Skip to main content

Prowler 5.23.0

Test results for this specific product, vendor, and version combination

VendorProwler
ProductProwler
Version5.23.0

Download Raw Results

Download the original OCSF or HTML result files used to generate this page

File NameDownload
aws-vpc-cfi-1775706869-vpc-cn03-allowed-requester-01
aws-vpc-cfi-1775706869-vpc-cn03-allowed-requester-02
aws-vpc-cfi-1775706869-vpc-cn03-disallowed-requester-01
aws-vpc-cfi-1775706869-vpc-cn03-disallowed-requester-02
aws-vpc-cfi-1775706869-vpc-cn03-non-allowlisted-requester-01
aws-vpc-cfi-1775706869-vpc
aws-vpc-combined
aws-vpc-prowler
aws-vpc-summary

Test Summary

Aggregate summary of all tests for this configuration result

Resources In Configuration38
Count of Tests149
Passing Tests53
Failing Tests96
Catalogs Tested

Control Catalog Summary

Summary of test results grouped by control catalog and resource

Control CatalogResourcesTotal TestsPassingFailingTested RequirementsMissing RequirementsUnused Core Requirements
CCC.AuditLog
/aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c...211203495394
49445
None
CCC.Core
/aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c...211203495394<root_account>AWSResourceExplorerS...AWSSupportServiceRol...AWSTrustedAdvisorSer...AdministratorAccessCN03PeeringGuardrailElastiCacheServiceRo...TerraformRoleanalyzer/unknowncfi-1775705443-cn04-...cfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...cfi-1775706869-cn04-...defaulti-075cabc7256ac994bi-0d8057c9ef893b432terraform-userterraform-user/Admin...unknown
1374790
CCC.KeyMgmt
cfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...
440
None
CCC.LB
211203495394AWSResourceExplorerS...AWSSupportServiceRol...AWSTrustedAdvisorSer...AdministratorAccessCN03PeeringGuardrailElastiCacheServiceRo...TerraformRolecfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...terraform-userterraform-user/Admin...
29245
None
CCC.Logging
/aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c...211203495394
45045
None
CCC.Monitor
/aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c...211203495394<root_account>cfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...terraform-user/Admin...
461333
None
CCC.ObjStor
<root_account>CN03PeeringGuardrailcfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...terraform-user-acces...
761
None
CCC.Vector
CN03PeeringGuardrailTerraformRolecfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...terraform-userterraform-user/Admin...
17143
None

