Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bugfix/use ref id old format #846

Merged
merged 2 commits into from
Jun 8, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "LOW",
"description": "Ensure there is no open access to back-end resources through API",
"reference_id": "AC_AWS_056",
"reference_id": "AWS.APGM.IS.LOW.0056",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure use of API Gateway endpoint policy, and no action wildcards are being used.",
"reference_id": "AC_AWS_064",
"reference_id": "AWS.APGRAP.IAM.HIGH.0064",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Athena Database is encrypted at rest",
"reference_id": "AC_AWS_016",
"reference_id": "AWS.ADB.DP.MEDIUM.016",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure CloudTrail has log file validation enabled.",
"reference_id": "AC_AWS_067",
"reference_id": "AWS.CloudTrail.LM.MEDIUM.0087",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS Cloudwatch log group has retention policy set.",
"reference_id": "AC_AWS_068",
"reference_id": "AWS.ACLG.LM.MEDIUM.0068",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure DAX is encrypted at rest",
"reference_id": "AC_AWS_021",
"reference_id": "AWS.ADC.DP.MEDIUM.0021",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS RDS instances have logging enabled.",
"reference_id": "AC_AWS_076",
"reference_id": "AWS.ADI.LM.MEDIUM.0076",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure DocDb is encrypted at rest",
"reference_id": "AC_AWS_022",
"reference_id": "AWS.ADC.DP.MEDIUM.0022",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure DocDb clusters have log exports enabled.",
"reference_id": "AC_AWS_069",
"reference_id": "AWS.ADC.LM.MEDIUM.0069",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure DynamoDb is encrypted at rest",
"reference_id": "AC_AWS_025",
"reference_id": "AWS.ADT.DP.MEDIUM.0025",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure ECR repository is encrypted at rest",
"reference_id": "AC_AWS_026",
"reference_id": "AWS.AER.DP.MEDIUM.0026",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure ECR repository has policy attached.",
"reference_id": "AC_AWS_058",
"reference_id": "AWS.AER.DP.MEDIUM.0058",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure EFS volume used for ECS task defination has in transit encryption enabled",
"reference_id": "AC_AWS_043",
"reference_id": "AWS.AETD.IS.MEDIUM.0043",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure EFS file system does not use insecure wildcard policies.",
"reference_id": "AC_AWS_059",
"reference_id": "AWS.AEFSP.IAM.HIGH.0059",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure EKS clusters have control plane logging enabled.",
"reference_id": "AC_AWS_071",
"reference_id": "AWS.AEC.LM.MEDIUM.0071",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Elastic Cache Replication Group is encrypted at rest",
"reference_id": "AC_AWS_027",
"reference_id": "AWS.AERG.DP.MEDIUM.0027",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Elastic Cache Replication Group is encrypted in transit",
"reference_id": "AC_AWS_044",
"reference_id": "AWS.AERG.DP.MEDIUM.0044",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Elasticsearch domains being created are set to be encrypted node-to-node",
"reference_id": "AC_AWS_045",
"reference_id": "AWS.ElasticSearch.IS.MEDIUM.0045",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure Elasticsearch domains do not have wildcard policies.",
"reference_id": "AC_AWS_060",
"reference_id": "AWS.AEDP.IAM.HIGH.0060",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS ELB has access logging enabled.",
"reference_id": "AC_AWS_072",
"reference_id": "AWS.ELB.LM.MEDIUM.0072",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "LOW",
"description": "Ensure Global Accelerator accelerator has flow logs enabled.",
"reference_id": "AC_AWS_073",
"reference_id": "AWS.AGA.LM.LOW.0073",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure IAM roles do not have any policies attached that may cause priviledge escalation.",
"reference_id": "AC_AWS_051",
"reference_id": "AWS.AIRP.IAM.HIGH.0051",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure IAM policies are attached only to groups or roles",
"reference_id": "AC_AWS_049",
"reference_id": "AWS.AIUP.IAM.MEDIUM.0049",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure IAM permissions are not given directly to users",
"reference_id": "AC_AWS_050",
"reference_id": "AWS.AIUPA.IAM.MEDIUM.0050",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure that detailed monitoring is enabled for EC2 instances.",
"reference_id": "AC_AWS_070",
"reference_id": "AWS.AI.LM.HIGH.0070",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure rotation for customer created CMKs is enabled",
"reference_id": "AC_AWS_012",
"reference_id": "AWS.AKK.DP.HIGH.0012",
"category": "Data Protection",
"version": 2,
"id": "AC_AWS_0160"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure IAM policies do not have 'Principal' element missing from the policy statement.",
"reference_id": "AC_AWS_054",
"reference_id": "AWS.AKK.IAM.HIGH.0012",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure KMS key policy does not have wildcard policies attached.",
"reference_id": "AC_AWS_062",
"reference_id": "AWS.AKK.IAM.HIGH.0082",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS Lambda function has policy attached.",
"reference_id": "AC_AWS_063",
"reference_id": "AWS.LambdaFunction.LM.MEIDUM.0063",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure there is a one listener configured on HTTPs or with a port 443",
"reference_id": "AC_AWS_046",
"reference_id": "AWS.ALL.IS.MEDIUM.0046",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Target Group use HTTPs to ensure end to end encryption",
"reference_id": "AC_AWS_042",
"reference_id": "AWS.ALTG.IS.MEDIUM.0042",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Neptune Cluster is Encrypted",
"reference_id": "AC_AWS_030",
"reference_id": "AWS.ANC.DP.MEDIUM.0030",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS Neptune clusters have logging enabled.",
"reference_id": "AC_AWS_075",
"reference_id": "AWS.ANC.LM.MEDIUM.0075",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure backup retention period is set for rds cluster",
"reference_id": "AC_AWS_013",
"reference_id": "AWS.RDS.RE.MEDIUM.0013",
"category": "Resilience",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure S3 buckets do not have, a both public ACL on the bucket and a public access block.",
"reference_id": "AC_AWS_065",
"reference_id": "AWS.S3Bucket.IAM.HIGH.0065",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure S3 buckets have access logging enabled.",
"reference_id": "AC_AWS_078",
"reference_id": "AWS.S3Bucket.LM.MEDIUM.0078",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure S3 object is Encrypted",
"reference_id": "AC_AWS_034",
"reference_id": "AWS.ASBO.DP.MEDIUM.0034",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure SageMaker Instance is Encrypted",
"reference_id": "AC_AWS_035",
"reference_id": "AWS.ASNI.DP.MEDIUM.0035",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure SecretsManager Secrets are Encrypted using KMS key",
"reference_id": "AC_AWS_036",
"reference_id": "AWS.SecretsManagerSecret.DP.MEDIUM.0036",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure secrets manager do not wildcard policies attached",
"reference_id": "AC_AWS_066",
"reference_id": "AWS.ASSP.IAM.HIGH.0066",
"category": "Identity and Access Management",
"version": 1
}
Loading