-
Notifications
You must be signed in to change notification settings - Fork 63
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #838 from turbot/release/v1.1.0
Release/v1.1.0
- Loading branch information
Showing
137 changed files
with
4,029 additions
and
177 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
locals { | ||
cis_v400_common_tags = merge(local.aws_compliance_common_tags, { | ||
cis = "true" | ||
cis_version = "v4.0.0" | ||
}) | ||
} | ||
|
||
benchmark "cis_v400" { | ||
title = "CIS v4.0.0" | ||
description = "The CIS Amazon Web Services Foundations Benchmark provides prescriptive guidance for configuring security options for a subset of Amazon Web Services with an emphasis on foundational, testable, and architecture agnostic settings." | ||
documentation = file("./cis_v400/docs/cis_overview.md") | ||
children = [ | ||
benchmark.cis_v400_1, | ||
benchmark.cis_v400_2, | ||
benchmark.cis_v400_3, | ||
benchmark.cis_v400_4, | ||
benchmark.cis_v400_5 | ||
] | ||
|
||
tags = merge(local.cis_v400_common_tags, { | ||
type = "Benchmark" | ||
}) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,82 @@ | ||
To obtain the latest version of the official guide, please visit http://benchmarks.cisecurity.org. | ||
|
||
## Overview | ||
|
||
All CIS BenchmarksTM focus on technical configuration settings used to maintain and/or increase the security of the addressed technology, and they should be used in conjunction with other essential cyber hygiene tasks like: | ||
|
||
- Monitoring the base operating system and applications for vulnerabilities and quickly updating with the latest security patches. | ||
- End-point protection (Antivirus software, Endpoint Detection and Response (EDR), etc.). | ||
- Logging and monitoring user and system activity. | ||
|
||
In the end, the CIS BenchmarksTM are designed to be a key component of a comprehensive cybersecurity program. | ||
|
||
### Important Usage Information | ||
|
||
All CIS BenchmarksTM are available free for non-commercial use from the [CIS Website](https://www.cisecurity.org/cis-benchmarks). They can be used to manually assess and remediate systems and applications. In lieu of manual assessment and remediation, there are several tools available to assist with assessment: | ||
- [CIS Configuration Assessment Tool (CIS-CAT® Pro Assessor)](https://www.cisecurity.org/cybersecurity-tools/cis-cat-pro) | ||
- [CIS BenchmarksTM Certified 3rd Party Tooling](https://www.cisecurity.org/cis-securesuite/members/vendors) | ||
|
||
These tools make the hardening process much more scalable for large numbers of systems and applications. | ||
|
||
### NOTE: | ||
Some tooling focuses only on the CIS BenchmarksTM Recommendations that can be fully automated (skipping ones marked Manual). It is important that ALL Recommendations (Automated and Manual) be addressed, since all are important for properly securing systems and are typically in scope for audits. | ||
|
||
In addition, CIS has developed CIS [Build Kits](https://www.cisecurity.org/cis-securesuite/cis-securesuite-build-kit-content) for some common technologies to assist in applying CIS BenchmarksTM Recommendations. | ||
|
||
When remediating systems (changing configuration settings on deployed systems as per the CIS BenchmarksTM Recommendations), please approach this with caution and test thoroughly. | ||
|
||
|
||
The following is a reasonable remediation approach to follow: | ||
|
||
1. NEVER deploy a CIS Build Kit, or any internally developed remediation method, to production systems without proper testing. | ||
2. Proper testing consists of the following: | ||
- Understand the configuration (including installed applications) of the targeted systems. | ||
- Read the Impact section of the given Recommendation to help determine if there might be an issue with the targeted systems. | ||
- Test the configuration changes on representative lab system(s). This way if there is some issue it can be resolved prior to deploying to any production systems. | ||
- When confident, initially deploy to a small sub-set of users and monitor closely for issues. This way if there is some issue it can be resolved prior to deploying more broadly. | ||
- When confident, iteratively deploy to additional groups and monitor closely for issues until deployment is complete. This way if there is some issue it can be resolved prior to continuing deployment. | ||
|
||
### NOTE: | ||
CIS and the CIS BenchmarksTM development communities in CIS WorkBench do their best to test and have high confidence in the Recommendations, but they cannot test potential conflicts with all possible system deployments. Known potential issues identified during CIS BenchmarksTM development are documented in the Impact section of each Recommendation. | ||
|
||
