the navigation bar and repeat audit for other regions.
93 | P a g e
2. Run again describe-db-instances command using the RDS Instance identifier
returned earlier, to determine if the selected database instance is encrypted, The
command output should return the encryption status True Or False.
3. If the StorageEncrypted parameter value is False, Encryption is not enabled for the
selected RDS database instance.
4. Repeat steps 1 to 3 for auditing each RDS Instance and change Region to verify for
other regions
Remediation:
From Console:
1. Login to the AWS Management Console and open the RDS dashboard at
https://console.aws.amazon.com/rds/.
2. In the left navigation panel, click on Databases
3. Select the Database instance that needs to encrypt.
4. Click on Actions button placed at the top right and select Take Snapshot.
5. On the Take Snapshot page, enter a database name of which you want to take a
snapshot in the Snapshot Name field and click on Take Snapshot.
6. Select the newly created snapshot and click on the Action button placed at the top
right and select Copy snapshot from the Action menu.
7. On the Make Copy of DB Snapshot page, perform the following:
In the New DB Snapshot Identifier field, Enter a name for the new snapshot.
Check Copy Tags, New snapshot must have the same tags as the source snapshot.
Select Yes from the Enable Encryption dropdown list to enable encryption, You can
choose to use the AWS default encryption key or custom key from Master Key
dropdown list.
8. Click Copy Snapshot to create an encrypted copy of the selected instance snapshot.
9. Select the new Snapshot Encrypted Copy and click on the Action button placed at
the top right and select Restore Snapshot button from the Action menu, This will
restore the encrypted snapshot to a new database instance.
10. On the Restore DB Instance page, enter a unique name for the new database
instance in the DB Instance Identifier field.
11. Review the instance configuration details and click Restore DB Instance.
12. As the new instance provisioning process is completed can update application
configuration to refer to the endpoint of the new Encrypted database instance Once
the database endpoint is changed at the application level, can remove the
unencrypted instance.
94 | P a g e
From Command Line:
3. Now run list-aliases command to list the KMS keys aliases available in a specified
region, The command output should return each key alias currently available.
For our RDS encryption activation process, locate the ID of the AWS default KMS
key.
4. Run copy-db-snapshot command using the default KMS key ID for RDS instances
returned earlier to create an encrypted copy of the database instance snapshot, The
command output will return the encrypted instance snapshot configuration.
95 | P a g e
7. Run again describe-db-instances command using the RDS instance identifier
returned earlier, to determine if the selected database instance is encrypted, The
command output should return the encryption status True.
References:
1. https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption
.html
2. https://aws.amazon.com/blogs/database/selecting-the-right-encryption-options-
for-amazon-rds-and-amazon-aurora-database-
engines/#:~:text=With%20RDS%2Dencrypted%20resources%2C%20data,transpa
rent%20to%20your%20database%20engine.
3. https://aws.amazon.com/rds/features/security/
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
96 | P a g e
3 Logging
This section contains recommendations for configuring AWS logging features.
97 | P a g e
3.1 Ensure CloudTrail is enabled in all regions (Automated)
Profile Applicability:
Level 1
Description:
AWS CloudTrail is a web service that records AWS API calls for your account and delivers
log files to you. The recorded information includes the identity of the API caller, the time of
the API call, the source IP address of the API caller, the request parameters, and the
response elements returned by the AWS service. CloudTrail provides a history of AWS API
calls for an account, including API calls made via the Management Console, SDKs, command
line tools, and higher-level AWS services (such as CloudFormation).
Rationale:
The AWS API call history produced by CloudTrail enables security analysis, resource
change tracking, and compliance auditing. Additionally,
ensuring that a multi-regions trail exists will ensure that unexpected activity
occurring in otherwise unused regions is detected
ensuring that a multi-regions trail exists will ensure that Global Service Logging
is enabled for a trail by default to capture recording of events generated on AWS
global services
for a multi-regions trail, ensuring that management events configured for all type of
Read/Writes ensures recording of management operations that are performed on
all resources in an AWS account
Impact:
S3 lifecycle features can be used to manage the accumulation and management of logs over
time. See the following AWS resource for more information on these features:
1. https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lifecycle-mgmt.html
Audit:
1. Sign in to the AWS Management Console and open the CloudTrail console at
https://console.aws.amazon.com/cloudtrail
2. Click on Trails on the left navigation pane
98 | P a g e
You will be presented with a list of trails across all regions
3. Ensure at least one Trail has All specified in the Region column
4. Click on a trail via the link in the Name column
5. Ensure Logging is set to ON
6. Ensure Apply trail to all regions is set to Yes
7. In section Management Events ensure Read/Write Events set to ALL
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
Remediation:
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/cloudtrail
2. Click on Trails on the left navigation pane
3. Click Get Started Now , if presented
4. If 1 or more trails already exist, select the target trail to enable for global logging
5. Click the edit icon (pencil) next to Apply trail to all regions , Click Yes and
Click Save.
6. Click the edit icon (pencil) next to Management Events click All for setting
Read/Write Events and Click Save.
99 | P a g e
From Command Line:
Note: Creating CloudTrail via CLI without providing any overriding options configures
Management Events to set All type of Read/Writes by default.
Default Value:
Not Enabled
References:
1. CCE-78913-1
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-
concepts.html#cloudtrail-concepts-management-events
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-
management-and-data-events-with-
cloudtrail.html?icmpid=docs_cloudtrail_console#logging-management-events
4. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-
supported-services.html#cloud-trail-supported-services-data-events
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
100 | P a g e
3.2 Ensure CloudTrail log file validation is enabled (Automated)
Profile Applicability:
Level 2
Description:
CloudTrail log file validation creates a digitally signed digest file containing a hash of each
log that CloudTrail writes to S3. These digest files can be used to determine whether a log
file was changed, deleted, or unchanged after CloudTrail delivered the log. It is
recommended that file validation be enabled on all CloudTrails.
Rationale:
Enabling log file validation will provide additional integrity checking of CloudTrail logs.
Audit:
Perform the following on each trail to determine if log file validation is enabled:
From Console:
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/cloudtrail
2. Click on Trails on the left navigation pane
3. For Every Trail:
Remediation:
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/cloudtrail
2. Click on Trails on the left navigation pane
3. Click on target trail
101 | P a g e
4. Within the S3 section click on the edit icon (pencil)
5. Click Advanced
6. Click on the Yes radio button in section Enable log file validation
7. Click Save
Note that periodic validation of logs using these digests can be performed by running the
following command:
Default Value:
Not Enabled
References:
1. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-log-file-
validation-enabling.html
2. CCE-78914-9
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
102 | P a g e
3.3 Ensure the S3 bucket used to store CloudTrail logs is not publicly
accessible (Automated)
Profile Applicability:
Level 1
Description:
CloudTrail logs a record of every API call made in your AWS account. These logs file are
stored in an S3 bucket. It is recommended that the bucket policy or access control list (ACL)
applied to the S3 bucket that CloudTrail logs to prevent public access to the CloudTrail logs.
