CIS AWS Benchmarks

1.10 Do not create access keys during initial setup for IAM users with a console password (Manual)
Profile Applicability: Level 1 Description: IAM users with console access should not have access keys created during their initial setup. Access keys...
Thu, 17 Apr, 2025 at 1:41 AM
1.11 Ensure credentials unused for 45 days or more are disabled (Automated)
Profile Applicability Level 1 Description: IAM credentials (access keys and passwords) that are not used for a specified period represent a potential...
Thu, 17 Apr, 2025 at 1:54 AM
1.12 Ensure there is only one active access key for any single IAM user (Automated)
Profile Applicability Level 1 Description: To reduce the risk of compromised credentials and ensure better control over IAM user access, AWS best pra...
Thu, 17 Apr, 2025 at 2:11 AM
1.13 Ensure access keys are rotated every 90 days or less (Automated)
Profile Applicability Level 1 Description: IAM access keys should be rotated regularly to reduce the risk of credential compromise. The best practice...
Thu, 17 Apr, 2025 at 3:18 AM
1.14 Ensure IAM users receive permissions only through groups (Automated)
Profile Applicability Level 1 Description: Granting IAM users permissions through individual user policies can lead to inconsistent access management a...
Thu, 17 Apr, 2025 at 3:43 AM
1.15 Ensure IAM policies that allow full ":" administrative privileges are not attached (Automated)
Profile Applicability Level 1 Description: IAM policies that allow the *:* wildcard (e.g., "Action": "*", "Resource": &qu...
Thu, 17 Apr, 2025 at 4:04 AM
1.16 Ensure a support role has been created to manage incidents with AWS Support (Automated)
Profile Applicability Level 1 Description: AWS Support provides a range of services to help resolve issues with AWS infrastructure, from basic technica...
Thu, 17 Apr, 2025 at 4:20 AM
1.17 Ensure IAM instance roles are used for AWS resource access from instances (Automated)
Profile Applicability Level 1 Description: IAM instance roles allow EC2 instances to securely access AWS resources, such as S3 buckets, DynamoDB tables...
Thu, 17 Apr, 2025 at 4:30 AM
1.18 Ensure that all expired SSL/TLS certificates stored in AWS IAM are removed (Automated)
Profile Applicability Level 1 Description: SSL/TLS certificates are used to secure communication between clients and services. Expired certificates pos...
Thu, 17 Apr, 2025 at 4:39 AM
1.19 Ensure that IAM External Access Analyzer is enabled for all regions (Automated)
Profile Applicability Level 1 Description: The IAM External Access Analyzer is a security feature in AWS Identity and Access Management (IAM) that help...
Thu, 17 Apr, 2025 at 4:59 AM