iCompaas Support
Welcome
Login
Sign up
Home
Solutions
Enter your search term here...
Search
New support ticket
Check ticket status
+17103337010
Solution home
AWS CIS Benchmark Level 1
CIS Control 1
1
Ensure a support role has been created to manage incidents with AWS Support
CIS Control 1.4
1
Ensure AWS Config is enabled in all regions
CIS Control 4
1
Ensure IAM policies that allow full "*:*" administrative privileges are not created
CIS Control 4.3
2
Ensure root account user is not used
Ensure no root account access key exists
CIS Control 4.4
1
Ensure IAM password policy prevents password reuse
CIS Control 4.5
2
Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
Ensure MFA is enabled for the "root" account
CIS Control 4.9
1
Ensure a log metric filter and alarm exist for usage of "root" account
CIS Control 5.5
1
Ensure a log metric filter and alarm exist for VPC changes
CIS Control 6
1
Ensure a log metric filter and alarm exist for CloudTrail configuration changes
CIS Control 6.2
6
Ensure CloudTrail is enabled in all regions
Ensure CloudTrail trails are integrated with CloudWatch Logs
Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket
Ensure a log metric filter and alarm exist for S3 bucket policy changes
Ensure a log metric filter and alarm exist for changes to network gateways
View all 6
CIS Control 6.3
1
Maintain current contact details
CIS Control 6.5
1
Ensure a log metric filter and alarm exist for unauthorized API calls
CIS Control 9.2
2
Ensure no security groups allow ingress from all IPs(0.0.0.0/0) to SSH (Port 22)
Ensure no security groups allow ingress from all IPs to RDP Port(3389)
CIS Control 14.6
1
Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible
CIS Control 16
11
Ensure IAM password policy requires at least one uppercase letter
Ensure IAM password policy require at least one lowercase letter
Ensure IAM password policy require at least one symbol
Ensure IAM password policy require at least one number
Ensure IAM password policy requires minimum length of 14 or greater
View all 11
CIS Control 16.9
2
Ensure credentials unused for 90 days or greater are disabled
Ensure access keys are rotated every 90 days or less
CIS Control 19
2
Ensure security contact information is registered
Ensure a log metric filter and alarm exist for AWS Management Console Authentication failures
Help Desk Software
by Freshdesk