Skip to content

Commit

Permalink
AWS new Categories (#581)
Browse files Browse the repository at this point in the history
* aws category and rule_ids change

* Fixing changes as requested after review

* final changes
  • Loading branch information
harkirat22 authored Mar 9, 2021
1 parent dbb5a91 commit cca6d2f
Show file tree
Hide file tree
Showing 167 changed files with 371 additions and 401 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable AWS AMI Encryption",
"reference_id": "AWS.EC2.Encryption\u0026KeyManagement.Medium.0688",
"category": "Encryption \u0026 KeyManagement",
"reference_id": "AC-AW-IS-AM-M-0005",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "MEDIUM",
"description": "Limit access to AWS AMIs",
"reference_id": "AWS.AMI.NS.Medium.1040",
"category": "Network Security",
"reference_id": "AC-AW-IS-PE-M-0006",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable Detailed CloudWatch Metrics for APIs",
"reference_id": "AWS.API Gateway.Logging.Medium.0569",
"category": "Logging",
"reference_id": "AC-AW-LM-AG-M-0007",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable Content Encoding",
"reference_id": "AWS.APIGateway.Medium.0568",
"category": " ",
"reference_id": "AC-AW-IS-AP-M-0010",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "API Gateway Private Endpoints",
"reference_id": "AWS.APIGateway.Network Security.Medium.0570",
"category": "Network Security",
"reference_id": "AC-AW-IS-AP-M-0011",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable SSL Client Certificate",
"reference_id": "AWS.API Gateway.Network Security.Medium.0565",
"category": "Network Security",
"reference_id": "AC-AW-IS-AS-M-0013",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "MEDIUM",
"description": "Ensure that AWS CloudWatch logs are enabled for all your APIs created with Amazon API Gateway service in order to track and analyze execution behavior at the API stage level.",
"reference_id": "AWS.API Gateway.Logging.Medium.0572",
"category": "Logging",
"reference_id": "AC-AW-LM-AS-M-0012",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable AWS CloudWatch Logs for APIs",
"reference_id": "AWS.API Gateway.Logging.Medium.0567",
"category": "Logging",
"reference_id": "AC-AW-LM-AS-M-0014",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable Active Tracing",
"reference_id": "AWS.API Gateway.Logging.Medium.0571",
"category": "Logging",
"reference_id": "AC-AW-LM-AS-M-0015",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "Medium",
"description": "Insecure Cross-Origin Resource Sharing Configuration allowing all domains",
"reference_id": "AWS.ApiGatewayV2Api.AccessControl.0630",
"category": "AccessControl",
"reference_id": "AC-AW-SP-AG-M-0368",
"category": "Security Best Practices",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "Low",
"description": "AWS API Gateway V2 Stage is missing access logs",
"reference_id": "AWS.ApiGatewayV2Stage.Logging.0630",
"category": "Logging",
"reference_id": "AC-AW-SP-S2-L-0369",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"severity": "MEDIUM",
"description": "AWS CloudFormation Not In Use",
"reference_id": "AWS.CloudFormation.Medium.0599",
"category": " ",
"reference_id": "AC-AW-SP-CS-M-0019",
"category": "Security Best Practices",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"severity": "MEDIUM",
"description": "Enable AWS CloudFormation Stack Notifications",
"reference_id": "AWS.CloudFormation.Medium.0603",
"category": " ",
"reference_id": "AC-AW-SP-CS-M-0021",
"category": "Security Best Practices",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable AWS CloudFormation Stack Termination Protection",
"reference_id": "AWS.CloudFormation.Medium.0605",
"category": " ",
"reference_id": "AC-AW-SP-CS-M-0022",
"category": "Security Best Practices",
"version": 1
}

