1. Docs
  2. Pulumi IaC
  3. Using Pulumi
  4. Policy as code
  5. Compliance Ready Aws Policies

List of Compliance Ready Policies for Aws

There’s a total of 93 Compliance Ready Policies for the Aws provider.

All those policies are available in the @pulumi/aws-compliance-policies package.

Please refer to our Documentation for more details.

alb

Listener

aws-alb-listener-configure-secure-tls

Policy name: aws-alb-listener-configure-secure-tls

Code path: aws.alb.Listener.configureSecureTls

Checks that ALB Load Balancers uses secure/modern TLS encryption.

Service: Alb

Resource: Listener

Associated metadata for this policy:

Severity: high

Frameworks: iso27001, pcidss

Topics: encryption, network

Link: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html#describe-ssl-policies

aws-alb-listener-disallow-unencrypted-traffic

Policy name: aws-alb-listener-disallow-unencrypted-traffic

Code path: aws.alb.Listener.disallowUnencryptedTraffic

Check that ALB Load Balancers do not allow unencrypted (HTTP) traffic.

Service: Alb

Resource: Listener

Associated metadata for this policy:

Severity: critical

Frameworks: iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html

LoadBalancer

aws-alb-loadbalancer-configure-access-logging

Policy name: aws-alb-loadbalancer-configure-access-logging

Code path: aws.alb.LoadBalancer.configureAccessLogging

Checks that ALB loadbalancers have access logging configured and enabled.

Service: Alb

Resource: LoadBalancer

Associated metadata for this policy:

Severity: medium

Frameworks: iso27001, pcidss

Topics: logging, network

Link: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-access-logs.html

aws-alb-loadbalancer-enable-access-logging

Policy name: aws-alb-loadbalancer-enable-access-logging

Code path: aws.alb.LoadBalancer.enableAccessLogging

Checks that ALB loadbalancers have access logging enabled.

Service: Alb

Resource: LoadBalancer

Associated metadata for this policy:

Severity: medium

Frameworks: iso27001, pcidss

Topics: logging, network

Link: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-access-logs.html

apigateway

DomainName

aws-apigateway-domainname-configure-security-policy

Policy name: aws-apigateway-domainname-configure-security-policy

Code path: aws.apigateway.DomainName.configureSecurityPolicy

Checks that ApiGateway Domain Name Security Policy uses secure/modern TLS encryption.

Service: Apigateway

Resource: DomainName

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, network

Link: https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-custom-domain-tls-version.html

apigatewayv2

DomainName

aws-apigatewayv2-domainname-configure-domain-name-security-policy

Policy name: aws-apigatewayv2-domainname-configure-domain-name-security-policy

Code path: aws.apigatewayv2.DomainName.configureDomainNameSecurityPolicy

Checks that any ApiGatewayV2 Domain Name Security Policy uses secure/modern TLS encryption.

Service: Apigatewayv2

Resource: DomainName

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, network

Link: https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-custom-domain-tls-version.html

aws-apigatewayv2-domainname-enable-domain-name-configuration

Policy name: aws-apigatewayv2-domainname-enable-domain-name-configuration

Code path: aws.apigatewayv2.DomainName.enableDomainNameConfiguration

Checks that any ApiGatewayV2 Domain Name Configuration is enabled.

Service: Apigatewayv2

Resource: DomainName

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-custom-domain-tls-version.html

Stage

aws-apigatewayv2-stage-configure-access-logging

Policy name: aws-apigatewayv2-stage-configure-access-logging

Code path: aws.apigatewayv2.Stage.configureAccessLogging

Checks that any ApiGatewayV2 Stages have access logging configured.

Service: Apigatewayv2

Resource: Stage

Associated metadata for this policy:

Severity: medium

Frameworks: hitrust, iso27001, pcidss

Topics: logging, network

Link: https://docs.aws.amazon.com/apigateway/latest/developerguide/set-up-logging.html

aws-apigatewayv2-stage-enable-access-logging

Policy name: aws-apigatewayv2-stage-enable-access-logging

Code path: aws.apigatewayv2.Stage.enableAccessLogging

Checks that any ApiGatewayV2 Stages have access logging enabled.

Service: Apigatewayv2

Resource: Stage

Associated metadata for this policy:

Severity: medium

Frameworks: hitrust, iso27001, pcidss

Topics: logging, network

Link: https://docs.aws.amazon.com/apigateway/latest/developerguide/set-up-logging.html

appflow

ConnectorProfile

aws-appflow-connectorprofile-configure-customer-managed-key

Policy name: aws-appflow-connectorprofile-configure-customer-managed-key

Code path: aws.appflow.ConnectorProfile.configureCustomerManagedKey

Check that AppFlow ConnectorProfile uses a customer-managed KMS key.