Rationale:
Allowing public access to CloudTrail log content may aid an adversary in identifying
weaknesses in the affected account's use or configuration.
Audit:
Perform the following to determine if any public access is granted to an S3 bucket via an
ACL or S3 bucket policy:
From Console:
103 | P a g e
2. Ensure the AllUsers principal is not granted privileges to that <bucket> :
5. Ensure the policy does not contain a Statement having an Effect set to Allow and a
Principal set to "*" or {"AWS" : "*"}
Remediation:
Perform the following to remove any public access that has been granted to the bucket via
an ACL or S3 bucket policy:
Default Value:
References:
1. CCE-78915-6
104 | P a g e
2. https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_
principal.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
105 | P a g e
3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs
(Automated)
Profile Applicability:
Level 1
Description:
AWS CloudTrail is a web service that records AWS API calls made in a given AWS account.
The recorded information includes the identity of the API caller, the time of the API call, the
source IP address of the API caller, the request parameters, and the response elements
returned by the AWS service. CloudTrail uses Amazon S3 for log file storage and delivery,
so log files are stored durably. In addition to capturing CloudTrail logs within a specified S3
bucket for long term analysis, realtime analysis can be performed by configuring CloudTrail
to send logs to CloudWatch Logs. For a trail that is enabled in all regions in an account,
CloudTrail sends log files from all those regions to a CloudWatch Logs log group. It is
recommended that CloudTrail logs be sent to CloudWatch Logs.
Note: The intent of this recommendation is to ensure AWS account activity is being
captured, monitored, and appropriately alarmed on. CloudWatch Logs is a native way to
accomplish this using AWS services but does not preclude the use of an alternate solution.
Rationale:
Sending CloudTrail logs to CloudWatch Logs will facilitate real-time and historic activity
logging based on user, API, resource, and IP address, and provides opportunity to establish
alarms and notifications for anomalous or sensitivity account activity.
Impact:
Note: By default, CloudWatch Logs will store Logs indefinitely unless a specific retention
period is defined for the log group. When choosing the number of days to retain, keep in
mind the average days it takes an organization to realize they have been breached is 210
days (at the time of this writing). Since additional time is required to research a breach, a
minimum 365 day retention policy allows time for detection and research. You may also
wish to archive the logs to a cheaper storage service rather than simply deleting them. See
the following AWS resource to manage CloudWatch Logs retention periods:
1. https://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/Setting
LogRetention.html
106 | P a g e
Audit:
2. Ensure CloudWatchLogsLogGroupArn is not empty and note the value of the Name
property.
3. Using the noted value of the Name property, run the following command:
If the CloudWatch Logs log group is not setup and the delivery time is not recent refer to
the remediation below.
Remediation:
References:
1. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-user-
guide.html
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/how-cloudtrail-
works.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-aws-
service-specific-topics.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
108 | P a g e
3.5 Ensure AWS Config is enabled in all regions (Automated)
Profile Applicability:
Level 2
Description:
AWS Config is a web service that performs configuration management of supported AWS
resources within your account and delivers log files to you. The recorded information
includes the configuration item (AWS resource), relationships between configuration items
(AWS resources), any configuration changes between resources. It is recommended AWS
Config be enabled in all regions.
Rationale:
The AWS configuration item history captured by AWS Config enables security analysis,
resource change tracking, and compliance auditing.
Impact:
Audit:
1. Sign in to the AWS Management Console and open the AWS Config console at
https://console.aws.amazon.com/config/.
2. On the top right of the console select target Region.
3. If presented with Setup AWS Config - follow remediation procedure:
4. On the Resource inventory page, Click on edit (the gear icon). The Set Up AWS
Config page appears.
5. Ensure 1 or both check-boxes under "All Resources" is checked.
109 | P a g e
From Command Line:
1. Run this command to show all AWS Config recorders and their properties:
2. Evaluate the output to ensure that there's at least one recorder for which
recordingGroup object includes "allSupported": true AND
"includeGlobalResourceTypes": true
{
"ConfigurationRecorders": [
{
"recordingGroup": {
"allSupported": true,
"resourceTypes": [],
"includeGlobalResourceTypes": true
},
"roleARN": "arn:aws:iam::<AWS_Account_ID>:role/service-
role/<config-role-name>",
"name": "default"
}
]
}
3. Run this command to show the status for all AWS Config recorders:
4. In the output, find recorders with name key matching the recorders that met criteria
in step 2. Ensure that at least one of them includes "recording": true and
"lastStatus": "SUCCESS"
Remediation:
1. Select the region you want to focus on in the top right of the console
2. Click Services
3. Click Config
4. Define which resources you want to record in the selected region
5. Choose to include global resources (IAM resources)
110 | P a g e
6. Specify an S3 bucket in the same account or in another managed AWS account
7. Create an SNS Topic from the same AWS account or another managed AWS account
1. Ensure there is an appropriate S3 bucket, SNS topic, and IAM role per the AWS
Config Service prerequisites.
2. Run this command to set up the configuration recorder
References:
1. CCE-78917-2
2. https://docs.aws.amazon.com/cli/latest/reference/configservice/describe-
configuration-recorder-status.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
111 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
112 | P a g e
3.6 Ensure S3 bucket access logging is enabled on the CloudTrail S3
bucket (Automated)
Profile Applicability:
Level 1
Description:
S3 Bucket Access Logging generates a log that contains access records for each request
made to your S3 bucket. An access log record contains details about the request, such as the
request type, the resources specified in the request worked, and the time and date the
request was processed. It is recommended that bucket access logging be enabled on the
CloudTrail S3 bucket.
Rationale:
Audit:
Perform the following ensure the CloudTrail S3 bucket has access logging is enabled:
From Console:
113 | P a g e
2. Ensure Bucket Logging is enabled:
{
"LoggingEnabled": {
"TargetPrefix": "<Prefix_Test>",
"TargetBucket": "<Bucket_name_for_Storing_Logs>"
}
}
Remediation:
Default Value:
Logging is disabled.
