Interpretation of the Columns in Benchmark Compliance Rules:
Rule ID: A unique identifier for the specific security rule or check
Title: A brief description of the security issue or misconfiguration
Severity — Low to High: Determines the risk of being exposed to attacks
Service Type: The AWS service affected or evaluated by the rule
Resource Type: The specific AWS resource being audited
Rule ID | Title | Severity | Service Type | Resource Type |
---|---|---|---|---|
CSPM-AWS-2024-0004 | Clear-Text Origin, a potential to expose sensitive data in AWS CloudFront Content Distributions | High | CloudFront | Distributions |
CSPM-AWS-2024-0055 | IAM Group uses Inline Policies instead of Managed Policies | Medium | IAM | Policy |
CSPM-AWS-2024-0056 | IAM Group with No Users | Low | IAM | Group |
CSPM-AWS-2024-0066 | Managed Policy Not Attached to Any Entity | Low | IAM | ManagedPolicy |
CSPM-AWS-2024-0068 | Passwords Expiration Threshold Is Not Configured Or Exceeds The Specified Limit | Medium | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0069 | The Minimum Password Length for IAM is Short. | Medium | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0070 | Password Expiration Disabled | High | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0071 | Password Policy Does Not Mandate Lowercase Characters | Medium | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0072 | Password Policy Does Not Mandate a Number | Medium | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0073 | Password Policy Does Not Mandate a Symbol | Medium | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0074 | Password Policy Does Not Mandate Uppercase Characters | Medium | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0075 | Password Policy Allows Reuse of Passwords | Medium | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0076 | IAM Role uses Inline Policies instead of Managed Policies | Medium | IAM | Policy |
CSPM-AWS-2024-0082 | Password-Enabled Service User | Critical | IAM | CredentialReport |
CSPM-AWS-2024-0084 | Inadequate Key Rotation for 90 Days | Critical | IAM | AccessKey |
CSPM-AWS-2024-0088 | User Holding Multiple API Keys | Critical | IAM | AccessKey |
CSPM-AWS-2024-0089 | User with Enabled Keys and Password | Critical | IAM | AccessKey |
CSPM-AWS-2024-0091 | User without MFA | Critical | IAM | Users |
CSPM-AWS-2024-0161 | Multi-factor authentication (MFA) not enabled for all IAM users that have a console password | Critical | IAM | CredentialReport |
CSPM-AWS-2024-0501 | Ensure Existence of IAM Users | High | IAM | User |