Service: Appflow

Resource: ConnectorProfile

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/appflow/latest/userguide/data-protection.html#encryption-transit

Flow

aws-appflow-flow-configure-customer-managed-key

Policy name: aws-appflow-flow-configure-customer-managed-key

Code path: aws.appflow.Flow.configureCustomerManagedKey

Check that AppFlow Flow uses a customer-managed KMS key.

Service: Appflow

Resource: Flow

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/appflow/latest/userguide/data-protection.html#encryption-transit

aws-appflow-flow-missing-description

Policy name: aws-appflow-flow-missing-description

Code path: aws.appflow.Flow.missingDescription

Checks that AppFlow Flows have a description.

Service: Appflow

Resource: Flow

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/appflow/latest/userguide/create-flow-console.html

athena

DataCatalog

aws-athena-datacatalog-missing-description

Policy name: aws-athena-datacatalog-missing-description

Code path: aws.athena.DataCatalog.missingDescription

Checks that Athena DataCatalogs have a description.

Service: Athena

Resource: DataCatalog

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/athena/latest/ug/understanding-tables-databases-and-the-data-catalog.html

Database

aws-athena-database-configure-customer-managed-key

Policy name: aws-athena-database-configure-customer-managed-key

Code path: aws.athena.Database.configureCustomerManagedKey

Checks that Athena Databases storage uses a customer-managed-key.

Service: Athena

Resource: Database

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/athena/latest/ug/encryption.html

aws-athena-database-disallow-unencrypted-database

Policy name: aws-athena-database-disallow-unencrypted-database

Code path: aws.athena.Database.disallowUnencryptedDatabase

Checks that Athena Databases storage is encrypted.

Service: Athena

Resource: Database

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/athena/latest/ug/encryption.html

aws-athena-database-missing-description

Policy name: aws-athena-database-missing-description

Code path: aws.athena.Database.missingDescription

Checks that Athena Databases have a description.

Service: Athena

Resource: Database

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/athena/latest/ug/creating-databases.html

NamedQuery

aws-athena-namedquery-missing-description

Policy name: aws-athena-namedquery-missing-description

Code path: aws.athena.NamedQuery.missingDescription

Checks that Athena NamedQueries have a description.

Service: Athena

Resource: NamedQuery

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/athena/latest/ug/saved-queries.html

Workgroup

aws-athena-workgroup-configure-customer-managed-key

Policy name: aws-athena-workgroup-configure-customer-managed-key

Code path: aws.athena.Workgroup.configureCustomerManagedKey

Checks that Athena Workgroups use a customer-managed-key.

Service: Athena

Resource: Workgroup

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/athena/latest/ug/workgroups-procedure.html

aws-athena-workgroup-disallow-unencrypted-workgroup

Policy name: aws-athena-workgroup-disallow-unencrypted-workgroup

Code path: aws.athena.Workgroup.disallowUnencryptedWorkgroup

Checks that Athena Workgroups are encrypted.

Service: Athena

Resource: Workgroup

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/athena/latest/ug/workgroups-procedure.html

aws-athena-workgroup-enforce-configuration

Policy name: aws-athena-workgroup-enforce-configuration

Code path: aws.athena.Workgroup.enforceConfiguration

Checks that Athena Workgroups enforce their configuration to their clients.

Service: Athena

Resource: Workgroup

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/athena/latest/ug/workgroups-procedure.html

aws-athena-workgroup-missing-description

Policy name: aws-athena-workgroup-missing-description

Code path: aws.athena.Workgroup.missingDescription

Checks that Athena Workgroups have a description.

Service: Athena

Resource: Workgroup

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/athena/latest/ug/workgroups-procedure.html

cloudfront

Distribution

aws-cloudfront-distribution-configure-access-logging

Policy name: aws-cloudfront-distribution-configure-access-logging

Code path: aws.cloudfront.Distribution.configureAccessLogging

Checks that any CloudFront distributions have access logging configured.

Service: Cloudfront

Resource: Distribution

Associated metadata for this policy:

Severity: medium

Frameworks: hitrust, iso27001, pcidss

Topics: logging, network

Link: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/AccessLogs.html

aws-cloudfront-distribution-configure-secure-tls

Policy name: aws-cloudfront-distribution-configure-secure-tls

Code path: aws.cloudfront.Distribution.configureSecureTls

Checks that CloudFront distributions uses secure/modern TLS encryption.