References:
1. CCE-78918-0
2. https://docs.aws.amazon.com/AmazonS3/latest/dev/ServerLogs.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
114 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
115 | P a g e
3.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
(Automated)
Profile Applicability:
Level 2
Description:
AWS CloudTrail is a web service that records AWS API calls for an account and makes those
logs available to users and resources in accordance with IAM policies. AWS Key
Management Service (KMS) is a managed service that helps create and control the
encryption keys used to encrypt account data, and uses Hardware Security Modules
(HSMs) to protect the security of encryption keys. CloudTrail logs can be configured to
leverage server side encryption (SSE) and KMS customer created master keys (CMK) to
further protect CloudTrail logs. It is recommended that CloudTrail be configured to use
SSE-KMS.
Rationale:
Impact:
Audit:
1. Sign in to the AWS Management Console and open the CloudTrail console at
https://console.aws.amazon.com/cloudtrail
2. In the left navigation pane, choose Trails .
3. Select a Trail
4. Under the S3 section, ensure Encrypt log files is set to Yes and a KMS key ID is
specified in the KSM Key Id field.
116 | P a g e
From Command Line:
2. For each trail listed, SSE-KMS is enabled if the trail has a KmsKeyId property defined.
Remediation:
1. Sign in to the AWS Management Console and open the CloudTrail console at
https://console.aws.amazon.com/cloudtrail
2. In the left navigation pane, choose Trails .
3. Click on a Trail
4. Under the S3 section click on the edit button (pencil icon)
5. Click Advanced
6. Select an existing CMK from the KMS key Id drop-down menu
Note: Ensure the CMK is located in the same region as the S3 bucket
Note: You will need to apply a KMS Key policy on the selected CMK in order for
CloudTrail as a service to encrypt and decrypt log files using the CMK provided.
Steps are provided here for editing the selected CMK Key policy
7. Click Save
8. You will see a notification message stating that you need to have decrypt
permissions on the specified KMS key to decrypt log files.
9. Click Yes
References:
1. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/encrypting-
cloudtrail-log-files-with-aws-kms.html
2. https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html
3. CCE-78919-8
117 | P a g e
Additional Information:
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "kms:DescribeKey",
"Resource": "*"
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "kms:GenerateDataKey*",
"Resource": "*",
"Condition": {
"StringLike": {
"kms:EncryptionContext:aws:cloudtrail:arn": [
"arn:aws:cloudtrail:*:aws-account-id:trail/*"
118 | P a g e
}
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::aws-account-id:user/username"
},
"Action": "kms:Decrypt",
"Resource": "*",
"Condition": {
"Null": {
"kms:EncryptionContext:aws:cloudtrail:arn": "false"
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
119 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
authentication mechanism not integrated into the operating system, in order to access
the information.
120 | P a g e
3.8 Ensure rotation for customer created CMKs is enabled (Automated)
Profile Applicability:
Level 2
Description:
AWS Key Management Service (KMS) allows customers to rotate the backing key which is
key material stored within the KMS which is tied to the key ID of the Customer Created
customer master key (CMK). It is the backing key that is used to perform cryptographic
operations such as encryption and decryption. Automated key rotation currently retains all
prior backing keys so that decryption of encrypted data can take place transparently. It is
recommended that CMK key rotation be enabled.
Rationale:
Rotating encryption keys helps reduce the potential impact of a compromised key as data
encrypted with a new key cannot be accessed with a previous key that may have been
exposed.
Audit:
From Console:
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/iam.
2. In the left navigation pane, choose Encryption Keys .
3. Select a customer created master key (CMK)
4. Under the Key Policy section, move down to Key Rotation .
5. Ensure the Rotate this key every year checkbox is checked.
1. Run the following command to get a list of all keys and their associated KeyIds
2. For each key, note the KeyId and run the following command
121 | P a g e
Remediation:
From Console:
1. Sign in to the AWS Management Console and open the IAM console at
https://console.aws.amazon.com/iam.
2. In the left navigation pane, choose Encryption Keys .
3. Select a customer created master key (CMK)
4. Under the Key Policy section, move down to Key Rotation .
5. Check the Rotate this key every year checkbox.
References:
1. https://aws.amazon.com/kms/pricing/
2. https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final
3. CCE-78920-6
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
122 | P a g e
3.9 Ensure VPC flow logging is enabled in all VPCs (Automated)
Profile Applicability:
Level 2
Description:
VPC Flow Logs is a feature that enables you to capture information about the IP traffic
going to and from network interfaces in your VPC. After you've created a flow log, you can
view and retrieve its data in Amazon CloudWatch Logs. It is recommended that VPC Flow
Logs be enabled for packet "Rejects" for VPCs.
Rationale:
VPC Flow Logs provide visibility into network traffic that traverses the VPC and can be
used to detect anomalous traffic or insight during security workflows.
Impact:
By default, CloudWatch Logs will store Logs indefinitely unless a specific retention period
is defined for the log group. When choosing the number of days to retain, keep in mind the
average days it takes an organization to realize they have been breached is 210 days (at the
time of this writing). Since additional time is required to research a breach, a minimum 365
day retention policy allows time for detection and research. You may also wish to archive
the logs to a cheaper storage service rather than simply deleting them. See the following
AWS resource to manage CloudWatch Logs retention periods:
1. https://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/Setting
LogRetention.html
Audit:
123 | P a g e
Remediation:
Note: Setting the filter to "Reject" will dramatically reduce the logging data accumulation
for this recommendation and provide sufficient information for the purposes of breach
detection, research and remediation. However, during periods of least privilege security
group engineering, setting this the filter to "All" can be very helpful in discovering existing
traffic flows required for proper operation of an already running environment.
References:
1. CCE-79202-8
2. https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/flow-logs.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
124 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
125 | P a g e
3.10 Ensure that Object-level logging for write events is enabled for S3
bucket (Automated)
Profile Applicability:
Level 2
Description:
S3 object-level API operations such as GetObject, DeleteObject, and PutObject are called
data events. By default, CloudTrail trails don't log data events and so it is recommended to
enable Object-level logging for S3 buckets.
Rationale:
Enabling object-level logging will help you meet data compliance requirements within your
organization, perform comprehensive security analysis, monitor specific patterns of user
behavior in your AWS account or take immediate actions on any object-level API activity
within your S3 Buckets using Amazon CloudWatch Events.
Audit:
From Console:
1. Run list-trails command to list the names of all Amazon CloudTrail trails
currently available in the selected AWS region:
126 | P a g e
aws cloudtrail get-event-selectors --region <region-name> --trail-name
<trail-name> --query EventSelectors[*].DataResources[]
4. The command output should be an array that contains the configuration of the AWS
resource(S3 bucket) defined for the Data events selector.
5. If the get-event-selectors command returns an empty array '[]', the Data events
are not included into the selected AWS Cloudtrail trail logging configuration,
therefore the S3 object-level API operations performed within your AWS account
are not recorded.