Test Mapping Summary

Summary of test mappings showing how event codes map to test requirements

Control CatalogTest RequirementMapped Tests (Event Code | Total | Passing | Failing)
CCC.AuditLog
CCC.AuditLog.CN02.AR01
When a manual action is performed to generate each audit log type, then the corresponding audit log type MUST be generated and recorded.
cloudtrail_multi_region_enabled
17017
cloudtrail_multi_region_enabled_logging_management_events
17017
CCC.AuditLog
CCC.AuditLog.CN03.AR01
When an attempt is made to disable a log source, then an alert MUST be generated.
cloudtrail_multi_region_enabled
17017
cloudtrail_multi_region_enabled_logging_management_events
17017
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
CCC.AuditLog
CCC.AuditLog.CN03.AR02
When an attempt is made to alter the retention or object lock status of an external data log source or bucket, then an alert MUST be generated.
cloudwatch_changes_to_network_acls_alarm_configured
101
cloudwatch_changes_to_network_gateways_alarm_configured
101
cloudwatch_changes_to_network_route_tables_alarm_configured
101
cloudwatch_changes_to_vpcs_alarm_configured
101
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
cloudwatch_log_metric_filter_aws_organizations_changes
101
cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk
101
cloudwatch_log_metric_filter_for_s3_bucket_policy_changes
101
cloudwatch_log_metric_filter_policy_changes
101
cloudwatch_log_metric_filter_security_group_changes
101
cloudwatch_log_metric_filter_unauthorized_api_calls
101
CCC.AuditLog
CCC.AuditLog.CN04.AR01
When audit log buckets are created then verify that server access logging MUST be enabled for the audit log bucket, with logs delivered to a separate, secure logging bucket.
cloudwatch_log_group_not_publicly_accessible
440
CCC.AuditLog
CCC.AuditLog.CN05.AR01
When audit logs are exported, then audit logs MUST be present in the configured data location.
cloudtrail_multi_region_enabled
17017
cloudtrail_multi_region_enabled_logging_management_events
17017
CCC.AuditLog
CCC.AuditLog.CN09.AR01
When restricted fields are accessed by unauthorized users, then those fields MUST remain masked.
cloudwatch_log_group_not_publicly_accessible
440
CCC.Core
CCC.Core.CN01.AR02
When a port is exposed for SSH network traffic, all traffic MUST include a SSH handshake AND be encrypted using SSHv2 or higher.
ec2_instance_port_ssh_exposed_to_internet
220
CCC.Core
CCC.Core.CN02.AR01
When data is stored, it MUST be encrypted using the latest industry-standard encryption methods.
cloudwatch_log_group_kms_encryption_enabled
404
CCC.Core
CCC.Core.CN03.AR01
When an entity attempts to modify the service through a user interface, the authentication process MUST require multiple identifying factors for authentication.
iam_root_hardware_mfa_enabled
101
iam_root_mfa_enabled
110
iam_user_mfa_enabled_console_access
110
CCC.Core
CCC.Core.CN03.AR02
When an entity attempts to modify the service through an API endpoint, the authentication process MUST require a credential such as an API key or token AND originate from within the trust perimeter.
iam_root_hardware_mfa_enabled
101
iam_root_mfa_enabled
110
iam_user_mfa_enabled_console_access
110
CCC.Core
CCC.Core.CN03.AR03
When an entity attempts to view information on the service through a user interface, the authentication process MUST require multiple identifying factors from the user.
iam_root_hardware_mfa_enabled
101
iam_root_mfa_enabled
110
iam_user_hardware_mfa_enabled
101
iam_user_mfa_enabled_console_access
110
CCC.Core
CCC.Core.CN03.AR04
When an entity attempts to view information on the service through an API endpoint, the authentication process MUST require a credential such as an API key or token AND originate from within the trust perimeter.
iam_root_hardware_mfa_enabled
101
iam_root_mfa_enabled
110
iam_user_hardware_mfa_enabled
101
iam_user_mfa_enabled_console_access
110
CCC.Core
CCC.Core.CN04.AR01
When administrative access or configuration change is attempted on the service or a child resource, the service MUST log the client identity, time, and result of the attempt.
cloudtrail_multi_region_enabled
17017
cloudwatch_changes_to_network_acls_alarm_configured
101
cloudwatch_changes_to_network_gateways_alarm_configured
101
cloudwatch_changes_to_network_route_tables_alarm_configured
101
cloudwatch_changes_to_vpcs_alarm_configured
101
cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled
101
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
cloudwatch_log_metric_filter_authentication_failures
101
cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk
101
cloudwatch_log_metric_filter_for_s3_bucket_policy_changes
101
cloudwatch_log_metric_filter_policy_changes
101
cloudwatch_log_metric_filter_root_usage
101
cloudwatch_log_metric_filter_security_group_changes
101
cloudwatch_log_metric_filter_sign_in_without_mfa
101
cloudwatch_log_metric_filter_unauthorized_api_calls
101
CCC.Core
CCC.Core.CN04.AR02
When any attempt is made to modify data on the service or a child resource, the service MUST log the client identity, time, and result of the attempt.
cloudtrail_multi_region_enabled_logging_management_events
17017
CCC.Core
CCC.Core.CN04.AR03
When any attempt is made to read data on the service or a child resource, the service MUST log the client identity, time, and result of the attempt.
cloudtrail_multi_region_enabled
17017
cloudwatch_log_group_kms_encryption_enabled
404
cloudwatch_log_group_not_publicly_accessible
440
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
cloudwatch_log_metric_filter_authentication_failures
101
CCC.Core
CCC.Core.CN05.AR01
When an attempt is made to modify data on the service or a child resource, the service MUST block requests from unauthorized entities.
iam_inline_policy_no_full_access_to_cloudtrail
440
iam_inline_policy_no_full_access_to_kms