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "Secure ciphers are not used in CloudFront distribution",
"reference_id": "AWS.CloudFront.EncryptionandKeyManagement.High.0408",
"category": "Encryption and Key Management",
"reference_id": "AC-AW-DP-CD-H-0023",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "Use encrypted connection between CloudFront and origin server",
"reference_id": "AWS.CloudFront.EncryptionandKeyManagement.High.0407",
"category": "Encryption and Key Management",
"reference_id": "AC-AW-DP-CD-H-0024",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,9 @@
"template_args": {
"prefix": ""
},
"severity": "Medium",
"severity": "LOW",
"description": "Ensure that geo restriction is enabled for your Amazon CloudFront CDN distribution to whitelist or blacklist a country in order to allow or restrict users in specific locations from accessing web application content.",
"reference_id": "AC-AW-IS-CD-M-0026",
"reference_id": "AC-AW-IS-CD-L-0026",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "Medium",
"description": "Ensure that cloud-front has web application firewall enabled",
"reference_id": "AC-AW-IS-CD-M-1186",
"category": "Encryption and Key Management",
"reference_id": "AC-AW-IS-CD-M-0032",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "MEDIUM",
"description": "Ensure that your AWS Cloudfront distributions have the Logging feature enabled in order to track all viewer requests for the content delivered through the Content Delivery Network (CDN).",
"reference_id": "AWS.CloudFront.Logging.Medium.0567",
"category": "Logging",
"reference_id": "AC-AW-LM-CD-M-0025",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,8 @@
"prefix": ""
},
"severity": "HIGH",
"description": "Cloud Trail Log Not Enabled",
"reference_id": "AWS.CloudTrail.Logging.High.0399",
"category": "Logging",
"description": "Ensure CloudTrail logs are encrypted at rest using KMS CMKs",
"reference_id": "AC-AW-LM-CT-H-0033",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "MEDIUM",
"description": "Cloud Trail Multi Region not enabled",
"reference_id": "AWS.CloudTrail.Logging.Medium.0460",
"category": "Logging",
"reference_id": "AC-AW-LM-CT-M-0034",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "MEDIUM",
"description": "Ensure appropriate subscribers to each SNS topic",
"reference_id": "AWS.CloudTrail.Logging.Low.0559",
"category": "Logging",
"reference_id": "AC-AW-LM-CT-M-0035",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "AWS CloudWatch log group is not encrypted with a KMS CMK",
"reference_id": "AWS.CloudWatch.EncryptionandKeyManagement.High.0632",
"category": "Encryption and Key Management",
"reference_id": "AC-AW-DP-CW-H-0370",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "App-Tier CloudWatch Log Group Retention Period",
"reference_id": "AWS.CloudWatch.Logging.Medium.0631",
"category": "Logging",
"reference_id": "AC-AW-LM-CW-M-0041",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Ensure AWS Config Rule is enabled for Encrypted Volumes",
"reference_id": "AWS.Config.Encryption\u0026KeyManagement.Medium.0660",
"category": "Encryption \u0026 Key Management",
"reference_id": "AC-AW-DP-CO-M-0048",
"category": "Data Protection",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "Ensure AWS Config is enabled in all regions",
"reference_id": "AWS.Config.Logging.HIGH.0590",
"category": "Logging",
"reference_id": "AC-AW-LM-CC-H-0049",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "Ensure that your RDS database has IAM Authentication enabled.",
"reference_id": "AWS.RDS.DataSecurity.High.0577",
"category": "Data Security",
"reference_id": "AC-AW-DP-DI-H-0053",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "RDS Instance Auto Minor Version Upgrade flag disabled",
"reference_id": "AWS.RDS.DS.High.1041",
"category": "Data Security",
"reference_id": "AC-AW-DP-DI-H-0056",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "Ensure Certificate used in RDS instance is updated",
"reference_id": "AWS.RDS.DS.High.1042",
"category": "Data Security",
"reference_id": "AC-AW-DP-DI-H-0057",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure that your RDS database instances encrypt the underlying storage. Encrypted RDS instances use the industry standard AES-256 encryption algorithm to encrypt data on the server that hosts RDS DB instances. After data is encrypted, RDS handles authentication of access and descryption of data transparently with minimal impact on performance.",
"reference_id": "AWS.RDS.DataSecurity.High.0414",
"category": "Data Security",
"reference_id": "AC-AW-DP-DI-H-0058",
"category": "Data Protection",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "RDS Instance publicly_accessible flag is true",
"reference_id": "AWS.AWS RDS.NS.High.0101",
"category": "Network Security",
"reference_id": "AC-AW-IS-DI-H-0054",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "RDS should not be open to a large scope. Firewall and router configurations should be used to restrict connections between untrusted networks and any system components in the cloud environment.",
"reference_id": "AWS.RDS.NetworkSecurity.High.0103",
"category": "Network Security",
"reference_id": "AC-AW-IS-DS-H-0065",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "RDS should not be defined with public interface. Firewall and router configurations should be used to restrict connections between untrusted networks and any system components in the cloud environment.",
"reference_id": "AWS.RDS.NetworkSecurity.High.0101",
"category": "Network Security",
"reference_id": "AC-AW-IS-DS-H-0066",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
},
"severity": "HIGH",
"description": "RDS should not be open to a public scope. Firewall and router configurations should be used to restrict connections between untrusted networks and any system components in the cloud environment.",
"reference_id": "AWS.RDS.NetworkSecurity.High.0102",
"category": "Network Security",
"reference_id": "AC-AW-IS-DS-H-0067",
"category": "Infrastructure Security",
"version": 2
}
Loading

0 comments on commit cca6d2f

Please sign in to comment.