Skip to content

Commit

Permalink
Bugfix/use ref id old format (#846)
Browse files Browse the repository at this point in the history
* Fix incorrect reference ids - 1

* Fix incorrect reference ids - 2
  • Loading branch information
gaurav-gogia committed Jun 8, 2021
1 parent 9316d5d commit 8fc20b2
Show file tree
Hide file tree
Showing 45 changed files with 45 additions and 45 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "LOW",
"description": "Ensure there is no open access to back-end resources through API",
"reference_id": "AC_AWS_056",
"reference_id": "AWS.APGM.IS.LOW.0056",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure use of API Gateway endpoint policy, and no action wildcards are being used.",
"reference_id": "AC_AWS_064",
"reference_id": "AWS.APGRAP.IAM.HIGH.0064",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Athena Database is encrypted at rest",
"reference_id": "AC_AWS_016",
"reference_id": "AWS.ADB.DP.MEDIUM.016",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure CloudTrail has log file validation enabled.",
"reference_id": "AC_AWS_067",
"reference_id": "AWS.CloudTrail.LM.MEDIUM.0087",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS Cloudwatch log group has retention policy set.",
"reference_id": "AC_AWS_068",
"reference_id": "AWS.ACLG.LM.MEDIUM.0068",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure DAX is encrypted at rest",
"reference_id": "AC_AWS_021",
"reference_id": "AWS.ADC.DP.MEDIUM.0021",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS RDS instances have logging enabled.",
"reference_id": "AC_AWS_076",
"reference_id": "AWS.ADI.LM.MEDIUM.0076",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure DocDb is encrypted at rest",
"reference_id": "AC_AWS_022",
"reference_id": "AWS.ADC.DP.MEDIUM.0022",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure DocDb clusters have log exports enabled.",
"reference_id": "AC_AWS_069",
"reference_id": "AWS.ADC.LM.MEDIUM.0069",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure DynamoDb is encrypted at rest",
"reference_id": "AC_AWS_025",
"reference_id": "AWS.ADT.DP.MEDIUM.0025",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure ECR repository is encrypted at rest",
"reference_id": "AC_AWS_026",
"reference_id": "AWS.AER.DP.MEDIUM.0026",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure ECR repository has policy attached.",
"reference_id": "AC_AWS_058",
"reference_id": "AWS.AER.DP.MEDIUM.0058",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure EFS volume used for ECS task defination has in transit encryption enabled",
"reference_id": "AC_AWS_043",
"reference_id": "AWS.AETD.IS.MEDIUM.0043",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure EFS file system does not use insecure wildcard policies.",
"reference_id": "AC_AWS_059",
"reference_id": "AWS.AEFSP.IAM.HIGH.0059",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure EKS clusters have control plane logging enabled.",
"reference_id": "AC_AWS_071",
"reference_id": "AWS.AEC.LM.MEDIUM.0071",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Elastic Cache Replication Group is encrypted at rest",
"reference_id": "AC_AWS_027",
"reference_id": "AWS.AERG.DP.MEDIUM.0027",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Elastic Cache Replication Group is encrypted in transit",
"reference_id": "AC_AWS_044",
"reference_id": "AWS.AERG.DP.MEDIUM.0044",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Elasticsearch domains being created are set to be encrypted node-to-node",
"reference_id": "AC_AWS_045",
"reference_id": "AWS.ElasticSearch.IS.MEDIUM.0045",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure Elasticsearch domains do not have wildcard policies.",
"reference_id": "AC_AWS_060",
"reference_id": "AWS.AEDP.IAM.HIGH.0060",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS ELB has access logging enabled.",
"reference_id": "AC_AWS_072",
"reference_id": "AWS.ELB.LM.MEDIUM.0072",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "LOW",
"description": "Ensure Global Accelerator accelerator has flow logs enabled.",
"reference_id": "AC_AWS_073",
"reference_id": "AWS.AGA.LM.LOW.0073",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure IAM roles do not have any policies attached that may cause priviledge escalation.",
"reference_id": "AC_AWS_051",
"reference_id": "AWS.AIRP.IAM.HIGH.0051",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure IAM policies are attached only to groups or roles",
"reference_id": "AC_AWS_049",
"reference_id": "AWS.AIUP.IAM.MEDIUM.0049",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure IAM permissions are not given directly to users",
"reference_id": "AC_AWS_050",
"reference_id": "AWS.AIUPA.IAM.MEDIUM.0050",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure that detailed monitoring is enabled for EC2 instances.",
"reference_id": "AC_AWS_070",
"reference_id": "AWS.AI.LM.HIGH.0070",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure rotation for customer created CMKs is enabled",
"reference_id": "AC_AWS_012",
"reference_id": "AWS.AKK.DP.HIGH.0012",
"category": "Data Protection",
"version": 2,
"id": "AC_AWS_0160"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure IAM policies do not have 'Principal' element missing from the policy statement.",
"reference_id": "AC_AWS_054",
"reference_id": "AWS.AKK.IAM.HIGH.0012",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure KMS key policy does not have wildcard policies attached.",
"reference_id": "AC_AWS_062",
"reference_id": "AWS.AKK.IAM.HIGH.0082",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS Lambda function has policy attached.",
"reference_id": "AC_AWS_063",
"reference_id": "AWS.LambdaFunction.LM.MEIDUM.0063",
"category": "Logging and Monitoring",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure there is a one listener configured on HTTPs or with a port 443",
"reference_id": "AC_AWS_046",
"reference_id": "AWS.ALL.IS.MEDIUM.0046",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Target Group use HTTPs to ensure end to end encryption",
"reference_id": "AC_AWS_042",
"reference_id": "AWS.ALTG.IS.MEDIUM.0042",
"category": "Infrastructure Security",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure Neptune Cluster is Encrypted",
"reference_id": "AC_AWS_030",
"reference_id": "AWS.ANC.DP.MEDIUM.0030",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure AWS Neptune clusters have logging enabled.",
"reference_id": "AC_AWS_075",
"reference_id": "AWS.ANC.LM.MEDIUM.0075",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure backup retention period is set for rds cluster",
"reference_id": "AC_AWS_013",
"reference_id": "AWS.RDS.RE.MEDIUM.0013",
"category": "Resilience",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure S3 buckets do not have, a both public ACL on the bucket and a public access block.",
"reference_id": "AC_AWS_065",
"reference_id": "AWS.S3Bucket.IAM.HIGH.0065",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure S3 buckets have access logging enabled.",
"reference_id": "AC_AWS_078",
"reference_id": "AWS.S3Bucket.LM.MEDIUM.0078",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure S3 object is Encrypted",
"reference_id": "AC_AWS_034",
"reference_id": "AWS.ASBO.DP.MEDIUM.0034",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure SageMaker Instance is Encrypted",
"reference_id": "AC_AWS_035",
"reference_id": "AWS.ASNI.DP.MEDIUM.0035",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure SecretsManager Secrets are Encrypted using KMS key",
"reference_id": "AC_AWS_036",
"reference_id": "AWS.SecretsManagerSecret.DP.MEDIUM.0036",
"category": "Data Protection",
"version": 2
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "HIGH",
"description": "Ensure secrets manager do not wildcard policies attached",
"reference_id": "AC_AWS_066",
"reference_id": "AWS.ASSP.IAM.HIGH.0066",
"category": "Identity and Access Management",
"version": 1
}

0 comments on commit 8fc20b2

Please sign in to comment.