440
iam_policy_attached_only_to_group_or_roles
101
iam_policy_no_full_access_to_cloudtrail
110
iam_policy_no_full_access_to_kms
110
iam_role_administratoraccess_policy
101
iam_role_cross_account_readonlyaccess_policy
110
iam_role_cross_service_confused_deputy_prevention
404
iam_user_administrator_access_policy
101
CCC.Core
CCC.Core.CN05.AR02
When administrative access or configuration change is attempted on the service or a child resource, the service MUST refuse requests from unauthorized entities.
iam_avoid_root_usage
101
iam_aws_attached_policy_no_administrative_privileges
541
iam_check_saml_providers_sts
101
iam_customer_attached_policy_no_administrative_privileges
110
iam_inline_policy_allows_privilege_escalation
440
iam_inline_policy_no_full_access_to_cloudtrail
440
iam_inline_policy_no_full_access_to_kms
440
iam_password_policy_expires_passwords_within_90_days_or_less
101
iam_password_policy_lowercase
101
iam_password_policy_minimum_length_14
101
iam_password_policy_number
101
iam_password_policy_reuse_24
101
iam_password_policy_symbol
101
iam_password_policy_uppercase
101
iam_policy_allows_privilege_escalation
110
iam_policy_attached_only_to_group_or_roles
101
iam_policy_no_full_access_to_cloudtrail
110
iam_policy_no_full_access_to_kms
110
iam_role_administratoraccess_policy
101
iam_root_hardware_mfa_enabled
101
iam_root_mfa_enabled
110
iam_user_mfa_enabled_console_access
110
CCC.Core
CCC.Core.CN05.AR03
When administrative access or configuration change is attempted on the service or a child resource in a multi-tenant environment, the service MUST refuse requests across tenant boundaries unless the origin is explicitly included in a pre-approved allowlist.
eventbridge_bus_cross_account_access
17170
iam_role_cross_account_readonlyaccess_policy
110
iam_role_cross_service_confused_deputy_prevention
404
CCC.Core
CCC.Core.CN05.AR04
When data is requested from outside the trust perimeter, the service MUST refuse requests from unauthorized entities.
accessanalyzer_enabled
17017
iam_inline_policy_allows_privilege_escalation
440
iam_inline_policy_no_full_access_to_cloudtrail
440
iam_inline_policy_no_full_access_to_kms
440
iam_policy_attached_only_to_group_or_roles
101
iam_policy_no_full_access_to_cloudtrail
110
iam_policy_no_full_access_to_kms
110
iam_user_administrator_access_policy
101
iam_user_mfa_enabled_console_access
110
CCC.Core
CCC.Core.CN05.AR06
When any request is made to the service or a child resource, the service MUST refuse requests from unauthorized entities.
iam_check_saml_providers_sts
101
iam_no_root_access_key
110
iam_policy_attached_only_to_group_or_roles
101
iam_role_cross_account_readonlyaccess_policy
110
iam_role_cross_service_confused_deputy_prevention
404
iam_root_hardware_mfa_enabled
101
iam_root_mfa_enabled
110
iam_user_hardware_mfa_enabled
101
iam_user_mfa_enabled_console_access
110
CCC.Core
CCC.Core.CN06.AR01
When the service is running, its region and availability zone MUST be included in a list of explicitly trusted or approved locations within the trust perimeter.
organizations_scp_check_deny_regions
101
CCC.Core
CCC.Core.CN06.AR02
When a child resource is deployed, its region and availability zone MUST be included in a list of explicitly trusted or approved locations within the trust perimeter.
organizations_scp_check_deny_regions
101
CCC.Core
CCC.Core.CN08.AR01
When data is created or modified, the data MUST have a complete and recoverable duplicate that is stored in a physically separate data center.
backup_vaults_exist
101
cloudtrail_multi_region_enabled
17017
CCC.Core
CCC.Core.CN09.AR01
When the service is operational, its logs and any child resource logs MUST NOT be accessible from the resource they record access to.
cloudtrail_multi_region_enabled
17017
CCC.Core
CCC.Core.CN09.AR02
When the service is operational, disabling the logs for the service or its child resources MUST NOT be possible without also disabling the corresponding resource.
cloudwatch_log_group_not_publicly_accessible
440
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
CCC.Core
CCC.Core.CN09.AR03
When the service is operational, any attempt to redirect logs for the service or its child resources MUST NOT be possible without halting operation of the corresponding resource and publishing corresponding events to monitored channels.
cloudwatch_changes_to_network_acls_alarm_configured
101
cloudwatch_changes_to_network_gateways_alarm_configured
101
cloudwatch_changes_to_network_route_tables_alarm_configured
101
cloudwatch_changes_to_vpcs_alarm_configured
101
cloudwatch_log_group_kms_encryption_enabled
404
cloudwatch_log_group_not_publicly_accessible
440
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
CCC.Core
CCC.Core.CN14.AR02
When backups are created for disaster recovery purposes, the most recent backup MUST have a creation date within the past 30 days.
backup_vaults_exist
202
CCC.KeyMgmt
CCC.KeyMgmt.CN02.AR01
When IAM roles and key policies are reviewed, Decrypt permission MUST be granted exclusively to documented authorised principals.
iam_inline_policy_no_full_access_to_kms
440
CCC.LB
CCC.LB.CN04.AR01
When routing weights change, the request MUST originate from an explicitly defined and trusted identity and MUST be logged.
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
iam_policy_attached_only_to_group_or_roles
101
iam_role_administratoraccess_policy
101
iam_user_administrator_access_policy
101
CCC.LB
CCC.LB.CN05.AR01
When stickiness is enabled, session cookies MUST expire within 30 minutes of inactivity.
iam_aws_attached_policy_no_administrative_privileges
541
iam_customer_attached_policy_no_administrative_privileges
110
iam_inline_policy_allows_privilege_escalation
440
iam_inline_policy_no_administrative_privileges
440
iam_inline_policy_no_full_access_to_cloudtrail
440
iam_inline_policy_no_full_access_to_kms