6. Repeat steps 1 to 5 for auditing each s3 bucket to identify other trails that are
missing the capability to log Data events.
7. Change the AWS region by updating the --region command parameter and perform
the audit process for other regions.
Remediation:
From Console:
1. To enable object-level data events logging for S3 buckets within your AWS
account, run put-event-selectors command using the name of the trail that you
want to reconfigure as identifier:
127 | P a g e
4. Repeat step 1 for each s3 bucket to update object-level logging of write events.
5. Change the AWS region by updating the --region command parameter and perform
the process for other regions.
References:
1. https://docs.aws.amazon.com/AmazonS3/latest/user-guide/enable-cloudtrail-
events.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
128 | P a g e
3.11 Ensure that Object-level logging for read events is enabled for S3
bucket (Automated)
Profile Applicability:
Level 2
Description:
S3 object-level API operations such as GetObject, DeleteObject, and PutObject are called
data events. By default, CloudTrail trails don't log data events and so it is recommended to
enable Object-level logging for S3 buckets.
Rationale:
Enabling object-level logging will help you meet data compliance requirements within your
organization, perform comprehensive security analysis, monitor specific patterns of user
behavior in your AWS account or take immediate actions on any object-level API activity
using Amazon CloudWatch Events.
Audit:
From Console:
1. Run describe-trails command to list the names of all Amazon CloudTrail trails
currently available in the selected AWS region:
129 | P a g e
2. The command output will be table of the requested trail names.
3. Run get-event-selectors command using the name of the trail returned at the
previous step and custom query filters to determine if Data events logging feature is
enabled within the selected CloudTrail trail configuration for s3 bucket resources:
4. The command output should be an array that contains the configuration of the AWS
resource(S3 bucket) defined for the Data events selector.
5. If the get-event-selectors command returns an empty array, the Data events are
not included into the selected AWS Cloudtrail trail logging configuration, therefore
the S3 object-level API operations performed within your AWS account are not
recorded.
6. Repeat steps 1 to 5 for auditing each s3 bucket to identify other trails that are
missing the capability to log Data events.
7. Change the AWS region by updating the --region command parameter and perform
the audit process for other regions.
Remediation:
From Console:
1. To enable object-level data events logging for S3 buckets within your AWS
account, run put-event-selectors command using the name of the trail that you
want to reconfigure as identifier:
130 | P a g e
aws cloudtrail put-event-selectors --region <region-name> --trail-name
<trail-name> --event-selectors '[{ "ReadWriteType": "ReadOnly",
"IncludeManagementEvents":true, "DataResources": [{ "Type":
"AWS::S3::Object", "Values": ["arn:aws:s3:::<s3-bucket-name>/"] }] }]'
References:
1. https://docs.aws.amazon.com/AmazonS3/latest/user-guide/enable-cloudtrail-
events.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
131 | P a g e
4 Monitoring
This section contains recommendations for configuring AWS to assist with monitoring and
responding to account activities.
132 | P a g e
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls
(Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Monitoring unauthorized API calls will help reveal application errors and may reduce time
to detect malicious activity.
Impact:
This alert may be triggered by normal read-only console activities that attempt to
opportunistically gather optional information, but gracefully fail if they don't have
permissions.
If an excessive number of alerts are being generated then an organization may wish to
consider adding read access to the limited IAM user permissions simply to quiet the alerts.
In some cases doing this may allow the users to actually view some areas of the system -
any additional access given should be reviewed for alignment with the original limited IAM
user intent.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
133 | P a g e
Example: for CloudWatchLogsLogGroupArn that looks like
arn:aws:logs:<region>:<aws_account_number>:log-group:NewGroup:*,
<cloudtrail_log_group_name> would be NewGroup
3. Ensure the output from the above command contains the following:
"Filter = {(($.errorCode="*UnauthorizedOperation") ||
($.errorCode="AccessDenied*")) &&
(($.sourceIPAddress!="delivery.logs.amazonaws.com") &&
($.eventName!="HeadBucket"))}"
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
134 | P a g e
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for
unauthorized API calls and the <cloudtrail_log_group_name> taken from audit
step 1.
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. https://aws.amazon.com/sns/
2. CCE-79186-3
135 | P a g e
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
4. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
5. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
136 | P a g e
4.2 Ensure a log metric filter and alarm exist for Management Console
sign-in without MFA (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Monitoring for single-factor console logins will increase visibility into accounts that are not
protected by MFA.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
137 | P a g e
Ensure identified Multi-region 'Cloudtrail' captures all Management Events
Ensure in the output there is at least one Event Selector for a Trail with
IncludeManagementEvents set to true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
Or (To reduce false positives incase Single Sign-On (SSO) is used in organization):
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
138 | P a g e
1. Create a metric filter based on filter pattern provided which checks for AWS
Management Console sign-in without MFA and the <cloudtrail_log_group_name>
taken from audit step 1.
Use Command:
Or (To reduce false positives incase Single Sign-On (SSO) is used in organization):
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
139 | P a g e
References:
1. https://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/viewin
g_metrics_with_cloudwatch.html
2. CCE-79187-1
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
4. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
5. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored -Filter pattern
set to { ($.eventName = "ConsoleLogin") && ($.additionalEventData.MFAUsed
!= "Yes") && ($.userIdentity.type = "IAMUser") &&
($.responseElements.ConsoleLogin = "Success"} reduces false alarms raised
when user logs in via SSO account.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
140 | P a g e
4.3 Ensure a log metric filter and alarm exist for usage of 'root' account
(Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Monitoring for 'root' account logins will provide visibility into the use of a fully privileged
account and an opportunity to reduce the use of it.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
141 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for 'Root'
account usage and the <cloudtrail_log_group_name> taken from audit step 1.
142 | P a g e
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79188-9
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
143 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
144 | P a g e
4.4 Ensure a log metric filter and alarm exist for IAM policy changes
(Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Monitoring changes to IAM policies will help ensure authentication and authorization
controls remain intact.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
145 | P a g e
Ensure identified Multi-region Cloudtrail captures all Management Events
3. Ensure the output from the above command contains the following:
"filterPattern":
"{($.eventName=DeleteGroupPolicy)||($.eventName=DeleteRolePolicy)||($.eventNa
me=DeleteUserPolicy)||($.eventName=PutGroupPolicy)||($.eventName=PutRolePolic
y)||($.eventName=PutUserPolicy)||($.eventName=CreatePolicy)||($.eventName=Del
etePolicy)||($.eventName=CreatePolicyVersion)||($.eventName=DeletePolicyVersi
on)||($.eventName=AttachRolePolicy)||($.eventName=DetachRolePolicy)||($.event
Name=AttachUserPolicy)||($.eventName=DetachUserPolicy)||($.eventName=AttachGr
oupPolicy)||($.eventName=DetachGroupPolicy)}"
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for IAM policy
changes and the <cloudtrail_log_group_name> taken from audit step 1.