By using CIS and/or CIS BenchmarksTM Certified tools, and being careful with remediation deployment, it is possible to harden large numbers of deployed systems in a cost effective, efficient, and safe manner. | ||
|
||
### NOTE: | ||
As previously stated, the PDF versions of the CIS BenchmarksTM are available for free, non-commercial use on the [CIS Website](https://www.cisecurity.org/cis-benchmarks). All other formats of the CIS BenchmarksTM (MS Word, Excel, and [Build Kits](https://www.cisecurity.org/cis-securesuite/cis-securesuite-build-kit-content)) are available for CIS [SecureSuite®](https://www.cisecurity.org/cis-securesuite) members. | ||
|
||
CIS-CAT® Pro is also available to CIS [SecureSuite®](https://www.cisecurity.org/cis-securesuite) members. | ||
|
||
### Target Technology Details | ||
|
||
This document provides prescriptive guidance for configuring security options for a subset of Amazon Web Services with an emphasis on foundational, testable, and architecture agnostic settings. Some of the specific Amazon Web Services in scope for this document include: | ||
|
||
- AWS Identity and Access Management (IAM) | ||
- IAM Access Analyzer | ||
- AWS Config | ||
- AWS CloudTrail | ||
- AWS CloudWatch | ||
- AWS Simple Notification Service (SNS) | ||
- AWS Simple Storage Service (S3) | ||
- Elastic Compute Cloud (EC2) | ||
- Relational Database Service (RDS) | ||
- AWS VPC | ||
|
||
## Profiles Definitions | ||
|
||
The following configuration profiles are defined by this Benchmark: | ||
|
||
### Level 1 | ||
|
||
Items in this profile intend to: | ||
- be practical and prudent; | ||
- provide security focused best practice hardening of a technology; and | ||
- limit impact to the utility of the technology beyond acceptable means. | ||
|
||
### Level 2 | ||
|
||
This profile extends the "Level 1" profile. Items in this profile exhibit one or more | ||
of the following characteristics: | ||
- are intended for environments or use cases where security is more critical than manageability and usability | ||
- acts as defense in depth measure | ||
- may impact the utility or performance of the technology | ||
- may include additional licensing, cost, or addition of third party software |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
## Overview | ||
|
||
This section contains recommendations for configuring identity and access management related options. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
## Description | ||
|
||
Ensure contact email and telephone details for AWS accounts are current and map to more than one individual in your organization. | ||
|
||
An AWS account supports a number of contact details, and AWS will use these to contact the account owner if activity judged to be in breach of Acceptable Use Policy or indicative of likely security compromise is observed by the AWS Abuse team. Contact details should not be for a single individual, as circumstances may arise where that individual is unavailable. Email contact details should point to a mail alias which forwards email to multiple individuals within the organization; where feasible, phone contact details should point to a PABX hunt group or other call-forwarding system. | ||
|
||
If an AWS account is observed to be behaving in a prohibited or suspicious manner, AWS will attempt to contact the account owner by email and phone using the contact details listed. If this is unsuccessful and the account behavior needs urgent mitigation, proactive measures may be taken, including throttling of traffic between the account exhibiting suspicious behavior and the AWS API endpoints and the Internet. This will result in impaired service to and from the account in question, so it is in both the customers' and AWS' best interests that prompt contact can be established. This is best achieved by setting AWS account contact details to point to resources which have multiple individuals as recipients, such as email aliases and PABX hunt groups. | ||
|
||
## Remediation | ||
|
||
This activity can only be performed via the AWS Console, with a user who has permission to read and write Billing information (aws-portal:*Billing). | ||
1. Sign in to the AWS Management Console and open the `Billing and Cost Management` console at https://console.aws.amazon.com/billing/home#/. | ||
2. On the navigation bar, choose your account name, and then choose `Account`. | ||
3. On the `Account Settings` page, next to `Account Settings`, choose `Edit`. | ||
4. Next to the field that you need to update, choose `Edit`. | ||
5. After you have entered your changes, choose `Save changes`. | ||
6. After you have made your changes, choose `Done`. | ||
7. To edit your contact information, under `Contact Information`, choose `Edit`. | ||
8. For the fields that you want to change, type your updated information, and then choose `Update`. |
Oops, something went wrong.