Service: Cloudfront

Resource: Distribution

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, network

Link: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html

aws-cloudfront-distribution-configure-secure-tls-to-origin

Policy name: aws-cloudfront-distribution-configure-secure-tls-to-origin

Code path: aws.cloudfront.Distribution.configureSecureTlsToOrigin

Checks that CloudFront distributions communicate with custom origins using TLS 1.2 encryption only.

Service: Cloudfront

Resource: Distribution

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, network

Link: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https-cloudfront-to-s3-origin.html

aws-cloudfront-distribution-configure-waf

Policy name: aws-cloudfront-distribution-configure-waf

Code path: aws.cloudfront.Distribution.configureWaf

Checks that any CloudFront distribution has a WAF ACL associated.

Service: Cloudfront

Resource: Distribution

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/waf/latest/developerguide/cloudfront-features.html

aws-cloudfront-distribution-disallow-unencrypted-traffic

Policy name: aws-cloudfront-distribution-disallow-unencrypted-traffic

Code path: aws.cloudfront.Distribution.disallowUnencryptedTraffic

Checks that CloudFront distributions only allow encypted ingress traffic.

Service: Cloudfront

Resource: Distribution

Associated metadata for this policy:

Severity: critical

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol

aws-cloudfront-distribution-enable-access-logging

Policy name: aws-cloudfront-distribution-enable-access-logging

Code path: aws.cloudfront.Distribution.enableAccessLogging

Checks that any CloudFront distributions have access logging enabled.

Service: Cloudfront

Resource: Distribution

Associated metadata for this policy:

Severity: medium

Frameworks: hitrust, iso27001, pcidss

Topics: logging, network

Link: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/AccessLogs.html

aws-cloudfront-distribution-enable-tls-to-origin

Policy name: aws-cloudfront-distribution-enable-tls-to-origin

Code path: aws.cloudfront.Distribution.enableTlsToOrigin

Checks that CloudFront distributions communicate with custom origins using TLS encryption.

Service: Cloudfront

Resource: Distribution

Associated metadata for this policy:

Severity: critical

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, network

Link: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https-cloudfront-to-s3-origin.html

ebs

Volume

aws-ebs-volume-configure-customer-managed-key

Policy name: aws-ebs-volume-configure-customer-managed-key

Code path: aws.ebs.Volume.configureCustomerManagedKey

Check that encrypted EBS volumes use a customer-managed KMS key.

Service: Ebs

Resource: Volume

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html

aws-ebs-volume-disallow-unencrypted-volume

Policy name: aws-ebs-volume-disallow-unencrypted-volume

Code path: aws.ebs.Volume.disallowUnencryptedVolume

Checks that EBS volumes are encrypted.

Service: Ebs

Resource: Volume

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html

ec2

Instance

aws-ec2-instance-disallow-public-ip

Policy name: aws-ec2-instance-disallow-public-ip

Code path: aws.ec2.Instance.disallowPublicIp

Checks that EC2 instances do not have a public IP address.

Service: Ec2

Resource: Instance

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: network

aws-ec2-instance-disallow-unencrypted-block-device

Policy name: aws-ec2-instance-disallow-unencrypted-block-device

Code path: aws.ec2.Instance.disallowUnencryptedBlockDevice

Checks that EC2 instances do not have unencrypted block devices.

Service: Ec2

Resource: Instance

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html

aws-ec2-instance-disallow-unencrypted-root-block-device

Policy name: aws-ec2-instance-disallow-unencrypted-root-block-device

Code path: aws.ec2.Instance.disallowUnencryptedRootBlockDevice

Checks that EC2 instances does not have unencrypted root volumes.

Service: Ec2

Resource: Instance

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/RootDeviceStorage.html

LaunchConfiguration

aws-ec2-launchconfiguration-disallow-public-ip

Policy name: aws-ec2-launchconfiguration-disallow-public-ip

Code path: aws.ec2.LaunchConfiguration.disallowPublicIp

Checks that EC2 Launch Configurations do not have a public IP address.

Service: Ec2

Resource: LaunchConfiguration

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-instance-addressing.html

aws-ec2-launchconfiguration-disallow-unencrypted-block-device

Policy name: aws-ec2-launchconfiguration-disallow-unencrypted-block-device

Code path: aws.ec2.LaunchConfiguration.disallowUnencryptedBlockDevice

Checks that EC2 Launch Configurations do not have unencrypted block devices.

Service: Ec2

Resource: LaunchConfiguration

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html

aws-ec2-launchconfiguration-disallow-unencrypted-root-block-device

Policy name: aws-ec2-launchconfiguration-disallow-unencrypted-root-block-device

Code path: aws.ec2.LaunchConfiguration.disallowUnencryptedRootBlockDevice

Checks that EC2 launch configuration do not have unencrypted root block device.

