Skip to main content

AWS



AWS Diagnosis Items

CategoryResourceOptionItemDescriptionRisk LevelISO27001CSAPISMS-PStability Assessment
BackupBackup VaultKms Key NameEncryptionKMS Not Applied
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
CloudfrontCloudfront DistributionLogging > Logging EnabledLogging MonitoringLogging Disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
CloudfrontCloudfront DistributionLinked Waf Web Acl NameNetwork SecurityAbsence of Web Application Firewall
HIGH
8.1 Operational planning and control11.1.1 Network Security Policy Establishment2.10 System and Service Security Management8.3.1 Infrastructure Security
CloudfrontCloudfront DistributionViewer Certificate > Default Certificate Enabled, Viewer Certificate > Minimum Protocol VersionEncryptionUse of Vulnerable TLS Versions
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
CloudfrontCloudfront DistributionCache Behavior > Viewer Protocol PolicyEncryptionAllow All Protocols
CRITICAL
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
CloudtrailCloudtrailMulti Region EnabledLogging MonitoringMulti-Region Configuration Disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
CloudwatchCloudwatchRetention In DaysLogging MonitoringLog Retention Period Less Than 1 Year
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
CloudwatchCloudwatchKms Key NameEncryptionKMS Not Applied
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
DynamodbDynamodbPoint In Time Recovery EnabledData ProtectionPoint-in-Time Recovery Disabled
MEDIUM
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
DynamodbDynamodbServer Side Encryption > Encryption EnabledEncryptionEncryption Disabled
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
Ec2InstanceHttp TokensAccess ControlSession Token Disabled
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
EcrEcr RepositoryPolicy > Effect, Policy > Enabled Not Action, Policy > ActionsAccess ControlFull Access Granted
HIGH
8.1 Operational planning and control10.2.1. User Registration and Authorization2.5 Authentication and Authorization Management7.2.2 Access Rights Management
EcrEcr RepositoryScan On PushData ProtectionImage Scan Disabled
HIGH
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
EcrEcr RepositoryImage Tag MutabilityData ProtectionTag Modifiable
HIGH
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
EcrEcr RepositoryEncryption TypeEncryptionKMS Not Applied >> Image data is strongly protected using AES256 encryption.
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
EcsEcs ClusterSet Container InsightsLogging MonitoringCloudWatch Container Insights disabled.
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
EcsEcs ClusterLoggingLogging MonitoringLogging disabled
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
EcsEcs ClusterLogging, Cloud Watch Encryption EnabledEncryptionLog Encryption Disabled
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
EcsEcs ClusterKms Key NameEncryptionKMS Not Applied
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
EfsEfsAccess Point > Root Directory PathAccess ControlExposure of entire file system
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
EfsEfsEnable EncryptedEncryptionEncryption Disabled
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
EksEks ClusterEnabled Cluster Log TypesLogging MonitoringPartial logging configuration disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
EksEks ClusterEndpoint Access Type, Public Access CidrsAccess ControlExposed entire CIDR range to the public network
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
EksEks ClusterEndpoint Access TypeAccess ControlEKS exposed to the public
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
EksEks ClusterEnabled EncryptionEncryptionsecret Encryption Disabled
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ElasticacheElasticache ClusterSnapshot Retention LimitData ProtectionSnapshot retention period setting is missing
MEDIUM
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
ElasticsearchElasticsearchTls Security PolicyEncryptionUse of Vulnerable TLS Versions
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ElasticsearchElasticsearchEncryption > Data At Rest Encryption EnabledEncryptionStored Data Encryption Disabled
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ElasticsearchElasticsearchEncryption > Node To Node Encryption EnabledEncryptionNode-to-Node Traffic Encryption Disabled
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ElasticsearchElasticsearchEncryption > Kms Key NameEncryptionKMS Not Applied
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ElasticsearchElasticsearchEncryption > Enforce HttpsEncryptionUnencrypted Protocols Allowed
CRITICAL
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
KmsKms KeyEnable Key RotationEncryptionKey Rotation Disabled
MEDIUM
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
Lambda FunctionLambda FunctionTracing EnabledLogging MonitoringLambda X-Ray Tracing Disabled
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
Lambda FunctionLambda FunctionEnvironment VariableData ProtectionSecret Information Included in Environment Variables
CRITICAL
- 9.1.1. Virtual Resource Management2.10 System and Service Security Management8.1.1 Virtualization Security
Lambda FunctionLambda FunctionIncluded Subnet Names, Linked Security Group NamesNetwork SecuritySecurity Group Not Configured
HIGH
8.1 Operational planning and control11.1.1 Network Security Policy Establishment2.10 System and Service Security Management8.3.1 Infrastructure Security
LbLbInternalAccess ControlLoad Balancer Exposed Externally
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
LbLbDrop Invalid HeaderNetwork SecurityInadequate Header Blocking Configuration Disabled
HIGH
8.1 Operational planning and control11.1.1 Network Security Policy Establishment2.10 System and Service Security Management8.3.1 Infrastructure Security
LbLbListener > Ssl PolicyEncryptionUse of Vulnerable TLS Versions
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
LbLbListener > ProtocolEncryptionUse of Unencrypted Protocols Allowed
CRITICAL
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
RdsAuroraMonitoring > Performance Insights EnabledLogging MonitoringPerformance Insights Disabled