146 | P a g e
aws logs put-metric-filter --log-group-name `<cloudtrail_log_group_name>` --
filter-name `<iam_changes_metric>` --metric-transformations metricName=
`<iam_changes_metric>` ,metricNamespace='CISBenchmark',metricValue=1 --
filter-pattern
'{($.eventName=DeleteGroupPolicy)||($.eventName=DeleteRolePolicy)||($.eventNa
me=DeleteUserPolicy)||($.eventName=PutGroupPolicy)||($.eventName=PutRolePolic
y)||($.eventName=PutUserPolicy)||($.eventName=CreatePolicy)||($.eventName=Del
etePolicy)||($.eventName=CreatePolicyVersion)||($.eventName=DeletePolicyVersi
on)||($.eventName=AttachRolePolicy)||($.eventName=DetachRolePolicy)||($.event
Name=AttachUserPolicy)||($.eventName=DetachUserPolicy)||($.eventName=AttachGr
oupPolicy)||($.eventName=DetachGroupPolicy)}'
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79189-7
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
147 | P a g e
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
148 | P a g e
4.5 Ensure a log metric filter and alarm exist for CloudTrail
configuration changes (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
149 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for cloudtrail
configuration changes and the <cloudtrail_log_group_name> taken from audit step
1.
150 | P a g e
DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging)
}'
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79190-5
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
151 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
152 | P a g e
4.6 Ensure a log metric filter and alarm exist for AWS Management
Console authentication failures (Automated)
Profile Applicability:
Level 2
Description:
Rationale:
Monitoring failed console logins may decrease lead time to detect an attempt to brute force
a credential, which may provide an indicator, such as source IP, that can be used in other
event correlation.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
153 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for AWS
management Console Login Failures and the <cloudtrail_log_group_name> taken
from audit step 1.
154 | P a g e
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79191-3
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
155 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
156 | P a g e
4.7 Ensure a log metric filter and alarm exist for disabling or scheduled
deletion of customer created CMKs (Automated)
Profile Applicability:
Level 2
Description:
Rationale:
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
157 | P a g e
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for disabled or
scheduled for deletion CMK's and the <cloudtrail_log_group_name> taken from
audit step 1.
158 | P a g e
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79192-1
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
159 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
160 | P a g e
4.8 Ensure a log metric filter and alarm exist for S3 bucket policy
changes (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Monitoring changes to S3 bucket policies may reduce time to detect and correct permissive
policies on sensitive S3 buckets.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
161 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for S3 bucket
policy changes and the <cloudtrail_log_group_name> taken from audit step 1.
162 | P a g e
($.eventSource = s3.amazonaws.com) && (($.eventName = PutBucketAcl) ||
($.eventName = PutBucketPolicy) || ($.eventName = PutBucketCors) ||
($.eventName = PutBucketLifecycle) || ($.eventName = PutBucketReplication) ||
($.eventName = DeleteBucketPolicy) || ($.eventName = DeleteBucketCors) ||
($.eventName = DeleteBucketLifecycle) || ($.eventName =
DeleteBucketReplication)) }'
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79193-9
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
163 | P a g e
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
164 | P a g e
4.9 Ensure a log metric filter and alarm exist for AWS Config
configuration changes (Automated)
Profile Applicability:
Level 2
Description:
Rationale:
Monitoring changes to AWS Config configuration will help ensure sustained visibility of
configuration items within the AWS account.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
165 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for AWS
Configuration changes and the <cloudtrail_log_group_name> taken from audit
step 1.
166 | P a g e
(($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)
||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder))
}'
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79194-7
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
167 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
168 | P a g e
4.10 Ensure a log metric filter and alarm exist for security group
changes (Automated)
Profile Applicability:
Level 2
Description:
Rationale:
Monitoring changes to security group will help ensure that resources and services are not
unintentionally exposed.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
169 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for security
groups changes and the <cloudtrail_log_group_name> taken from audit step 1.
170 | P a g e
|| ($.eventName = RevokeSecurityGroupEgress) || ($.eventName =
CreateSecurityGroup) || ($.eventName = DeleteSecurityGroup) }"
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79195-4
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
171 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
172 | P a g e
4.11 Ensure a log metric filter and alarm exist for changes to Network
Access Control Lists (NACL) (Automated)
Profile Applicability:
Level 2
Description:
Rationale:
Monitoring changes to NACLs will help ensure that AWS resources and services are not
unintentionally exposed.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
173 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for NACL
changes and the <cloudtrail_log_group_name> taken from audit step 1.
174 | P a g e
DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) ||
($.eventName = ReplaceNetworkAclAssociation) }'
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79196-2
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
175 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
176 | P a g e
4.12 Ensure a log metric filter and alarm exist for changes to network
gateways (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Monitoring changes to network gateways will help ensure that all ingress/egress traffic
traverses the VPC border via a controlled path.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
177 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for network
gateways changes and the <cloudtrail_log_group_name> taken from audit step 1.
178 | P a g e
($.eventName = CreateInternetGateway) || ($.eventName =
DeleteInternetGateway) || ($.eventName = DetachInternetGateway) }'
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79197-0
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
179 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
180 | P a g e
4.13 Ensure a log metric filter and alarm exist for route table changes
(Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Monitoring changes to route tables will help ensure that all VPC traffic flows through an
expected path.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
181 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for route table
changes and the <cloudtrail_log_group_name> taken from audit step 1.
182 | P a g e
|| ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) ||
($.eventName = DisassociateRouteTable) }'
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79198-8
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
ensures that activities from all regions (used as well as unused) are monitored
ensures that activities on all supported global services are monitored
ensures that all management events across all regions are monitored
183 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
184 | P a g e
4.14 Ensure a log metric filter and alarm exist for VPC changes
(Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Monitoring changes to VPC will help ensure VPC traffic flow is not getting impacted.
Audit:
Perform the following to ensure that there is at least one active multi-region CloudTrail
with prescribed metric filters and alarms configured:
1. Identify the log group name configured for use with active multi-region CloudTrail:
185 | P a g e
aws cloudtrail get-event-selectors --trail-name <trailname shown in describe-
trails>
Ensure there is at least one Event Selector for a Trail with IncludeManagementEvents set to
true and ReadWriteType set to All
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for VPC changes
and the <cloudtrail_log_group_name> taken from audit step 1.