440
iam_policy_allows_privilege_escalation
110
iam_policy_attached_only_to_group_or_roles
101
iam_policy_no_full_access_to_cloudtrail
110
iam_policy_no_full_access_to_kms
110
iam_role_administratoraccess_policy
101
iam_user_administrator_access_policy
101
CCC.Logging
CCC.Logging.CN01.AR01
When a new cloud account is created, provider-level audit and network flow logging MUST be enabled by default and directed to the central sink.
cloudtrail_multi_region_enabled
17017
CCC.Logging
CCC.Logging.CN01.AR02
When a new cloud compute resource is deployed, it MUST be configured to forward all relevant logs (e.g., OS, application, service logs) to the central log sink.
cloudtrail_multi_region_enabled
17017
cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled
101
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
cloudwatch_log_metric_filter_for_s3_bucket_policy_changes
101
CCC.Logging
CCC.Logging.CN02.AR01
When a new log bucket or stream is created, its retention policy MUST be configured in accordance with organisation's data retention policy.
cloudwatch_log_group_retention_policy_specific_days_enabled
404
CCC.Logging
CCC.Logging.CN02.AR02
When a query is performed to retrieve log events older than the number of days defined in the organisation's data retention policy, it MUST return an empty result.
cloudwatch_log_group_retention_policy_specific_days_enabled
404
CCC.Logging
CCC.Logging.CN05.AR01
When a log storage bucket is created, the bucket's access control settings MUST explicitly deny public read and write access.
cloudtrail_multi_region_enabled
17017
CCC.Logging
CCC.Logging.CN07.AR01
When an audit log event is recorded that corresponds to a modification of the logging service configuration such as disabling a log trail, deleting a log sink, or altering a log forwarding rule, an alert MUST be generated.
cloudtrail_multi_region_enabled_logging_management_events
17017
cloudwatch_changes_to_network_acls_alarm_configured
101
cloudwatch_changes_to_network_gateways_alarm_configured
101
cloudwatch_changes_to_network_route_tables_alarm_configured
101
cloudwatch_changes_to_vpcs_alarm_configured
101
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
CCC.Monitor
CCC.Monitor.CN01.AR01
When an External Monitoring system exceeds the anticipated rate of monitoring checks then Rate Limiting MUST be applied and an Audit Alert MUST be generated.
cloudtrail_multi_region_enabled_logging_management_events
17017
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
CCC.Monitor
CCC.Monitor.CN02.AR01
When an Custom or User-Defined Metric starts to flood a collector, then a rate limit MUST be applied to reduce the network impact of traffic and an alert must triggered.
cloudwatch_changes_to_network_acls_alarm_configured
101
cloudwatch_changes_to_network_gateways_alarm_configured
101
cloudwatch_changes_to_network_route_tables_alarm_configured
101
cloudwatch_changes_to_vpcs_alarm_configured
101
cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled
101
cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled
101
cloudwatch_log_metric_filter_authentication_failures
101
cloudwatch_log_metric_filter_for_s3_bucket_policy_changes
101
cloudwatch_log_metric_filter_policy_changes
101
cloudwatch_log_metric_filter_security_group_changes
101
cloudwatch_log_metric_filter_unauthorized_api_calls
101
CCC.Monitor
CCC.Monitor.CN04.AR01
When monitoring dashboards display degraded services which may become potential targets then the dashboard MUST be protected from unauthorised access.
cloudwatch_log_group_kms_encryption_enabled
404
cloudwatch_log_group_not_publicly_accessible
440
CCC.Monitor
CCC.Monitor.CN05.AR01
When monitoring services have generated an alert, the service MUST ensure only authorised responders silence or acknowledge the alert.
iam_inline_policy_allows_privilege_escalation
440
iam_inline_policy_no_full_access_to_cloudtrail
440
iam_policy_attached_only_to_group_or_roles
101
iam_root_mfa_enabled
110
CCC.Monitor
CCC.Monitor.CN06.AR01
When systems push metrics or traces they MUST be authenticated for that particular type of metric or trace
cloudwatch_log_group_not_publicly_accessible
440
CCC.ObjStor
CCC.ObjStor.CN01.AR01
When a request is made to read a bucket, the service MUST prevent any request using KMS keys not listed as trusted by the organization.
iam_policy_no_full_access_to_kms
110
CCC.ObjStor
CCC.ObjStor.CN01.AR02
When a request is made to read an object, the service MUST prevent any request using KMS keys not listed as trusted by the organization.
iam_inline_policy_no_full_access_to_kms
440
iam_policy_no_full_access_to_kms
110
CCC.ObjStor
CCC.ObjStor.CN01.AR03
When a request is made to write to a bucket, the service MUST prevent any request using KMS keys not listed as trusted by the organization.
iam_policy_no_full_access_to_kms
110
CCC.ObjStor
CCC.ObjStor.CN01.AR04
When a request is made to write to an object, the service MUST prevent any request using KMS keys not listed as trusted by the organization.
iam_inline_policy_no_full_access_to_kms
440
iam_policy_no_full_access_to_kms
110
CCC.ObjStor
CCC.ObjStor.CN05.AR02
When an object is modified, the service MUST assign a new unique identifier to the modified object to differentiate it from the previous version.
iam_rotate_access_key_90_days
211
CCC.Vector
CCC.Vector.CN02.AR01
When an index lifecycle event is triggered, the service MUST verify that the actor has explicit permissions for the operation type.
iam_customer_attached_policy_no_administrative_privileges
110
iam_inline_policy_allows_privilege_escalation
440
iam_inline_policy_no_full_access_to_cloudtrail
440
iam_inline_policy_no_full_access_to_kms
440
iam_no_custom_policy_permissive_role_assumption
110
iam_policy_attached_only_to_group_or_roles
101
iam_role_administratoraccess_policy
101
iam_user_administrator_access_policy
101

