Benchmark | Rule ID | Title | Service Type | Resource Type |
---|---|---|---|---|
SecPod_Global | CSPM-AWS-2024-0004 | Clear-Text Origin, a potential to expose sensitive data in AWS CloudFront Content Distributions | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0005 | Insecure Origin TLS/SSL, a potential to expose sensitive data in AWS CloudFront Content Distributions | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0006 | Inadequate Viewer Security Policy, a potential to expose sensitive data in AWS CloudFront Content Distributions | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0055 | IAM Group uses Inline Policies instead of Managed Policies | IAM | Policy |
SecPod_Global | CSPM-AWS-2024-0056 | IAM Group with No Users | IAM | Group |
SecPod_Global | CSPM-AWS-2024-0066 | Managed Policy Not Attached to Any Entity | IAM | ManagedPolicy |
SecPod_Global | CSPM-AWS-2024-0067 | No Authorized User Is Allowed to Handle Issues with Amazon Support | IAM | Policies |
SecPod_Global | CSPM-AWS-2024-0068 | Passwords Expiration Threshold Is Not Configured Or Exceeds The Specified Limit | IAM | AccountPasswordPolicy |
SecPod_Global | CSPM-AWS-2024-0069 | The Minimum Password Length for IAM is Short. | IAM | AccountPasswordPolicy |
SecPod_Global | CSPM-AWS-2024-0070 | Password Expiration Disabled | IAM | AccountPasswordPolicy |
SecPod_Global | CSPM-AWS-2024-0071 | Password Policy Does Not Mandate Lowercase Characters | IAM | AccountPasswordPolicy |
SecPod_Global | CSPM-AWS-2024-0072 | Password Policy Does Not Mandate a Number | IAM | AccountPasswordPolicy |
SecPod_Global | CSPM-AWS-2024-0073 | Password Policy Does Not Mandate a Symbol | IAM | AccountPasswordPolicy |
SecPod_Global | CSPM-AWS-2024-0074 | Password Policy Does Not Mandate Uppercase Characters | IAM | AccountPasswordPolicy |
SecPod_Global | CSPM-AWS-2024-0075 | Password Policy Allows Reuse of Passwords | IAM | AccountPasswordPolicy |
SecPod_Global | CSPM-AWS-2024-0076 | IAM Role uses Inline Policies instead of Managed Policies | IAM | Policy |
SecPod_Global | CSPM-AWS-2024-0077 | No Hardware MFA for Root Account | IAM | CredentialReport |
SecPod_Global | CSPM-AWS-2024-0078 | No MFA for Root Account | IAM | CredentialReport |
SecPod_Global | CSPM-AWS-2024-0079 | Root Account Used Recently | IAM | CredentialReport |
SecPod_Global | CSPM-AWS-2024-0080 | Root Account Has Active X.509 Certs | IAM | CredentialReport |
SecPod_Global | CSPM-AWS-2024-0081 | X.509 Certificates Are Active for Root Account | IAM | CredentialReport |
SecPod_Global | CSPM-AWS-2024-0082 | Password-Enabled Service User | IAM | CredentialReport |
SecPod_Global | CSPM-AWS-2024-0084 | Inadequate Key Rotation for 90 Days | IAM | AccessKey |
SecPod_Global | CSPM-AWS-2024-0085 | IAM User is Not in Category Group | IAM | Groups |
SecPod_Global | CSPM-AWS-2024-0086 | IAM User is Not in Common Group | IAM | Groups |
SecPod_Global | CSPM-AWS-2024-0088 | User Holding Multiple API Keys | IAM | AccessKey |
SecPod_Global | CSPM-AWS-2024-0089 | User with Enabled Keys and Password | IAM | AccessKey |
SecPod_Global | CSPM-AWS-2024-0091 | User without MFA | IAM | Users |
SecPod_Global | CSPM-AWS-2024-0123 | Route53 Domain Auto-Renewal is Not Enabled | Route53Domains | Domain |
SecPod_Global | CSPM-AWS-2024-0124 | Route53 Domain Transfer is Not Locked | Route53Domains | Domain |
SecPod_Global | CSPM-AWS-2024-0159 | IAM Managed policies should not allow full “*” administrative privileges | IAM | Policies |
SecPod_Global | CSPM-AWS-2024-0161 | Multi-factor authentication (MFA) not enabled for all IAM users that have a console password | IAM | CredentialReport |
SecPod_Global | CSPM-AWS-2024-0169 | Verify that there are no active access keys associated with the root user account | IAM | AccountSummary |
SecPod_Global | CSPM-AWS-2024-0171 | Security contact information should be provided for an AWS account. | Account | ContactInformation |
SecPod_Global | CSPM-AWS-2024-0172 | AWS account should be part of an AWS Organizations organization | Account | Organizations |