186 | P a g e
filter-pattern '{ ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) ||
($.eventName = ModifyVpcAttribute) || ($.eventName =
AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) ||
($.eventName = DeleteVpcPeeringConnection) || ($.eventName =
RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) ||
($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink)
|| ($.eventName = EnableVpcClassicLink) }'
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2
References:
1. CCE-79199-6
2. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-
log-files-from-multiple-regions.html
3. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
4. https://docs.aws.amazon.com/sns/latest/dg/SubscribeTopic.html
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
188 | P a g e
4.15 Ensure a log metric filter and alarm exists for AWS Organizations
changes (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Monitoring AWS Organizations changes can help you prevent any unwanted, accidental or
intentional modifications that may lead to unauthorized access or other security breaches.
This monitoring technique helps you to ensure that any unexpected changes performed
within your AWS Organizations can be investigated and any unwanted changes can be
rolled back.
Audit:
1. Perform the following to ensure that there is at least one active multi-region
CloudTrail with prescribed metric filters and alarms configured:
Identify the log group name configured for use with active multi-region CloudTrail:
List all CloudTrails:
189 | P a g e
Ensure identified Multi-region Cloudtrail captures all Management Events:
3. Ensure the output from the above command contains the following:
6. Note the AlarmActions value - this will provide the SNS topic ARN value.
7. Ensure there is at least one active subscriber to the SNS topic:
at least one subscription should have "SubscriptionArn" with valid aws ARN.
Example of valid "SubscriptionArn":
"arn:aws:sns:<region>:<aws_account_number>:<SnsTopicName>:<SubscriptionID>"
190 | P a g e
Remediation:
Perform the following to setup the metric filter, alarm, SNS topic, and subscription:
1. Create a metric filter based on filter pattern provided which checks for AWS
Organizations changes and the <cloudtrail_log_group_name> taken from audit
step 1:
Note: You can choose your own metricName and metricNamespace strings. Using the same
metricNamespace for all Foundations Benchmark metrics will group them together.
Note: you can execute this command once and then re-use the same topic for all
monitoring alarms.
Note: you can execute this command once and then re-use the SNS subscription for all
monitoring alarms.
4. Create an alarm that is associated with the CloudWatch Logs Metric Filter created in
step 1 and an SNS topic created in step 2:
191 | P a g e
References:
1. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-
for-cloudtrail.html
2. https://docs.aws.amazon.com/organizations/latest/userguide/orgs_security_incide
nt-response.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
192 | P a g e
5 Networking
This section contains recommendations for configuring security-related aspects of AWS
Virtual Private Cloud (VPC).
193 | P a g e
5.1 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote
server administration ports (Automated)
Profile Applicability:
Level 1
Description:
The Network Access Control List (NACL) function provide stateless filtering of ingress and
egress network traffic to AWS resources. It is recommended that no NACL allows
unrestricted ingress access to remote server administration ports, such as SSH to port 22
and RDP to port 3389.
Rationale:
Public access to remote server administration ports, such as 22 and 3389, increases
resource attack surface and unnecessarily raises the risk of resource compromise.
Audit:
From Console:
Perform the following to determine if the account is configured as prescribed:
Note: A Port value of ALL or a port range such as 0-1024 are inclusive of port 22, 3389, and
other remote server administration ports
Remediation:
From Console:
Perform the following:
194 | P a g e
2. In the left pane, click Network ACLs
3. For each network ACL to remediate, perform the following:
o Select the network ACL
o Click the Inbound Rules tab
o Click Edit inbound rules
o Either A) update the Source field to a range other than 0.0.0.0/0, or, B) Click
Delete to remove the offending inbound rule
o Click Save
References:
1. https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html
2. https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Security.html#VPC_Secur
ity_Comparison
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
195 | P a g e
5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote
server administration ports (Automated)
Profile Applicability:
Level 1
Description:
Security groups provide stateful filtering of ingress and egress network traffic to AWS
resources. It is recommended that no security group allows unrestricted ingress access to
remote server administration ports, such as SSH to port 22 and RDP to port 3389.
Rationale:
Public access to remote server administration ports, such as 22 and 3389, increases
resource attack surface and unnecessarily raises the risk of resource compromise.
Impact:
When updating an existing environment, ensure that administrators have access to remote
server administration ports through another mechanism before removing access by
deleting the 0.0.0.0/0 inbound rule.
Audit:
Note: A Port value of ALL or a port range such as 0-1024 are inclusive of port 22, 3389, and
other remote server administration ports.
Remediation:
196 | P a g e
1. Login to the AWS Management Console at
https://console.aws.amazon.com/vpc/home
2. In the left pane, click Security Groups
3. For each security group, perform the following:
4. Select the security group
5. Click the Inbound Rules tab
6. Click the Edit inbound rules button
7. Identify the rules to be edited or removed
8. Either A) update the Source field to a range other than 0.0.0.0/0, or, B) Click Delete
to remove the offending inbound rule
9. Click Save rules
References:
1. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-
groups.html#deleting-security-group-rule
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
197 | P a g e
5.3 Ensure the default security group of every VPC restricts all traffic
(Automated)
Profile Applicability:
Level 2
Description:
A VPC comes with a default security group whose initial settings deny all inbound traffic,
allow all outbound traffic, and allow all traffic between instances assigned to the security
group. If you don't specify a security group when you launch an instance, the instance is
automatically assigned to this default security group. Security groups provide stateful
filtering of ingress/egress network traffic to AWS resources. It is recommended that the
default security group restrict all traffic.
The default VPC in every region should have its default security group updated to comply.
Any newly created VPCs will automatically contain a default security group that will need
remediation to comply with this recommendation.
Rationale:
Configuring all VPC default security groups to restrict all traffic will encourage least
privilege security group development and mindful placement of AWS resources into
security groups which will in-turn reduce the exposure of those resources.
Impact:
198 | P a g e
Audit:
Remediation:
1. Identify AWS resources that exist within the default security group
2. Create a set of least privilege security groups for those resources
3. Place the resources in those security groups
4. Remove the resources noted in #1 from the default security group
199 | P a g e
5. Select the default security group
6. Click the Inbound Rules tab
7. Remove any inbound rules
8. Click the Outbound Rules tab
9. Remove any inbound rules
Recommended:
IAM groups allow you to edit the "name" field. After remediating default groups rules for all
VPCs in all regions, edit this field to add text similar to "DO NOT USE. DO NOT ADD RULES"
References:
1. CCE-79201-0
2. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-
security.html
3. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-
groups.html#default-security-group
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
200 | P a g e
5.4 Ensure routing tables for VPC peering are "least access" (Manual)
Profile Applicability:
Level 2
Description:
Once a VPC peering connection is established, routing tables must be updated to establish
any connections between the peered VPCs. These routes can be as specific as desired - even
peering a VPC to only a single host on the other side of the connection.