Resource Summary

Summary of all resources mentioned in OCSF results

Resource NameResource TypeControl CatalogsTotal TestsPassingFailing
/aws/vpc/flow-logs/cfi-1775705443-vpc
Other321
/aws/vpc/flow-logs/cfi-1775705443-vpc
AwsLogsLogGroup101
/aws/vpc/flow-logs/cfi-1775706318-vpc
Other321
/aws/vpc/flow-logs/cfi-1775706318-vpc
AwsLogsLogGroup101
/aws/vpc/flow-logs/cfi-1775706481-vpc
Other321
/aws/vpc/flow-logs/cfi-1775706481-vpc
AwsLogsLogGroup101
/aws/vpc/flow-logs/cfi-1775706869-vpc
Other321
/aws/vpc/flow-logs/cfi-1775706869-vpc
AwsLogsLogGroup101
<root_account>
AwsIamUser752
<root_account>
AwsIamAccessKey110
211203495394
Other601739
211203495394
AwsBackupBackupVault101
211203495394
AwsCloudTrailTrail34034
211203495394
AwsCloudWatchAlarm15015
211203495394
AwsIamRole
No CCC catalogs
211
211203495394
AwsEc2Instance
No CCC catalogs
101
211203495394
AwsIamPolicy817
211203495394
AwsEc2Vpc
No CCC catalogs
101
AdministratorAccess
AwsIamPolicy101
analyzer/unknown
Other17017
AWSResourceExplorerServiceRolePolicy
AwsIamPolicy110
AWSSupportServiceRolePolicy
AwsIamPolicy110
AWSTrustedAdvisorServiceRolePolicy
AwsIamPolicy110
cfi-1775705443-cn04-flowlogs-role
AwsIamRole101
cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy
AwsIamPolicy440
cfi-1775706318-cn04-flowlogs-role
AwsIamRole101
cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy
AwsIamPolicy440
cfi-1775706481-cn04-flowlogs-role
AwsIamRole101
cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy
AwsIamPolicy440
cfi-1775706869-cn04-flowlogs-role
AwsIamRole101
cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy
AwsIamPolicy440
CN03PeeringGuardrail
AwsIamPolicy550
default
AwsEventsEventbus34340
detector/unknown
AwsGuardDutyDetector
No CCC catalogs
34034
ElastiCacheServiceRolePolicy
AwsIamPolicy110
hub/unknown
Other
No CCC catalogs
17017
i-075cabc7256ac994b
AwsEc2Instance22211
i-0d8057c9ef893b432
AwsEc2Instance22211
Inspector2
Other
No CCC catalogs
17017
model-invocation-logging
Other
No CCC catalogs
17017
SecurityAudit
AwsIamPolicy
No CCC catalogs
101
sg-01bcb378c380ebe1d
AwsEc2SecurityGroup
No CCC catalogs
220
sg-024aa1d466f208a2c
AwsEc2SecurityGroup
No CCC catalogs
220
sg-04935ed0fe5b0a9f2
AwsEc2SecurityGroup
No CCC catalogs
220
sg-06b52c7639c5e3ff3
AwsEc2SecurityGroup
No CCC catalogs
220
sg-0d7d9c19ea7d1d2f9
AwsEc2SecurityGroup
No CCC catalogs
220
sg-0e221077f9f2d8692
AwsEc2SecurityGroup
No CCC catalogs
220
terraform-user
AwsIamUser853
terraform-user-access-key-1
AwsIamUser101
terraform-user/AdministratorAccess
AwsIamUser101
TerraformRole
AwsIamRole211
unknown
Other404