SecPod_Global | CSPM-AWS-2024-0188 | CloudFront distributions should have a default root object configured | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0189 | CloudFront distributions should not point to non-existent S3 origins | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0190 | CloudFront distributions should have origin failover configured | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0191 | CloudFront distributions should have logging enabled | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0192 | CloudFront distributions should have WAF enabled | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0193 | CloudFront distributions should use custom SSL/TLS certificates | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0194 | CloudFront distributions should use SNI to serve HTTPS requests | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0195 | CloudFront distributions should encrypt traffic to custom origins | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0269 | Application Load Balancers should be associated with an AWS WAF web ACL | WAFv2 | ApplicationLoadBalancer |
SecPod_Global | CSPM-AWS-2024-0289 | IAM customer managed policies that you create should not allow wildcard actions for services | IAM | Policy |
SecPod_Global | CSPM-AWS-2024-0291 | IAM customer managed policies should not allow decryption actions on all KMS keys | KMS | Policy |
SecPod_Global | CSPM-AWS-2024-0362 | Route 53 public hosted zones should log DNS queries | Route53 | HostedZone |
SecPod_Global | CSPM-AWS-2024-0387 | AWS WAF Classic Global Web ACL logging should be enabled | WAF | WebACL |
SecPod_Global | CSPM-AWS-2024-0388 | AWS WAF web ACLs should have at least one rule or rule group | WAFv2 | WebACL |
SecPod_Global | CSPM-AWS-2024-0389 | AWS WAF web ACL logging should be enabled | WAFv2 | WebACL |
SecPod_Global | CSPM-AWS-2024-0390 | AWS WAF rules should have CloudWatch metrics enabled | WAFv2 | WebACL |
SecPod_Global | CSPM-AWS-2024-0391 | AWS WAF Classic Regional rules should have at least one condition | WAFRegional | Rule |
SecPod_Global | CSPM-AWS-2024-0392 | AWS WAF Classic Regional rule groups should have at least one rule | WAFRegional | RuleGroup |
SecPod_Global | CSPM-AWS-2024-0393 | AWS WAF Classic Regional web ACLs should have at least one rule or rule group | WAFRegional | WebACL |
SecPod_Global | CSPM-AWS-2024-0394 | AWS WAF Classic global rules should have at least one condition | WAF | Rule |
SecPod_Global | CSPM-AWS-2024-0395 | AWS WAF Classic global rule groups should have at least one rule | WAF | RuleGroup |
SecPod_Global | CSPM-AWS-2024-0396 | AWS WAF Classic global web ACLs should have at least one rule or rule group | WAF | WebACL |
SecPod_Global | CSPM-AWS-2024-0399 | Codebuild With Administrator Role | CodeBuild | BuildProjects |
SecPod_Global | CSPM-AWS-2024-0400 | IAM Role Without External ID | IAM | Role |
SecPod_Global | CSPM-AWS-2024-0426 | Detect and Respond to Deactivated MFA Devices in AWS | IAM | MFADevices |
SecPod_Global | CSPM-AWS-2024-0428 | Ensure Secure Server Certificate Signature Algorithm | IAM | User |
SecPod_Global | CSPM-AWS-2024-0429-01 | Ensure Approved Access to ECS Execute Command (Inline Policy) | IAM | Role |
SecPod_Global | CSPM-AWS-2024-0429-02 | Ensure Approved Access to ECS Execute Command (Managed Policy) | IAM | Role |
SecPod_Global | CSPM-AWS-2024-0494 | Sender Policy Framework (SPF) in Use | Route53 | HostedZones |
SecPod_Global | CSPM-AWS-2024-0495 | Enable DNSSEC Signing for Route 53 Hosted Zones | Route53 | HostedZones |
SecPod_Global | CSPM-AWS-2024-0501 | Ensure Existence of IAM Users | IAM | User |
SecPod_Global | CSPM-AWS-2024-0505 | Detect Unused IAM Users | IAM | Users |
SecPod_Global | CSPM-AWS-2024-0517 | Ensure CloudFront is Enabled | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0518 | Enforce Use of CloudFront for Content Delivery | CloudFront | Distributions |
SecPod_Global | CSPM-AWS-2024-0536 | Ensure Current Contact Details are Maintained | Account | ContactInformation |
SecPod_Global | CSPM-AWS-2024-0541 | Ensure Shield Advanced is Enabled | Shield | ShieldAdvancedSubscription |
SecPod_Global | CSPM-AWS-2024-0548 | Ensure AWS Organizations All Features is Enabled | Organization | Organization |
SecPod_Global | CSPM-AWS-2024-0582 | Ensure Route 53 Domains Have Privacy Protection Enabled | Route53Domains | Domain |
SecPod_Global | CSPM-AWS-2024-0588 | Ensure CloudFront Geo Restriction is Enabled | CloudFront | Distributions |