Service: Ec2

Resource: LaunchConfiguration

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/RootDeviceStorage.html

LaunchTemplate

aws-ec2-launchtemplate-configure-customer-managed-key

Policy name: aws-ec2-launchtemplate-configure-customer-managed-key

Code path: aws.ec2.LaunchTemplate.configureCustomerManagedKey

Check that encrypted EBS volume uses a customer-managed KMS key.

Service: Ec2

Resource: LaunchTemplate

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html

aws-ec2-launchtemplate-disallow-public-ip

Policy name: aws-ec2-launchtemplate-disallow-public-ip

Code path: aws.ec2.LaunchTemplate.disallowPublicIp

Checks that EC2 Launch Templates do not have public IP addresses.

Service: Ec2

Resource: LaunchTemplate

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-instance-addressing.html

aws-ec2-launchtemplate-disallow-unencrypted-block-device

Policy name: aws-ec2-launchtemplate-disallow-unencrypted-block-device

Code path: aws.ec2.LaunchTemplate.disallowUnencryptedBlockDevice

Checks that EC2 Launch Templates do not have unencrypted block device.

Service: Ec2

Resource: LaunchTemplate

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html

SecurityGroup

aws-ec2-securitygroup-disallow-inbound-http-traffic

Policy name: aws-ec2-securitygroup-disallow-inbound-http-traffic

Code path: aws.ec2.SecurityGroup.disallowInboundHttpTraffic

Check that EC2 Security Groups do not allow inbound HTTP traffic.

Service: Ec2

Resource: SecurityGroup

Associated metadata for this policy:

Severity: critical

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, network

Link: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol

aws-ec2-securitygroup-disallow-public-internet-ingress

Policy name: aws-ec2-securitygroup-disallow-public-internet-ingress

Code path: aws.ec2.SecurityGroup.disallowPublicInternetIngress

Check that EC2 Security Groups do not allow ingress traffic from the Internet.

Service: Ec2

Resource: SecurityGroup

Associated metadata for this policy:

Severity: critical

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html

aws-ec2-securitygroup-missing-description

Policy name: aws-ec2-securitygroup-missing-description

Code path: aws.ec2.SecurityGroup.missingDescription

Checks that all security groups have a description.

Service: Ec2

Resource: SecurityGroup

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-security-groups.html

aws-ec2-securitygroup-missing-egress-rule-description

Policy name: aws-ec2-securitygroup-missing-egress-rule-description

Code path: aws.ec2.SecurityGroup.missingEgressRuleDescription

Checks that all Egress Security Groups rules have a description.

Service: Ec2

Resource: SecurityGroup

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-security-groups.html

aws-ec2-securitygroup-missing-ingress-rule-description

Policy name: aws-ec2-securitygroup-missing-ingress-rule-description

Code path: aws.ec2.SecurityGroup.missingIngressRuleDescription

Checks that all Ingress Security Groups rules have a description.

Service: Ec2

Resource: SecurityGroup

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-security-groups.html

ecr

Repository

aws-ecr-repository-configure-customer-managed-key

Policy name: aws-ecr-repository-configure-customer-managed-key

Code path: aws.ecr.Repository.configureCustomerManagedKey

Checks that ECR repositories use a customer-managed KMS key.

Service: Ecr

Resource: Repository

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: container, encryption, storage

Link: https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html

aws-ecr-repository-configure-image-scan

Policy name: aws-ecr-repository-configure-image-scan

Code path: aws.ecr.Repository.configureImageScan

Checks that ECR repositories have ‘scan-on-push’ configured.

Service: Ecr

Resource: Repository

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: container, vulnerability

Link: https://docs.aws.amazon.com/AmazonECR/latest/userguide/image-scanning.html

aws-ecr-repository-disallow-mutable-image

Policy name: aws-ecr-repository-disallow-mutable-image

Code path: aws.ecr.Repository.disallowMutableImage

Checks that ECR Repositories have immutable images enabled.

Service: Ecr

Resource: Repository

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: container

Link: https://sysdig.com/blog/toctou-tag-mutability/

aws-ecr-repository-disallow-unencrypted-repository

Policy name: aws-ecr-repository-disallow-unencrypted-repository

Code path: aws.ecr.Repository.disallowUnencryptedRepository

Checks that ECR Repositories are encrypted.

Service: Ecr

Resource: Repository

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: container, encryption, storage

Link: https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html

aws-ecr-repository-enable-image-scan

Policy name: aws-ecr-repository-enable-image-scan

Code path: aws.ecr.Repository.enableImageScan

Checks that ECR repositories have ‘scan-on-push’ enabled.