Test Results

OCSF test results filtered for entries with CCC compliance mappings

StatusFindingResource NameResource TypeMessageTest Requirements
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
IAM Access Analyzer is enabled
IAM Access Analyzer in account 211203495394 is not enabled.
analyzer/unknown
Other
IAM Access Analyzer in account 211203495394 is not enabled.
FAIL
At least one AWS Backup vault exists
No Backup Vault exist.
211203495394
AwsBackupBackupVault
No Backup Vault exist.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
Region has at least one CloudTrail trail logging
No CloudTrail trails enabled with logging were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled with logging were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudTrail trail logs management events for read and write operations
No CloudTrail trails enabled and logging management events were found.
211203495394
AwsCloudTrailTrail
No CloudTrail trails enabled and logging management events were found.
FAIL
CloudWatch log metric filter and alarm exist for Network ACL (NACL) change events
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
CloudWatch Logs metric filter and alarm exist for changes to network gateways
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
Account monitors VPC route table changes with a CloudWatch Logs metric filter and alarm
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
AWS account has a CloudWatch Logs metric filter and alarm for VPC changes
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
CloudWatch log group is encrypted with an AWS KMS key
Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc does not have AWS KMS keys associated.
/aws/vpc/flow-logs/cfi-1775705443-vpc
Other
Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc does not have AWS KMS keys associated.
FAIL
CloudWatch log group is encrypted with an AWS KMS key
Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc does not have AWS KMS keys associated.
/aws/vpc/flow-logs/cfi-1775706318-vpc
Other
Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc does not have AWS KMS keys associated.
FAIL
CloudWatch log group is encrypted with an AWS KMS key
Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc does not have AWS KMS keys associated.
/aws/vpc/flow-logs/cfi-1775706481-vpc
Other
Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc does not have AWS KMS keys associated.
FAIL
CloudWatch log group is encrypted with an AWS KMS key
Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc does not have AWS KMS keys associated.
/aws/vpc/flow-logs/cfi-1775706869-vpc
Other
Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc does not have AWS KMS keys associated.
PASS
CloudWatch Log Group is not publicly accessible
Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc is not publicly accessible.
/aws/vpc/flow-logs/cfi-1775705443-vpc
Other
Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc is not publicly accessible.
PASS
CloudWatch Log Group is not publicly accessible
Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc is not publicly accessible.
/aws/vpc/flow-logs/cfi-1775706318-vpc
Other
Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc is not publicly accessible.
PASS
CloudWatch Log Group is not publicly accessible
Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc is not publicly accessible.
/aws/vpc/flow-logs/cfi-1775706481-vpc
Other
Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc is not publicly accessible.
PASS
CloudWatch Log Group is not publicly accessible
Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc is not publicly accessible.
/aws/vpc/flow-logs/cfi-1775706869-vpc
Other
Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc is not publicly accessible.
FAIL
CloudWatch log group has a retention policy of at least the configured minimum days or never expires
Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc has less than 365 days retention period (7 days).
/aws/vpc/flow-logs/cfi-1775705443-vpc
AwsLogsLogGroup
Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc has less than 365 days retention period (7 days).
FAIL
CloudWatch log group has a retention policy of at least the configured minimum days or never expires
Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc has less than 365 days retention period (7 days).
/aws/vpc/flow-logs/cfi-1775706318-vpc
AwsLogsLogGroup
Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc has less than 365 days retention period (7 days).
FAIL
CloudWatch log group has a retention policy of at least the configured minimum days or never expires
Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc has less than 365 days retention period (7 days).
/aws/vpc/flow-logs/cfi-1775706481-vpc
AwsLogsLogGroup
Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc has less than 365 days retention period (7 days).
FAIL
CloudWatch log group has a retention policy of at least the configured minimum days or never expires
Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc has less than 365 days retention period (7 days).
/aws/vpc/flow-logs/cfi-1775706869-vpc
AwsLogsLogGroup
Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc has less than 365 days retention period (7 days).
FAIL
CloudWatch Logs metric filter and alarm exist for AWS Config configuration changes
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
CloudWatch Logs metric filter and alarm exist for CloudTrail configuration changes
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
Account has a CloudWatch Logs metric filter and alarm for AWS Management Console authentication failures
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
CloudWatch Logs metric filter and alarm exist for AWS Organizations changes
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
Account has a CloudWatch log metric filter and alarm for disabling or scheduled deletion of customer-managed KMS keys
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
CloudWatch log metric filter and alarm exist for S3 bucket policy changes
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
CloudWatch Logs metric filter and alarm exist for IAM policy changes
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
Account has a CloudWatch Logs metric filter and alarm for root account usage
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
CloudWatch Logs metric filter and alarm exist for security group changes
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
CloudWatch log metric filter and alarm exist for Management Console sign-in without MFA
