Benchmark | Rule ID | Title | Service Type | Resource Type |
---|---|---|---|---|
CIS_4_0_0_Global | CSPM-AWS-2024-0067 | No Authorized User Is Allowed to Handle Issues with Amazon Support | IAM | Policies |
CIS_4_0_0_Global | CSPM-AWS-2024-0069 | The Minimum Password Length for IAM is Short. | IAM | AccountPasswordPolicy |
CIS_4_0_0_Global | CSPM-AWS-2024-0075 | Password Policy Allows Reuse of Passwords | IAM | AccountPasswordPolicy |
CIS_4_0_0_Global | CSPM-AWS-2024-0077 | No Hardware MFA for Root Account | IAM | CredentialReport |
CIS_4_0_0_Global | CSPM-AWS-2024-0078 | No MFA for Root Account | IAM | CredentialReport |
CIS_4_0_0_Global | CSPM-AWS-2024-0079 | Root Account Used Recently | IAM | CredentialReport |
CIS_4_0_0_Global | CSPM-AWS-2024-0084 | Inadequate Key Rotation for 90 Days | IAM | AccessKey |
CIS_4_0_0_Global | CSPM-AWS-2024-0088 | User Holding Multiple API Keys | IAM | AccessKey |
CIS_4_0_0_Global | CSPM-AWS-2024-0159 | IAM Managed policies should not allow full “*” administrative privileges | IAM | Policies |
CIS_4_0_0_Global | CSPM-AWS-2024-0161 | Multi-factor authentication (MFA) not enabled for all IAM users that have a console password | IAM | CredentialReport |
CIS_4_0_0_Global | CSPM-AWS-2024-0169 | Verify that there are no active access keys associated with the root user account | IAM | AccountSummary |