Service: Ecr

Resource: Repository

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: container, vulnerability

Link: https://docs.aws.amazon.com/AmazonECR/latest/userguide/image-scanning.html

efs

FileSystem

aws-efs-filesystem-configure-customer-managed-key

Policy name: aws-efs-filesystem-configure-customer-managed-key

Code path: aws.efs.FileSystem.configureCustomerManagedKey

Check that encrypted EFS File system uses a customer-managed KMS key.

Service: Efs

Resource: FileSystem

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html

aws-efs-filesystem-disallow-single-availability-zone

Policy name: aws-efs-filesystem-disallow-single-availability-zone

Code path: aws.efs.FileSystem.disallowSingleAvailabilityZone

Check that EFS File system doesn’t use single availability zone.

Service: Efs

Resource: FileSystem

Associated metadata for this policy:

Severity: high

Frameworks: none

Topics: availability, storage

Link: https://docs.aws.amazon.com/efs/latest/ug/storage-classes.html

aws-efs-filesystem-disallow-unencrypted-file-system

Policy name: aws-efs-filesystem-disallow-unencrypted-file-system

Code path: aws.efs.FileSystem.disallowUnencryptedFileSystem

Checks that EFS File Systems do not have an unencrypted file system.

Service: Efs

Resource: FileSystem

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/efs/latest/ug/encryption-at-rest.html

eks

Cluster

aws-eks-cluster-disallow-api-endpoint-public-access

Policy name: aws-eks-cluster-disallow-api-endpoint-public-access

Code path: aws.eks.Cluster.disallowApiEndpointPublicAccess

Check that EKS Clusters API Endpoint are not publicly accessible.

Service: Eks

Resource: Cluster

Associated metadata for this policy:

Severity: critical

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html

aws-eks-cluster-enable-cluster-encryption-config

Policy name: aws-eks-cluster-enable-cluster-encryption-config

Code path: aws.eks.Cluster.enableClusterEncryptionConfig

Check that EKS Cluster Encryption Config is enabled.

Service: Eks

Resource: Cluster

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, kubernetes

Link: https://aws.amazon.com/blogs/containers/using-eks-encryption-provider-support-for-defense-in-depth/

elb

LoadBalancer

aws-elb-loadbalancer-configure-access-logging

Policy name: aws-elb-loadbalancer-configure-access-logging

Code path: aws.elb.LoadBalancer.configureAccessLogging

Check that ELB Load Balancers uses access logging.

Service: Elb

Resource: LoadBalancer

Associated metadata for this policy:

Severity: medium

Frameworks: hitrust, iso27001, pcidss

Topics: logging, network

aws-elb-loadbalancer-configure-multi-availability-zone

Policy name: aws-elb-loadbalancer-configure-multi-availability-zone

Code path: aws.elb.LoadBalancer.configureMultiAvailabilityZone

Check that ELB Load Balancers uses more than one availability zone.

Service: Elb

Resource: LoadBalancer

Associated metadata for this policy:

Severity: high

Frameworks: hitrust

Topics: availability, network

Link: https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/enable-disable-az.html

aws-elb-loadbalancer-disallow-unencrypted-traffic

Policy name: aws-elb-loadbalancer-disallow-unencrypted-traffic

Code path: aws.elb.LoadBalancer.disallowUnencryptedTraffic

Check that ELB Load Balancers do not allow unencrypted (HTTP) traffic.

Service: Elb

Resource: LoadBalancer

Associated metadata for this policy:

Severity: critical

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-https-load-balancers.html

aws-elb-loadbalancer-enable-health-check

Policy name: aws-elb-loadbalancer-enable-health-check

Code path: aws.elb.LoadBalancer.enableHealthCheck

Check that ELB Load Balancers have a health check enabled.

Service: Elb

Resource: LoadBalancer

Associated metadata for this policy:

Severity: high

Frameworks: hitrust

Topics: availability, network

Link: https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-healthchecks.html

iam

AccountPasswordPolicy

aws-iam-password-policy-minimum-password-length

Policy name: aws-iam-password-policy-minimum-password-length

Code path: aws.iam.AccountPasswordPolicy.minimumPasswordLength

Ensure IAM password policy requires minimum length of 14 or greater.

Service: Iam

Resource: AccountPasswordPolicy

Associated metadata for this policy:

Severity: high

Frameworks: cis

Topics: vulnerability

Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_account-policy.html

aws-iam-password-policy-prevent-reuse

Policy name: aws-iam-password-policy-prevent-reuse

Code path: aws.iam.AccountPasswordPolicy.passwordReusePrevention

Ensure IAM password policy prevents password reuse.