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
FAIL
CloudWatch Logs metric filter and alarm exist for unauthorized API calls
No CloudWatch log groups found with metric filters or alarms associated.
211203495394
AwsCloudWatchAlarm
No CloudWatch log groups found with metric filters or alarms associated.
PASS
EC2 instance does not allow ingress from the Internet to TCP port 22 (SSH)
Instance i-075cabc7256ac994b does not have SSH port 22 open to the Internet.
i-075cabc7256ac994b
AwsEc2Instance
Instance i-075cabc7256ac994b does not have SSH port 22 open to the Internet.
PASS
EC2 instance does not allow ingress from the Internet to TCP port 22 (SSH)
Instance i-0d8057c9ef893b432 does not have SSH port 22 open to the Internet.
i-0d8057c9ef893b432
AwsEc2Instance
Instance i-0d8057c9ef893b432 does not have SSH port 22 open to the Internet.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
PASS
AWS EventBridge event bus does not allow cross-account access
EventBridge event bus default does not allow cross-account access.
default
AwsEventsEventbus
EventBridge event bus default does not allow cross-account access.
FAIL
AWS account root user has not been used in the last day
Root user in the account was last accessed 0 days ago.
<root_account>
AwsIamUser
Root user in the account was last accessed 0 days ago.
PASS
Attached AWS-managed IAM policy does not allow '*:*' administrative privileges
AWS policy ElastiCacheServiceRolePolicy is attached but does not allow '*:*' administrative privileges.
ElastiCacheServiceRolePolicy
AwsIamPolicy
AWS policy ElastiCacheServiceRolePolicy is attached but does not allow '*:*' administrative privileges.
PASS
Attached AWS-managed IAM policy does not allow '*:*' administrative privileges
AWS policy AWSTrustedAdvisorServiceRolePolicy is attached but does not allow '*:*' administrative privileges.
AWSTrustedAdvisorServiceRolePolicy
AwsIamPolicy
AWS policy AWSTrustedAdvisorServiceRolePolicy is attached but does not allow '*:*' administrative privileges.
FAIL
Attached AWS-managed IAM policy does not allow '*:*' administrative privileges
AWS policy AdministratorAccess is attached and allows '*:*' administrative privileges.
AdministratorAccess
AwsIamPolicy
AWS policy AdministratorAccess is attached and allows '*:*' administrative privileges.
PASS
Attached AWS-managed IAM policy does not allow '*:*' administrative privileges
AWS policy AWSSupportServiceRolePolicy is attached but does not allow '*:*' administrative privileges.
AWSSupportServiceRolePolicy
AwsIamPolicy
AWS policy AWSSupportServiceRolePolicy is attached but does not allow '*:*' administrative privileges.
PASS
Attached AWS-managed IAM policy does not allow '*:*' administrative privileges
AWS policy AWSResourceExplorerServiceRolePolicy is attached but does not allow '*:*' administrative privileges.
AWSResourceExplorerServiceRolePolicy
AwsIamPolicy
AWS policy AWSResourceExplorerServiceRolePolicy is attached but does not allow '*:*' administrative privileges.
FAIL
IAM SAML provider exists in the account
No SAML Providers found.
211203495394
Other
No SAML Providers found.
PASS
Attached IAM customer-managed policy does not allow '*:*' administrative privileges
Custom policy CN03PeeringGuardrail is attached but does not allow '*:*' administrative privileges.
CN03PeeringGuardrail
AwsIamPolicy
Custom policy CN03PeeringGuardrail is attached but does not allow '*:*' administrative privileges.
PASS
IAM inline policy does not allow privilege escalation
Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow privilege escalation.
cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow privilege escalation.
PASS
IAM inline policy does not allow privilege escalation
Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow privilege escalation.
cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow privilege escalation.
PASS
IAM inline policy does not allow privilege escalation
Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow privilege escalation.
cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow privilege escalation.
PASS
IAM inline policy does not allow privilege escalation
Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow privilege escalation.
cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow privilege escalation.
PASS
Inline IAM policy does not allow '*:*' administrative privileges
Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow '*:*' administrative privileges.
cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow '*:*' administrative privileges.
PASS
Inline IAM policy does not allow '*:*' administrative privileges
Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow '*:*' administrative privileges.
cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow '*:*' administrative privileges.
PASS
Inline IAM policy does not allow '*:*' administrative privileges
Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow '*:*' administrative privileges.
cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow '*:*' administrative privileges.
PASS
Inline IAM policy does not allow '*:*' administrative privileges
Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow '*:*' administrative privileges.
cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow '*:*' administrative privileges.
PASS
Inline IAM policy does not allow 'cloudtrail:*' privileges
Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges.
cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges.
PASS
Inline IAM policy does not allow 'cloudtrail:*' privileges
Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges.
cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges.
PASS
Inline IAM policy does not allow 'cloudtrail:*' privileges
Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges.
cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges.
PASS
Inline IAM policy does not allow 'cloudtrail:*' privileges
Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges.
cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges.
PASS
Inline IAM policy does not allow kms:* privileges
Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow 'kms:*' privileges.
cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow 'kms:*' privileges.
PASS
Inline IAM policy does not allow kms:* privileges
Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow 'kms:*' privileges.
cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow 'kms:*' privileges.
PASS
Inline IAM policy does not allow kms:* privileges
Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow 'kms:*' privileges.
cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow 'kms:*' privileges.
PASS
Inline IAM policy does not allow kms:* privileges
Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow 'kms:*' privileges.
cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy
AwsIamPolicy
Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow 'kms:*' privileges.
PASS
Custom IAM policy does not allow STS role assumption on wildcard resources
Custom Policy CN03PeeringGuardrail does not allow permissive STS Role assumption.
CN03PeeringGuardrail
AwsIamPolicy
Custom Policy CN03PeeringGuardrail does not allow permissive STS Role assumption.
PASS
Root account has no active access keys
Root account does not have access keys.
<root_account>
AwsIamAccessKey
Root account does not have access keys.
FAIL
IAM account password policy enforces password expiration within 90 days or less
Password expiration is not set.
211203495394
AwsIamPolicy
Password expiration is not set.
FAIL
IAM password policy requires at least one lowercase letter
IAM password policy does not require at least one lowercase letter.
211203495394
AwsIamPolicy
IAM password policy does not require at least one lowercase letter.
FAIL
IAM password policy requires passwords to be at least 14 characters long
IAM password policy does not require minimum length of 14 characters.
211203495394
AwsIamPolicy
IAM password policy does not require minimum length of 14 characters.
FAIL
IAM password policy requires at least one number
IAM password policy does not require at least one number.
211203495394
AwsIamPolicy
IAM password policy does not require at least one number.
FAIL
IAM password policy prevents reuse of the last 24 passwords
IAM password policy reuse prevention is less than 24 or not set.
211203495394
AwsIamPolicy
IAM password policy reuse prevention is less than 24 or not set.
FAIL
IAM password policy requires at least one symbol
IAM password policy does not require at least one symbol.
211203495394
AwsIamPolicy
IAM password policy does not require at least one symbol.
FAIL
IAM password policy requires at least one uppercase letter
IAM password policy does not require at least one uppercase letter.
211203495394
AwsIamPolicy
IAM password policy does not require at least one uppercase letter.
PASS
Customer managed IAM policy does not allow actions that can lead to privilege escalation
Custom Policy arn:aws:iam::211203495394:policy/CN03PeeringGuardrail does not allow privilege escalation.
CN03PeeringGuardrail
AwsIamPolicy
Custom Policy arn:aws:iam::211203495394:policy/CN03PeeringGuardrail does not allow privilege escalation.
FAIL
IAM user has no inline or attached policies
User terraform-user has the policy AdministratorAccess attached.
terraform-user/AdministratorAccess
AwsIamUser
User terraform-user has the policy AdministratorAccess attached.
PASS
Customer managed IAM policy does not allow cloudtrail:* privileges
Custom Policy CN03PeeringGuardrail does not allow 'cloudtrail:*' privileges.
CN03PeeringGuardrail
AwsIamPolicy
Custom Policy CN03PeeringGuardrail does not allow 'cloudtrail:*' privileges.
PASS
Custom IAM policy does not allow 'kms:*' privileges
Custom Policy CN03PeeringGuardrail does not allow 'kms:*' privileges.
CN03PeeringGuardrail
AwsIamPolicy
Custom Policy CN03PeeringGuardrail does not allow 'kms:*' privileges.
FAIL
IAM role does not have AdministratorAccess policy attached
IAM Role TerraformRole has AdministratorAccess policy attached.
TerraformRole
AwsIamRole
IAM Role TerraformRole has AdministratorAccess policy attached.
PASS
IAM role does not grant ReadOnlyAccess to external AWS accounts
IAM Role TerraformRole does not have ReadOnlyAccess policy.
TerraformRole
AwsIamRole
IAM Role TerraformRole does not have ReadOnlyAccess policy.
FAIL
IAM service role prevents cross-service confused deputy attack
IAM Service Role cfi-1775705443-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack.
cfi-1775705443-cn04-flowlogs-role
AwsIamRole
IAM Service Role cfi-1775705443-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack.
FAIL
IAM service role prevents cross-service confused deputy attack
IAM Service Role cfi-1775706318-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack.
cfi-1775706318-cn04-flowlogs-role
AwsIamRole
IAM Service Role cfi-1775706318-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack.
FAIL
IAM service role prevents cross-service confused deputy attack
IAM Service Role cfi-1775706481-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack.
cfi-1775706481-cn04-flowlogs-role
AwsIamRole
IAM Service Role cfi-1775706481-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack.
FAIL
IAM service role prevents cross-service confused deputy attack
IAM Service Role cfi-1775706869-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack.
cfi-1775706869-cn04-flowlogs-role
AwsIamRole
IAM Service Role cfi-1775706869-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack.
FAIL
Root account has a hardware MFA device enabled
Root account has a virtual MFA instead of a hardware MFA device enabled.
<root_account>
AwsIamUser
Root account has a virtual MFA instead of a hardware MFA device enabled.
PASS
Root account has MFA enabled
MFA is enabled for root account.
<root_account>
AwsIamUser
MFA is enabled for root account.
PASS
IAM user does not have active access keys older than 90 days
User <root_account> does not have access keys.
<root_account>
AwsIamUser
User <root_account> does not have access keys.
FAIL
IAM user does not have active access keys older than 90 days
User terraform-user has not rotated access key 1 in over 90 days (184 days).
terraform-user-access-key-1
AwsIamUser
User terraform-user has not rotated access key 1 in over 90 days (184 days).
FAIL
IAM user does not have AdministratorAccess policy attached
IAM User terraform-user has AdministratorAccess policy attached.
terraform-user
AwsIamUser
IAM User terraform-user has AdministratorAccess policy attached.
FAIL
IAM user has hardware MFA enabled
User terraform-user does not have any type of MFA enabled.
terraform-user
AwsIamUser
User terraform-user does not have any type of MFA enabled.
PASS
IAM user has MFA enabled for console access or no console password is set
User terraform-user does not have Console Password enabled.
terraform-user
AwsIamUser
User terraform-user does not have Console Password enabled.
FAIL
AWS Organization restricts operations to only the configured AWS Regions with SCP policies
AWS Organizations is not in-use for this AWS Account.
unknown
Other
AWS Organizations is not in-use for this AWS Account.