CIS Control 1

1.22 Restrict Access to AWSCloudShellFullAccess (Manual)
Profile Applicability: Level 1 Description: AWS CloudShell provides a pre-authenticated command-line interface (CLI) for interacting with AWS services. ...
Mon, 17 Feb, 2025 at 3:52 AM
1.1 Maintain Current Contact Details (Manual)
Profile Applicability: Level 1 Description: Ensure that the contact email and telephone details for AWS accounts are up-to-date and mapped to more than o...
Mon, 17 Feb, 2025 at 4:17 AM
1.21 Ensure IAM Users Are Managed Centrally via Identity Federation or AWS Organizations in Multi-Account Environments (Manual)
Profile Applicability: Level 2 Description: For multi-account AWS environments, IAM users should be centrally managed either through: Identity Federat...
Mon, 17 Feb, 2025 at 4:04 AM
1.11 Do Not Create Access Keys During Initial Setup for IAM Users with a Console Password (Manual)
Profile Applicability: Level 1 Description: When creating an IAM user, AWS provides the option to enable: Programmatic access: Generates an access key ...
Mon, 17 Feb, 2025 at 4:11 AM
1.2 Ensure Security Contact Information is Registered (Manual)
Profile Applicability: Level 1 Description: AWS allows customers to register security-specific contact information in their AWS account settings. It is r...
Mon, 17 Feb, 2025 at 4:50 AM
1.5 Ensure MFA is Enabled for the 'Root' User Account (Automated)
Profile Applicability: Level 1 Description: The AWS root user account has full administrative privileges in an AWS account. Multi-Factor Authentication (...
Mon, 17 Feb, 2025 at 5:32 AM
1.7 Eliminate Use of the 'Root' User for Administrative and Daily Tasks (Manual)
Profile Applicability: Level 1 Description: When an AWS account is created, a root user is also created. This user cannot be disabled or deleted and has ...
Mon, 17 Feb, 2025 at 5:40 AM
1.10 Ensure Multi-Factor Authentication (MFA) is Enabled for All IAM Users with a Console Password (Automated)
Profile Applicability: Level 1 Description: AWS IAM users with a console password should have Multi-Factor Authentication (MFA) enabled to provide an add...
Mon, 17 Feb, 2025 at 5:48 AM
1.12 Ensure Credentials Unused for 45 Days or More Are Disabled (Automated)
Profile Applicability: Level 1 Description: AWS IAM users can authenticate using passwords (console login) and access keys (programmatic access via CLI/A...
Mon, 17 Feb, 2025 at 6:02 AM
1.13 Ensure There Is Only One Active Access Key for Any Single IAM User (Automated)
Profile Applicability: Level 1 Description: AWS IAM users can have access keys to authenticate API requests via the AWS CLI, SDKs, or direct API calls. T...
Mon, 17 Feb, 2025 at 6:13 AM