Service: Iam

Resource: AccountPasswordPolicy

Associated metadata for this policy:

Severity: high

Frameworks: cis, hitrust

Topics: vulnerability

Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_account-policy.html

PolicyAttachment

aws-iam-policy-attachment-only-attachment-through-groups

Policy name: aws-iam-policy-attachment-only-attachment-through-groups

Code path: aws.iam.PolicyAttachment.onlyPermissionsViaGroups

Ensure IAM Users Receive Permissions Only Through Groups.

Service: Iam

Resource: PolicyAttachment

Associated metadata for this policy:

Severity: high

Frameworks: cis

Topics: vulnerability

Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups_manage_attach-policy.html

UserPolicyAttachment

aws-iam-user-policy-attachment-only-attachment-through-groups

Policy name: aws-iam-user-policy-attachment-only-attachment-through-groups

Code path: aws.iam.UserPolicyAttachment.onlyPermissionsViaGroups

Ensure IAM Users Receive Permissions Only Through Groups.

Service: Iam

Resource: UserPolicyAttachment

Associated metadata for this policy:

Severity: high

Frameworks: cis

Topics: vulnerability

Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups_manage_attach-policy.html

kms

Key

aws-kms-key-disallow-bypass-policy-lockout-safety-check

Policy name: aws-kms-key-disallow-bypass-policy-lockout-safety-check

Code path: aws.kms.Key.disallowBypassPolicyLockoutSafetyCheck

Checks that KMS Keys do not bypass the key policy lockout safety check.

Service: Kms

Resource: Key

Associated metadata for this policy:

Severity: critical

Frameworks: none

Topics: encryption

Link: https://docs.aws.amazon.com/kms/latest/developerguide/conditions-kms.html#conditions-kms-bypass-policy-lockout-safety-check

aws-kms-key-enable-key-rotation

Policy name: aws-kms-key-enable-key-rotation

Code path: aws.kms.Key.enableKeyRotation

Checks that KMS Keys have key rotation enabled.

Service: Kms

Resource: Key

Associated metadata for this policy:

Severity: medium

Frameworks: hitrust, iso27001, pcidss

Topics: encryption

Link: https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html

aws-kms-key-missing-description

Policy name: aws-kms-key-missing-description

Code path: aws.kms.Key.missingDescription

Checks that KMS Keys have a description.

Service: Kms

Resource: Key

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html

lambda

Function

aws-lambda-function-configure-tracing-config

Policy name: aws-lambda-function-configure-tracing-config

Code path: aws.lambda.Function.configureTracingConfig

Checks that Lambda functions have tracing configured.

Service: Lambda

Resource: Function

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: logging, performance

Link: https://docs.aws.amazon.com/lambda/latest/dg/services-xray.html

aws-lambda-function-enable-tracing-config

Policy name: aws-lambda-function-enable-tracing-config

Code path: aws.lambda.Function.enableTracingConfig

Checks that Lambda functions have tracing enabled.

Service: Lambda

Resource: Function

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: logging, performance

Link: https://docs.aws.amazon.com/lambda/latest/dg/services-xray.html

aws-lambda-function-missing-description

Policy name: aws-lambda-function-missing-description

Code path: aws.lambda.Function.missingDescription

Checks that all Lambda Functions have a description.

Service: Lambda

Resource: Function

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/lambda/latest/dg/getting-started.html

Permission

aws-lambda-permission-configure-source-arn

Policy name: aws-lambda-permission-configure-source-arn

Code path: aws.lambda.Permission.configureSourceArn

Checks that lambda function permissions have a source arn specified.

Service: Lambda

Resource: Permission

Associated metadata for this policy:

Severity: critical

Frameworks: hitrust, iso27001, pcidss

Topics: permissions, security

Link: https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-permission.html

rds

Cluster

aws-rds-cluster-configure-backup-retention

Policy name: aws-rds-cluster-configure-backup-retention

Code path: aws.rds.Cluster.configureBackupRetention

Checks that RDS Cluster backup retention policy is configured.

Service: Rds

Resource: Cluster

Associated metadata for this policy:

Severity: medium

Frameworks: iso27001, pcidss

Topics: backup, resilience

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithAutomatedBackups.html#USER_WorkingWithAutomatedBackups.BackupRetention

aws-rds-cluster-configure-customer-managed-key

Policy name: aws-rds-cluster-configure-customer-managed-key

Code path: aws.rds.Cluster.configureCustomerManagedKey

Checks that RDS Clusters storage uses a customer-managed KMS key.