Rationale:
Being highly selective in peering routing tables is a very effective way of minimizing the
impact of breach as resources outside of these routes are inaccessible to the peered VPC.
Audit:
Review routing tables of peered VPCs for whether they route all subnets of each VPC and
whether that is necessary to accomplish the intended purposes for peering the VPCs.
From Command Line:
1. List all the route tables from a VPC and check if "GatewayId" is pointing to a
<peering_connection_id> (e.g. pcx-1a2b3c4d) and if "DestinationCidrBlock" is as
specific as desired.
Remediation:
Remove and add route table entries to ensure that the least number of subnets or hosts as
is required to accomplish the purpose for peering are routable.
From Command Line:
1. For each <route_table_id> containing routes non compliant with your routing policy
(which grants more than desired "least access"), delete the non compliant route:
201 | P a g e
2. Create a new compliant route:
References:
1. https://docs.aws.amazon.com/AmazonVPC/latest/PeeringGuide/peering-
configurations-partial-access.html
2. https://docs.aws.amazon.com/cli/latest/reference/ec2/create-vpc-peering-
connection.html
Additional Information:
If an organization has AWS transit gateway implemented in their VPC architecture they
should look to apply the recommendation above for "least access" routing architecture at
the AWS transit gateway level in combination with what must be implemented at the
standard VPC route table. More specifically, to route traffic between two or more VPCs via a
transit gateway VPCs must have an attachment to a transit gateway route table as well as a
route, therefore to avoid routing traffic between VPCs an attachment to the transit gateway
route table should only be added where there is an intention to route traffic between the
VPCs. As transit gateways are able to host multiple route tables it is possible to group VPCs
by attaching them to a common route table.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
202 | P a g e
Appendix: Recommendation Summary
Table
Control Set
Correctly
Yes No
1 Identity and Access Management
1.1 Maintain current contact details (Manual)
1.2 Ensure security contact information is registered (Manual)
1.3 Ensure security questions are registered in the AWS account
(Manual)
1.4 Ensure no 'root' user account access key exists (Automated)
1.5 Ensure MFA is enabled for the 'root' user account
(Automated)
1.6 Ensure hardware MFA is enabled for the 'root' user account
(Automated)
1.7 Eliminate use of the 'root' user for administrative and daily
tasks (Automated)
1.8 Ensure IAM password policy requires minimum length of 14
or greater (Automated)
1.9 Ensure IAM password policy prevents password reuse
(Automated)
1.10 Ensure multi-factor authentication (MFA) is enabled for all
IAM users that have a console password (Automated)
1.11 Do not setup access keys during initial user setup for all IAM
users that have a console password (Manual)
1.12 Ensure credentials unused for 45 days or greater are
disabled (Automated)
1.13 Ensure there is only one active access key available for any
single IAM user (Automated)
1.14 Ensure access keys are rotated every 90 days or less
(Automated)
1.15 Ensure IAM Users Receive Permissions Only Through
Groups (Automated)
1.16 Ensure IAM policies that allow full "*:*" administrative
privileges are not attached (Automated)
1.17 Ensure a support role has been created to manage incidents
with AWS Support (Automated)
1.18 Ensure IAM instance roles are used for AWS resource access
from instances (Manual)
203 | P a g e
1.19 Ensure that all the expired SSL/TLS certificates stored in
AWS IAM are removed (Automated)
1.20 Ensure that IAM Access analyzer is enabled for all regions
(Automated)
1.21 Ensure IAM users are managed centrally via identity
federation or AWS Organizations for multi-account
environments (Manual)
2 Storage
2.1 Simple Storage Service (S3)
2.1.1 Ensure all S3 buckets employ encryption-at-rest (Manual)
2.1.2 Ensure S3 Bucket Policy is set to deny HTTP requests
(Manual)
2.1.3 Ensure MFA Delete is enable on S3 buckets (Automated)
2.1.4 Ensure all data in Amazon S3 has been discovered, classified
and secured when required. (Manual)
2.1.5 Ensure that S3 Buckets are configured with 'Block public
access (bucket settings)' (Automated)
2.2 Elastic Compute Cloud (EC2)
2.2.1 Ensure EBS volume encryption is enabled (Manual)
2.3 Relational Database Service (RDS)
2.3.1 Ensure that encryption is enabled for RDS Instances
(Automated)
3 Logging
3.1 Ensure CloudTrail is enabled in all regions (Automated)
3.2 Ensure CloudTrail log file validation is enabled (Automated)
3.3 Ensure the S3 bucket used to store CloudTrail logs is not
publicly accessible (Automated)
3.4 Ensure CloudTrail trails are integrated with CloudWatch
Logs (Automated)
3.5 Ensure AWS Config is enabled in all regions (Automated)
3.6 Ensure S3 bucket access logging is enabled on the
CloudTrail S3 bucket (Automated)
3.7 Ensure CloudTrail logs are encrypted at rest using KMS
CMKs (Automated)
3.8 Ensure rotation for customer created CMKs is enabled
(Automated)
3.9 Ensure VPC flow logging is enabled in all VPCs (Automated)
3.10 Ensure that Object-level logging for write events is enabled
for S3 bucket (Automated)
3.11 Ensure that Object-level logging for read events is enabled
for S3 bucket (Automated)
4 Monitoring
204 | P a g e
4.1 Ensure a log metric filter and alarm exist for unauthorized
API calls (Automated)
4.2 Ensure a log metric filter and alarm exist for Management
Console sign-in without MFA (Automated)
4.3 Ensure a log metric filter and alarm exist for usage of 'root'
account (Automated)
4.4 Ensure a log metric filter and alarm exist for IAM policy
changes (Automated)
4.5 Ensure a log metric filter and alarm exist for CloudTrail
configuration changes (Automated)
4.6 Ensure a log metric filter and alarm exist for AWS
Management Console authentication failures (Automated)
4.7 Ensure a log metric filter and alarm exist for disabling or
scheduled deletion of customer created CMKs (Automated)
4.8 Ensure a log metric filter and alarm exist for S3 bucket
policy changes (Automated)
4.9 Ensure a log metric filter and alarm exist for AWS Config
configuration changes (Automated)
4.10 Ensure a log metric filter and alarm exist for security group
changes (Automated)
4.11 Ensure a log metric filter and alarm exist for changes to
Network Access Control Lists (NACL) (Automated)
4.12 Ensure a log metric filter and alarm exist for changes to
network gateways (Automated)
4.13 Ensure a log metric filter and alarm exist for route table
changes (Automated)
4.14 Ensure a log metric filter and alarm exist for VPC changes
(Automated)
4.15 Ensure a log metric filter and alarm exists for AWS
Organizations changes (Automated)
5 Networking
5.1 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to
remote server administration ports (Automated)
5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to
remote server administration ports (Automated)
5.3 Ensure the default security group of every VPC restricts all
traffic (Automated)
5.4 Ensure routing tables for VPC peering are "least access"
(Manual)
205 | P a g e
206 | P a g e
Appendix: Change History
Date Version Changes for this version
207 | P a g e
11/9/2016 1.1.0 1.1 - Fixed typo in description and rationale (Ticket #56)
11/9/2016 1.1.0 2.1, 2.5, 2.6, 4.3 - Added notes (Ticket #89)
UPDATE - 1.21 - Ensure IAM instance roles are used for AWS resource
5/23/2018 1.2.0
access from instances - Grammatical-ticket 2279
UPDATE - 1.4 Ensure access keys are rotated every 90 days or less -
5/23/2018 1.2.0
Audit-ticket 6187
UPDATE - Error in 3.14 Ensure a log metric filter and alarm exist for
5/23/2018 1.2.0
VPC changes-ticket 6070
UPDATE - 3.7 Ensure a log metric filter and alarm exist for disabling....
