Interpretation of the Columns in Benchmark Compliance Rules:
Rule ID: A unique identifier for the specific security rule or check
Title: A brief description of the security issue or misconfiguration
Severity — Low to High: Determines the risk of being exposed to attacks
Service Type: The AWS service affected or evaluated by the rule
Resource Type: The specific AWS resource being audited
Rule ID | Title | Severity | Service Type | Resource Type |
---|---|---|---|---|
CSPM-AWS-2024-0012 | CloudTrail Log File Validation is Disabled | Low | CloudTrail | Trails |
CSPM-AWS-2024-0023 | Unencrypted EBS Volume irrespective of its state | Medium | EC2 | Volumes |
CSPM-AWS-2024-0069 | The Minimum Password Length for IAM is Short. | Medium | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0075 | Password Policy Allows Reuse of Passwords | Low | IAM | AccountPasswordPolicy |
CSPM-AWS-2024-0084 | Inadequate Key Rotation for 90 Days | Medium | IAM | AccessKey |
CSPM-AWS-2024-0088 | User Holding Multiple API Keys | Critical | IAM | AccessKey |
CSPM-AWS-2024-0091 | User without MFA | Medium | IAM | Users |
CSPM-AWS-2024-0092 | Rotation disabled for KMS Symmetric Customer Master Keys (CMKs) | High | KMS | Keys |
CSPM-AWS-2024-0104 | No CloudWatch Alarm for”Console Logins without MFA” | Low | CloudWatchLogs | MetricFilter |
CSPM-AWS-2024-0152 | Ensure that only IMDSv2 is permitted by EC2 Metadata Service. | Medium | EC2 | Instances |
CSPM-AWS-2024-0160 | IAM instance roles are used for AWS resource access from instances | Medium | EC2 | Instances |
CSPM-AWS-2024-0161 | Multi-factor authentication (MFA) not enabled for all IAM users that have a console password | High | IAM | CredentialReport |
CSPM-AWS-2024-0167 | In every VPC, VPC flow logging is must to be enabled. | High | VPC | FlowLog |
CSPM-AWS-2024-0166 | Ensure AWS Security Hub is enabled | High | SecurityHub | Hub |