Service: Rds

Resource: Cluster

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html

aws-rds-cluster-disallow-single-availability-zone

Policy name: aws-rds-cluster-disallow-single-availability-zone

Code path: aws.rds.Cluster.disallowSingleAvailabilityZone

Check that RDS Cluster doesn’t use single availability zone.

Service: Rds

Resource: Cluster

Associated metadata for this policy:

Severity: high

Frameworks: hitrust

Topics: availability

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/multi-az-db-clusters-concepts.html

aws-rds-cluster-disallow-unencrypted-storage

Policy name: aws-rds-cluster-disallow-unencrypted-storage

Code path: aws.rds.Cluster.disallowUnencryptedStorage

Checks that RDS Clusters storage is encrypted.

Service: Rds

Resource: Cluster

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html

aws-rds-cluster-enable-backup-retention

Policy name: aws-rds-cluster-enable-backup-retention

Code path: aws.rds.Cluster.enableBackupRetention

Checks that RDS Clusters backup retention policy is enabled.

Service: Rds

Resource: Cluster

Associated metadata for this policy:

Severity: medium

Frameworks: hitrust, iso27001, pcidss

Topics: backup, resilience

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithAutomatedBackups.html#USER_WorkingWithAutomatedBackups.BackupRetention

ClusterInstance

aws-rds-clusterinstance-disallow-public-access

Policy name: aws-rds-clusterinstance-disallow-public-access

Code path: aws.rds.ClusterInstance.disallowPublicAccess

Checks that RDS Cluster Instances public access is not enabled.

Service: Rds

Resource: ClusterInstance

Associated metadata for this policy:

Severity: critical

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_CommonTasks.Connect.html

aws-rds-clusterinstance-disallow-unencrypted-performance-insights

Policy name: aws-rds-clusterinstance-disallow-unencrypted-performance-insights

Code path: aws.rds.ClusterInstance.disallowUnencryptedPerformanceInsights

Checks that RDS Cluster Instances performance insights is encrypted.

Service: Rds

Resource: ClusterInstance

Associated metadata for this policy:

Severity: high

Frameworks: none

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html

aws-rds-clusterinstance-enable-performance-insights

Policy name: aws-rds-clusterinstance-enable-performance-insights

Code path: aws.rds.ClusterInstance.enablePerformanceInsights

Checks that RDS Cluster Instances have performance insights enabled.

Service: Rds

Resource: ClusterInstance

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: logging, performance

Link: https://aws.amazon.com/rds/performance-insights/

Instance

aws-rds-instance-configure-backup-retention

Policy name: aws-rds-instance-configure-backup-retention

Code path: aws.rds.Instance.configureBackupRetention

Checks that backup retention policy is adequate.

Service: Rds

Resource: Instance

Associated metadata for this policy:

Severity: medium

Frameworks: iso27001, pcidss

Topics: backup, resilience

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithAutomatedBackups.html#USER_WorkingWithAutomatedBackups.BackupRetention

aws-rds-instance-configure-customer-managed-key

Policy name: aws-rds-instance-configure-customer-managed-key

Code path: aws.rds.Instance.configureCustomerManagedKey

Checks that RDS Instance storage uses a customer-managed KMS key.

Service: Rds

Resource: Instance

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html

aws-rds-instance-disallow-public-access

Policy name: aws-rds-instance-disallow-public-access

Code path: aws.rds.Instance.disallowPublicAccess

Checks that RDS Instance public access is not enabled.

Service: Rds

Resource: Instance

Associated metadata for this policy:

Severity: critical

Frameworks: hitrust, iso27001, pcidss

Topics: network

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_CommonTasks.Connect.html

aws-rds-instance-disallow-unencrypted-performance-insights

Policy name: aws-rds-instance-disallow-unencrypted-performance-insights

Code path: aws.rds.Instance.disallowUnencryptedPerformanceInsights

Checks that RDS Instance performance insights is encrypted.

Service: Rds

Resource: Instance

Associated metadata for this policy:

Severity: high

Frameworks: none

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.htm

aws-rds-instance-disallow-unencrypted-storage

Policy name: aws-rds-instance-disallow-unencrypted-storage

Code path: aws.rds.Instance.disallowUnencryptedStorage

Checks that RDS instance storage is encrypted.

Service: Rds

Resource: Instance

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html

aws-rds-instance-enable-backup-retention

Policy name: aws-rds-instance-enable-backup-retention

Code path: aws.rds.Instance.enableBackupRetention

Checks that RDS Instances backup retention policy is enabled.

Service: Rds

Resource: Instance

Associated metadata for this policy:

Severity: medium

Frameworks: hitrust, iso27001, pcidss

Topics: backup, resilience

Link: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithAutomatedBackups.html#USER_WorkingWithAutomatedBackups.BackupRetention

aws-rds-instance-enable-performance-insights

Policy name: aws-rds-instance-enable-performance-insights

Code path: aws.rds.Instance.enablePerformanceInsights

Checks that RDS instances have performance insights enabled.