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
RdsAuroraMulti Az EnabledData ProtectionMulti-AZ Configuration Disabled
HIGH
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
RdsAuroraBackup > Backup Retention PeriodData ProtectionUsing Default Value for Data Retention Period
MEDIUM
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
RdsAuroraMonitoring > Performance Insights Enabled, Monitoring > Kms Key NameEncryptionPerformance Insights Encryption Disabled
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
RdsAuroraEncryption > Storage EncryptedEncryptionRDS Cluster Encryption Disabled
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
RdsMariadb, Mssql, Mysql, Oracle, PostgresqlMonitoring > Performance Insights EnabledLogging MonitoringPerformance Insights Disabled
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
RdsMariadb, Mssql, Mysql, Oracle, PostgresqlMulti Az EnabledData ProtectionMulti-AZ Configuration Disabled
HIGH
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
RdsMariadb, Mssql, Mysql, Oracle, PostgresqlPublicly AccessibleAccess ControlPublic Access to Database Allowed
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
RdsMariadb, Mssql, Mysql, Oracle, PostgresqlBackup > Backup Retention PeriodData ProtectionUsing Default Value for Data Retention Period
MEDIUM
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
RdsMariadb, Mssql, Mysql, Oracle, PostgresqlMonitoring > Performance Insights Enabled, Monitoring > Kms Key NameEncryptionPerformance Insights Encryption Disabled
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
RdsMariadb, Mssql, Mysql, Oracle, PostgresqlEncryption > Storage EncryptedEncryptionRDS Database Encryption Disabled
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
S3S3 BucketEnabled LoggingLogging MonitoringLogging Disabled
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
S3S3 BucketPublic Access Block > Block Public AclsAccess ControlPublic ACL Block Disabled
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
S3S3 BucketPublic Access Block > Block Public PolicyAccess ControlPublic Policy Block Disabled
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
S3S3 BucketPublic Access Block > Ignore Public AclsAccess ControlPublic ACL Ignored Disabled
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
S3S3 BucketPublic Access Block > Restrict Public BucketsAccess ControlPublic Bucket Policy Restrictions Disabled
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
S3S3 BucketVersioning StatusData ProtectionVersioning Disabled
MEDIUM
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
S3S3 BucketSse AlgorithmEncryptionKMS Not Applied >> Image data is strongly protected using AES256 encryption.
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
S3S3 BucketSse Algorithm, Kms Key NameEncryptionKMS Not Applied
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
SnsSns TopicKms Key NameEncryptionKMS Not Applied
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
VpcEndpoint ServiceAcceptance RequiredAccess ControlManual Approval for Connection Requests Disabled
LOW
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcNetwork AclIngress > Cidr Block, Ingress > Action, Ingress > From Port, To PortAccess ControlFTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcNetwork AclIngress > Cidr Block, Ingress > Action, Ingress > From Port, To PortAccess ControlSSH Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcNetwork AclIngress > Cidr Block, Ingress > Action, Ingress > From Port, To PortAccess ControlHTTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcNetwork AclIngress > Cidr Block, Ingress > Action, Ingress > From Port, To PortAccess ControlRDP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcNetwork AclIngress > Cidr BlockAccess ControlCIDR Exposed Entirely
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcNetwork AclIngress > ProtocolAccess ControlAll Ports Exposed
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcNetwork FirewallEnabled Delete ProtectionNetwork SecurityDelete Protection Disabled
MEDIUM
8.1 Operational planning and control12.1.4. Data Protection2.9 System and Service Operation Management10.1.4 Data Protection
VpcNetwork FirewallEncryption Configuration > Enabled Custom ConfigurationEncryptionKMS Not Applied
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
VpcNetwork Firewall PolicyEncryption Configuration > Enabled Custom ConfigurationEncryptionKMS Not Applied
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
VpcNetwork Firewall Rule GroupEncryption Configuration > Enabled Custom ConfigurationEncryptionKMS Not Applied
LOW
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
VpcSecurity GroupDescriptionLogging MonitoringLack of descriptions in the security group makes management and identification difficult
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
VpcSecurity GroupIngress > DescriptionLogging MonitoringLack of descriptions in the inbound rules makes it difficult to understand the purpose of specific rules
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
VpcSecurity GroupEgress > DescriptionLogging MonitoringLack of descriptions in the outbound rules makes it difficult to understand the purpose of specific rules
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
VpcSecurity GroupIngress > Cidr BlockAccess ControlCIDR Exposed Entirely
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcSecurity GroupIngress > Cidr Block, Ingress > From Port, To PortAccess ControlFTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcSecurity GroupIngress > Cidr Block, Ingress > From Port, To PortAccess ControlSSH Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcSecurity GroupIngress > Cidr Block, Ingress > From Port, To PortAccess ControlHTTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcSecurity GroupIngress > Cidr Block, Ingress > From Port, To PortAccess ControlRDP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcSecurity GroupEgress > Cidr BlockAccess ControlCIDR Exposed Entirely
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
VpcSubnetPip EnableAccess Controlsubnet public 노출
HIGH
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy