Skip to content

CloudFormation

CloudFormation Queries List

This page contains all queries from CloudFormation.

Query Severity Category Description Help
Lambda Functions With Full Privileges
a0ae0a4e-712b-4115-8112-51b9eeed9d69
High Access Control AWS Lambda Functions should not have roles with policies granting full administrative privileges. Documentation
IAM Policies With Full Privileges
953b3cdb-ce13-428a-aa12-318726506661
High Access Control IAM policies shouldn't allow full administrative privileges Documentation
S3 Bucket ACL Allows Read Or Write to All Users
07dda8de-d90d-469e-9b37-1aca53526ced
High Access Control S3 Buckets sould not be readable and writable to all users Documentation
S3 Bucket Allows Put Action From All Principals
f6397a20-4cf1-4540-a997-1d363c25ef58
High Access Control S3 Buckets must not allow Put Actions From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is Put, for all Principals. Documentation
S3 Bucket With All Permissions
4ae8af91-5108-42cb-9471-3bdbe596eac9
High Access Control S3 Buckets must not have all permissions, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is '*', for all Principals. Documentation
S3 Bucket ACL Allows Read to Any Authenticated User
835d5497-a526-4aea-a23f-98a9afd1635f
High Access Control S3 Buckets sould not be readable and writable to all users Documentation
S3 Bucket Allows Get Action From All Principals
f97b7d23-568f-4bcc-9ac9-02df0d57fbba
High Access Control S3 Buckets must not allow Get Actions From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is Get, for all Principals. Documentation
S3 Bucket Allows Delete Action From All Principals
acc78859-765e-4011-a229-a65ea57db252
High Access Control S3 Buckets must not allow Delete Actions From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is Delete, for all Principals. Documentation
S3 Bucket Allows Restore Actions From All Principals
456b00a3-1072-4149-9740-6b8bb60251b0
High Access Control S3 Buckets must not allow Restore Actions From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is Restore, for all Principals. Documentation
S3 Bucket Access to Any Principal
7772bb8c-c0f3-42d4-8e4e-f1b8939ad085
High Access Control The S3 Bucket should not have the (accessPublicBlock empty or accessPublicBlock.ignorePublicAcls = false or accessPublicBlock.restrictPublicBuckets = false ) and ( policy.Statement contain [Effect='Allow' and (Principal='' or Principal.AWS='')]) Documentation
S3 Bucket Allows List Action From All Principals
faa8fddf-c0aa-4b2d-84ff-e993e233ebe9
High Access Control S3 Buckets must not allow List Actions From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is List, for all Principals. Documentation
S3 Bucket ACL Allows Read to All Users
219f4c95-aa50-44e0-97de-cf71f4641170
High Access Control S3 Buckets sould not be readable and writable to all users Documentation
ECS Service Admin Role Is Present
01986452-bdd8-4aaa-b5df-d6bf61d616ff
High Access Control ECS Services must not have Admin roles, which means the attribute 'role' must not be an admin role Documentation
Viewer Protocol Policy Allows HTTP
31733ee2-fef0-4e87-9778-65da22a8ecf1
High Encryption Ensure that the Viewer Protocol is only HTTPS Compliant Documentation
S3 Bucket SSE Disabled
64ab651b-f5b2-4af0-8c89-ddd03c4d0e61
High Encryption If algorithm is AES256 then the master key is null, empty or undefined, otherwise the master key is required Documentation
ECS Cluster Not Encrypted At Rest
6c131358-c54d-419b-9dd6-1f7dd41d180c
High Encryption Ensure that AWS ECS clusters are encrypted. Data encryption at rest, prevents unauthorized users from accessing sensitive data on your AWS ECS clusters and associated cache storage systems. Documentation
EFS Without KMS
6d087495-2a42-4735-abf7-02ef5660a7e6
High Encryption Amazon Elastic Filesystem should have filesystem encryption enabled using KMS CMK customer-managed keys instead of AWS managed-keys Documentation
EFS Not Encrypted
2ff8e83c-90e1-4d68-a300-6d652112e622
High Encryption Amazon Elastic Filesystem should have filesystem encryption enabled Documentation
Secure Ciphers Disabled
be96849c-3df6-49c2-bc16-778a7be2519c
High Encryption Check if secure ciphers aren't used in CloudFront Documentation
User Data Contains Encoded Private Key
568cc372-ca64-420d-9015-ee347d00d288
High Encryption User Data Base64 contains an encoded RSA Private Key Documentation
