Conformance Packs Description
Revision | Date | Description |
|---|---|---|
| 24.07.2024 | Init Changelog |
Introduction
Rules in these conformance packs are supplementary to controls in AWS Security Hub Benchmarks.
OperationalBestPracticesForSecurityServices
Set of rules that checks best practices.
A set of rules that checks for best practices related to security and security monitoring services such as: CloudTrail, GuardDuty, IAM, Secret Managers, and SecurityHub.
Below is a list of rules in this conformance pack with their parameters and corresponding values listed:
account-part-of-organizationsacm-certificate-expiration-checkdaysToExpiration: 60guardduty-enabled-centralizedguardduty-non-archived-findingsdaysLowSev: 30 daysMediumSev: 7 daysHighSev: 1iam-group-has-users-checkiam-password-policyRequireUppercaseCharacters: true RequireLowercaseCharacters: true RequireSymbols: true RequireNumbers: true MinimumPasswordLength: 20 PasswordReusePrevention: 24 MaxPasswordAge: 90iam-user-group-membership-checksecurityhub-enabledwafv2-logging-enabledsecretsmanager-secret-periodic-rotationmaxDaysSinceRotation: 90iam-user-unused-credentials-check(replacing IAM.8 Security Hub control due to shorter maxCredentialUsageAge)maxCredentialUsageAge: 30
OperationalBestPracticesForEncryptionAndKeys
A set of rules that checks for best practices related to encryption and keys.
Below is a list of rules in this conformance pack with their parameters and corresponding values listed:
api-gw-cache-enabled-and-encryptedelasticsearch-node-to-node-encryption-checkelbv2-acm-certificate-requiredsagemaker-endpoint-configuration-kms-key-configuredsagemaker-notebook-instance-kms-key-configuredRdsClusterStorageEncryptedElasticacheRedisEncryptedAtRestElasticacheRedisTransitEncryptiondynamodb-table-encryption-enabledkinesis-stream-encryptedapi-gw-ssl-enableds3-default-encryption-kms
OperationalBestPracticesForStorageServices
A set of rules that checks for best practices related to data storage services, focused mainly on backups.
Below is a list of rules in this conformance pack with their parameters and corresponding values listed:
fsx-resources-protected-by-backup-planstoragegateway-resources-protected-by-backup-planvirtualmachine-resources-protected-by-backup-plandynamodb-in-backup-planrds-resources-protected-by-backup-planrds-in-backup-planec2-resources-protected-by-backup-plan
AdditionalSecurityComplianceChecks
A set of rules that checks for best practices related to security and log collection. This is a package that extends the "OperationalBestPracticesForSecurityServices".
Below is a list of rules in this conformance pack with their parameters and corresponding values listed:
emr-kerberos-enabledcloudtrail-s3-dataevents-enabledcloudtrail-security-trail-enabledcloudwatch-alarm-action-checkalarmActionRequired: true insufficientDataActionRequired: true okActionRequired: truecw-loggroup-retention-period-checkMinRetentionTime: 7restricted-ssh(ID: INCOMING_SSH_DISABLED)ec2-instances-in-vpc(ID: INSTANCES_IN_VPC)ec2-no-amazon-key-pairec2-volume-inuse-checkecs-task-definition-nonroot-userecs-task-definition-memory-hard-limitautoscaling-capacity-rebalancingeks-endpoint-no-public-accessapproved-amis-by-tagamisByTagKeyAndValue: "hardened:true"CheckSNSEmailSubscribersdomain_regex: “^.*?t-mobile\.pl$”
ISO27001ConformancePack
A set of rules that checks if AWS resources comply with ISO27001 standards.
Below is a list of rules in this conformance pack with their parameters and corresponding values listed:
EksAuditLoggingEnabledRuleNoEC2InstanceOlderThanYearAge: 365AccessAnalyzerNoFindingsACMCertificateTransparencyLoggingAllElasticLoadBalancersAreNotInternetFacingAmisArePrivateCheckTrustedAdvisorCloudtrailLogsBucketIsPrivateEc2SnapshotsAreEncryptedEcrReposArePrivateEcrScanFoundVulnerabilitiesIAMUserActiveKeysLambdasInvokeAPICloudtrailPublicHostedZonesLoggingSecurityGroupNoEmptyIngressSgHasNoPublicIngressSNSAccessNotPublicSQSAccessNotPublicSqsEncryptedAtRestSsmSessionDocumentsHaveLoggingeip-attachedec2-instance-profile-attached
TagEnforcingConformancePack
A set of rules that checks if AWS resources are tagged according to established policies.
Tags that will be checked by rules are defined according to Naming and Tagging convention document.
Below is a list of checked resource types. Each resource type has its own rule:
AWS::EC2::CustomerGatewayAWS::EC2::InternetGatewayAWS::EC2::RouteTableAWS::EC2::SubnetAWS::EC2::VPCAWS::EC2::VPNConnectionAWS::EC2::VPNGatewayAWS::EC2::InstanceAWS::EC2::SecurityGroupAWS::EC2::NatGatewayAWS::EC2::TransitGatewayAWS::EC2::VPCEndpointAWS::EC2::VPCEndpointServiceAWS::EC2::VPCPeeringConnectionAWS::RDS::DBInstanceAWS::RDS::DBClusterAWS::EKS::ClusterAWS::ECS::ClusterAWS::Lambda::FunctionAWS::S3::BucketAWS::DynamoDB::TableAWS::AutoScaling::AutoScalingGroupAWS::ElasticLoadBalancingV2::LoadBalancer