Benchmark | Rule ID | Title | Service Type | Resource Type |
---|---|---|---|---|
CIS_3_0_0_Regional | CSPM-AWS-2024-0009 | CloudTrail Data Events Logging Not Configured | CloudTrail | Trails |
CIS_3_0_0_Regional | CSPM-AWS-2024-0009 | CloudTrail Data Events Logging Not Configured | CloudTrail | Trails |
CIS_3_0_0_Regional | CSPM-AWS-2024-0010 | CloudTrail Logs are not encrypted using KMS Customer Master Keys (CMKs). | CloudTrail | Trails |
CIS_3_0_0_Regional | CSPM-AWS-2024-0012 | CloudTrail Log File Validation is Disabled | CloudTrail | Trails |
CIS_3_0_0_Regional | CSPM-AWS-2024-0017 | AWS Config Recorders Not Enabled | ConfigService | ConfigurationRecorders |
CIS_3_0_0_Regional | CSPM-AWS-2024-0020 | Non-empty Default Security Group Rulesets | EC2 | SecurityGroups |
CIS_3_0_0_Regional | CSPM-AWS-2024-0023 | Unencrypted EBS Volume irrespective of its state | EC2 | Volumes |
CIS_3_0_0_Regional | CSPM-AWS-2024-0092 | Rotation disabled for KMS Symmetric Customer Master Keys (CMKs) | KMS | Keys |
CIS_3_0_0_Regional | CSPM-AWS-2024-0093 | No CloudWatch Alarm Monitoring for “AWS Configuration Changes” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0094 | No CloudWatch Alarm Monitoring for “CloudTrail Configuration Changes” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0095 | No CloudWatch Alarm for “Disabled or Deleted Master Keys” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0096 | No CloudWatch Alarm for “Failed Console Authentications” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0097 | No CloudWatch Alarm for “IAM Policy Changes” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0098 | No CloudWatch Alarm for “Network Access Control Lists Changes” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0099 | No CloudWatch Alarm for “Network Gateways Changes” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0100 | No CloudWatch Alarm for “Root Account Usage” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0101 | No CloudWatch Alarm for “Route Table Changes” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0102 | No CloudWatch Alarm for “S3 Bucket Policy Changes” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0103 | No CloudWatch Alarm for “Console Logins without MFA” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0104 | No CloudWatch Alarm for”Console Logins without MFA” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0105 | No CloudWatch Alarm for “Unauthorized API Calls” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0106 | No CloudWatch Alarm for “VPC Changes” | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0109 | Auto Minor Version Upgrade Disabled in the RDS Instance | RDS | DBInstances |
CIS_3_0_0_Regional | CSPM-AWS-2024-0110 | The RDS Instance is Publicly Accessible | RDS | DBInstances |
CIS_3_0_0_Regional | CSPM-AWS-2024-0113 | RDS Instance Storage Not Encrypted | RDS | DBInstances |
CIS_3_0_0_Regional | CSPM-AWS-2024-0129 | S3 Bucket without Multi-Factor Authentication (MFA) Delete | S3 | Buckets |
CIS_3_0_0_Regional | CSPM-AWS-2024-0143 | VPC Routing Table fails to Maintain High Selectivity in Peering | EC2 | RouteTable |
CIS_3_0_0_Regional | CSPM-AWS-2024-0147 | S3 bucket access logging is not enabled on the CloudTrail S3 bucket | CloudTrail | Trails |
CIS_3_0_0_Regional | CSPM-AWS-2024-0148 | CloudTrail should be enabled and configured with at least one multi-Region trail that includes read and write management events | CloudTrail | Trails |
CIS_3_0_0_Regional | CSPM-AWS-2024-0152 | Ensure that only IMDSv2 is permitted by EC2 Metadata Service. | EC2 | Instances |
CIS_3_0_0_Regional | CSPM-AWS-2024-0154 | EFS file systems do not have encryption enabled. | EFS | FileSystems |
CIS_3_0_0_Regional | CSPM-AWS-2024-0155 | Ensure that IAM Access analyzer is enabled for all regions | AccessAnalyzer | Analyzer |
CIS_3_0_0_Regional | CSPM-AWS-2024-0160 | IAM instance roles are used for AWS resource access from instances | EC2 | Instances |
CIS_3_0_0_Regional | CSPM-AWS-2024-0162 | Ensure AWS Organizations changes are monitored using CloudWatchLogs | CloudWatchLogs | MetricFilter |
CIS_3_0_0_Regional | CSPM-AWS-2024-0164 | At the bucket level, the S3 Block Public Access setting needs to be enabled. | S3 | Buckets |
CIS_3_0_0_Regional | CSPM-AWS-2024-0166 | Ensure AWS Security Hub is enabled | SecurityHub | Hub |
CIS_3_0_0_Regional | CSPM-AWS-2024-0167 | In every VPC, VPC flow logging is must to be enabled. | EC2 | FlowLog |