Service: Rds

Resource: Instance

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: logging, performance

Link: https://aws.amazon.com/rds/performance-insights/

s3

Bucket

aws-s3-bucket-configure-replication-configuration

Policy name: aws-s3-bucket-configure-replication-configuration

Code path: aws.s3.Bucket.configureReplicationConfiguration

Checks that S3 Bucket have cross-region replication configured.

Service: S3

Resource: Bucket

Associated metadata for this policy:

Severity: high

Frameworks: iso27001, pcidss

Topics: availability

Link: https://docs.aws.amazon.com/AmazonS3/latest/userguide/replication.html

aws-s3-bucket-configure-server-side-encryption-customer-managed-key

Policy name: aws-s3-bucket-configure-server-side-encryption-customer-managed-key

Code path: aws.s3.Bucket.configureServerSideEncryptionCustomerManagedKey

Check that S3 Buckets Server-Side Encryption (SSE) is using a customer-managed KMS Key.

Service: S3

Resource: Bucket

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AmazonS3/latest/userguide/specifying-kms-encryption.html

aws-s3-bucket-configure-server-side-encryption-kms

Policy name: aws-s3-bucket-configure-server-side-encryption-kms

Code path: aws.s3.Bucket.configureServerSideEncryptionKms

Check that S3 Buckets Server-Side Encryption (SSE) uses AWS KMS.

Service: S3

Resource: Bucket

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingKMSEncryption.html

aws-s3-bucket-disallow-public-read

Policy name: aws-s3-bucket-disallow-public-read

Code path: aws.s3.Bucket.disallowPublicRead

Checks that S3 Bucket ACLs don’t allow ‘public-read’ or ‘public-read-write’ or ‘authenticated-read’.

Service: S3

Resource: Bucket

Associated metadata for this policy:

Severity: critical

Frameworks: cis, hitrust, iso27001, pcidss

Topics: security, storage

Link: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html

aws-s3-bucket-enable-replication-configuration

Policy name: aws-s3-bucket-enable-replication-configuration

Code path: aws.s3.Bucket.enableReplicationConfiguration

Checks that S3 Bucket have cross-region replication enabled.

Service: S3

Resource: Bucket

Associated metadata for this policy:

Severity: high

Frameworks: iso27001, pcidss

Topics: availability

Link: https://docs.aws.amazon.com/AmazonS3/latest/userguide/replication.html

aws-s3-bucket-enable-server-side-encryption

Policy name: aws-s3-bucket-enable-server-side-encryption

Code path: aws.s3.Bucket.enableServerSideEncryption

Check that S3 Bucket Server-Side Encryption (SSE) is enabled.

Service: S3

Resource: Bucket

Associated metadata for this policy:

Severity: high

Frameworks: hitrust, iso27001, pcidss

Topics: encryption, storage

Link: https://docs.aws.amazon.com/AmazonS3/latest/userguide/serv-side-encryption.html

aws-s3-bucket-enable-server-side-encryption-bucket-key

Policy name: aws-s3-bucket-enable-server-side-encryption-bucket-key

Code path: aws.s3.Bucket.enableServerSideEncryptionBucketKey

Check that S3 Buckets Server-Side Encryption (SSE) is using a Bucket key.

Service: S3

Resource: Bucket

Associated metadata for this policy:

Severity: medium

Frameworks: iso27001, pcidss

Topics: cost, encryption, storage

Link: https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucket-key.html

secretsmanager

Secret

aws-secretsmanager-secret-configure-customer-managed-key

Policy name: aws-secretsmanager-secret-configure-customer-managed-key

Code path: aws.secretsmanager.Secret.configureCustomerManagedKey

Check that Secrets Manager Secrets use a customer-manager KMS key.

Service: Secretsmanager

Resource: Secret

Associated metadata for this policy:

Severity: low

Frameworks: hitrust, iso27001, pcidss

Topics: encryption

Link: https://docs.aws.amazon.com/secretsmanager/latest/userguide/create_secret.html

aws-secretsmanager-secret-missing-description

Policy name: aws-secretsmanager-secret-missing-description

Code path: aws.secretsmanager.Secret.missingDescription

Checks that Secrets Manager Secrets have a description.

Service: Secretsmanager

Resource: Secret

Associated metadata for this policy:

Severity: low

Frameworks: none

Topics: documentation

Link: https://docs.aws.amazon.com/secretsmanager/latest/userguide/create_secret.html