5/23/2018 1.2.0
filterPattern error-ticket 6008
5/23/2018 1.2.0 UPDATE - Audit Procedure for Effectiveness: 3.1 to 3.14-ticket 6212
208 | P a g e
5/23/2018 1.2.0 UPDATE - 2.1 - CLI commands are incomplete-ticket 4843
UPDATE - 2.6 - Adding step in CLI audit just for the sake of
5/23/2018 1.2.0
completeness-ticket 6280
5/23/2018 1.2.0 UPDATE - 2.5 Need more clarification on CLI audit step 2-ticket 6279
MOVE - 4.3 - Ensure VPC flow logging is enabled in all VPCs" to section
5/23/2018 1.2.0
2 "Logging"-ticket 2274
DELETE - 1.18 - Ensure IAM Master and IAM Manager roles are active-
5/23/2018 1.2.0
ticket 6371
209 | P a g e
UPDATE - Do not setup access keys during initial user setup for all
1-Apr-20 1.3.0 IAM users that have a console password - rule name is differed from
audit procedure (Ticket 6837)
UPDATE - Ensure MFA is enabled for the "root user " account - add
6-Apr-20 1.3.0
reference (Ticket 10147)
UPDATE - Ensure routing tables for VPC peering are "least access" -
17-Apr-20 1.3.0
add reference (Ticket 10197)
UPDATE - Ensure a log metric filter and alarm exist for security group
28-May-20 1.3.0 changes - Use of quotes instead of backticks in CLI commands (Ticket
8409)
UPDATE - Ensure the default security group of every VPC restricts all
28-May-20 1.3.0
traffic - Add reference (Ticket 10196)
210 | P a g e
UPDATE - Ensure IAM policies are attached only to groups or roles -
3-Jun-20 1.3.0
add auidt to include inline policies (Ticket 10892)
ADD - Ensure a log metric filter and alarm exists for AWS
17-Jun-20 1.3.0
Organizations changes (Ticket 10894)
17-Jun-20 1.3.0 ADD - Ensure that IAM Access analyzer is enabled (Ticket 9671)
ADD - Ensure that all the expired SSL/TLS certificates stored in AWS
24-Jun-20 1.3.0
IAM are removed (Ticket 6936)
UPDATE - Ensure no root user account access key exists - Add new
24-Jun-20 1.3.0
audit procedure (Ticket 10601)
UPDATE - Do not setup access keys during initial user setup for all
7-Jul-20 1.3.0 IAM users that have a console password - Update description (Ticket
7108)
211 | P a g e
UPDATE - Ensure a log metric filter and alarm exist for Management
7-Jul-20 1.3.0 Console sign-in without MFA - Update the filter pattern to minimize
noise (Ticket 6742)
UPDATE - Ensure access keys are rotated every 90 days or less - Add
7-Jul-20 1.3.0
audit procedure, reference (Ticket 10138)
ADD - Ensure that Object-level logging for read events is enabled for
8-Jul-20 1.3.0
S3 bucket (Ticket 10704)
ADD - Ensure that Object-level logging for write events is enabled for
8-Jul-20 1.3.0
S3 bucket (Ticket 10703)
UPDATE - Ensure routing tables for VPC peering are "least access" -
9-Jul-20 1.3.0
add AWS Transit Gateway routing guidance (Ticket 10927)
ADD - Ensure that S3 Buckets are configured with 'Block public access
14-Jul-20 1.3.0
(bucket settings)' (Ticket 10921)
UPDATE - Eliminate use of the root user for administrative and daily
14-Jul-20 1.3.0
tasks - Rewrite audit/change scoring status (Ticket 11070)
212 | P a g e
ADD - Simple Storage Service (S3) and Elastic Compute Cloud (EC2)
20-Jul-20 1.3.0
sections (Ticket 11148)
UPDATE - Ensure a log metric filter and alarm exist for Management...
20-Jul-20 1.3.0 - Additional granularity in control 3.2 for SAML authenticated users
(Ticket 7726)
UPDATE - Ensure routing tables for VPC peering are "least access" -
20-Jul-20 1.3.0
Reword Transit Gateway note (Ticket 10990)
ADD - Ensure IAM users are managed centrally via identity federation
22-Jul-20 1.3.0
or AWS Organizations for multi-account environments (Ticket 11173)
22-Jul-20 1.3.0 ADD - Ensure S3 Bucket Policy allows HTTPS requests (Ticket 7164)
UPDATE - Ensure a log metric filter and alarm exist for unauthorized
22-Jul-20 1.3.0 API calls - Update metric filter to exclude HeadBucket event (Ticket
11084)
May 12, 2021 1.4.0 ADD - Ensure MFA Delete is enable on S3 buckets (Ticket 12758)
213 | P a g e
UPDATE - Ensure a log metric filter and alarm exist for unauthorized
May 14, 2021 1.4.0 API calls - Change in cli to include logs instead of excluding them
(Ticket 11805)
UPDATE - Ensure that IAM Access analyzer is enabled for all regions -
May 14, 2021 1.4.0
Note that Access Analyzer a regional service (Ticket 11322)
UPDATE - Ensure AWS Config is enabled in all regions - Cost for this
May 25, 2021 1.4.0
service. Move to level 2 (Ticket 12936)
214 | P a g e