Memcached Disabled
dd0971a6-09c3-4168-8474-a7ef8fbfd99d
High Encryption Check if the Memcached is disabled on the ElastiCache Documentation
Redshift Cluster Without KMS CMK
de76a0d6-66d5-45c9-9022-f05545b85c78
High Encryption AWS Redshift Cluster should have KMS CMK defined Documentation
ElastiCache With Disabled at Rest Encryption
e4ee3903-9225-4b6a-bdfb-e62dbadef821
High Encryption Ensure AWS ElastiCache Redis clusters have encryption for data at rest enabled Documentation
Redshift Not Encrypted
3b316b05-564c-44a7-9c3f-405bb95e211e
High Encryption AWS Redshift Cluster should be encrypted Documentation
ELB Using Weak Ciphers
809f77f8-d10e-4842-a84f-3be7b6ff1190
High Encryption ELB Predefined or Custom Security Policies must not use insecure protocols, to reduce the risk of the SSL connection between the client and the load balancer being exploited. That means the ELB Listeners must not have Policies that posses Ciphers that coincide with any of a predefined list of weak ciphers. Documentation
CMK Unencrypted Storage
ffee2785-c347-451e-89f3-11aeb08e5c84
High Encryption Ensure that storage is encrypted by KMS on instances that, based on their name, might host a database. Documentation
S3 Bucket Without Server-side-encryption
b2e8752c-3497-4255-98d2-e4ae5b46bbf5
High Encryption S3 Buckets should have server-side encryption at rest enabled to protect sensitive data Documentation
ElastiCache With Disabled Transit Encryption
3b02569b-fc6f-4153-b3a3-ba91022fed68
High Encryption Ensure AWS ElastiCache Redis clusters have encryption for data at transit enabled Documentation
S3 Bucket Without SSL In Write Actions
38c64e76-c71e-4d92-a337-60174d1de1c9
High Encryption S3 Buckets should enforce encryption of data transfers using Secure Sockets Layer (SSL) Documentation
MSK Cluster Encryption Disabled
a976d63f-af0e-46e8-b714-8c1a9c4bf768
High Encryption Ensure MSK Cluster encryption in rest and transit is enabled. Documentation
DynamoDB With Aws Owned CMK
c8dee387-a2e6-4a73-a942-183c975549ac
High Encryption AWS DynamoDb should be encrypted using AWS Managed CMK, instead of AWS-owned CMK. To verify this, SSEEnabled must be verified if false for AWS-owned CMK or true for AWS-Managed CMK. Default value is false. Documentation
CloudFormation Specifying Credentials Not Safe
9ecb6b21-18bc-4aa7-bd07-db20f1c746db
High Encryption Specifying credentials in the template itself is probably not safe to do. Documentation
ECS Task Definition Container With Plaintext Password
f9b10cdb-eaab-4e39-9793-e12b94a582ad
High Encryption It's not recommended to use plaintext environment variables for sensitive information, such as credential data. Documentation
RDS Storage Not Encrypted
5beacce3-4020-4a3d-9e1d-a36f953df630
High Encryption AWS RDS DB Instance should be encrypted Documentation
Kinesis SSE Not Configured
7f65be75-90ab-4036-8c2a-410aef7bb650
High Encryption AWS Kinesis Stream should have SSE (Server Side Encryption) defined Documentation
User Data Shell Script Is Encoded
48c3bc58-6959-4f27-b647-4fedeace23be
High Encryption User Data Shell Script must be encoded Documentation
SageMaker Data Encryption Disabled
709e6da6-fa1f-44cc-8f17-7f25f96dadbe
High Encryption Amazon SageMaker's Notebook Instance must have its Data Encryption enabled, which means the attribute 'KmsKeyId' must be defined not empty or null. Documentation
ELB Using Insecure Protocols
61a94903-3cd3-4780-88ec-fc918819b9c8
High Encryption ELB Predefined or Custom Security Policies must not use insecure protocols, to reduce the risk of the SSL connection between the client and the load balancer being exploited. That means the ELB Listeners must not have Policies that posses Protocols that coincide with any of a predefined list of insecure protocols. Documentation
ELB Without SSL
80908a75-586b-4c61-ab04-490f4f4525b8
High Encryption Check if the ELB is setup with SSL for secure communication Documentation
CloudTrail Log Files Not Encrypted
050a9ba8-d1cb-4c61-a5e8-8805a70d3b85
High Encryption Logs delivered by CloudTrail should be encrypted using KMS Documentation
IAM Database Auth Not Enabled
9fcd0a0a-9b6f-4670-a215-d94e6bf3f184
High Encryption IAM Database Auth Enabled must be configured to true Documentation
Connection Between CloudFront Origin Not Encrypted
a5366a50-932f-4085-896b-41402714a388
High Encryption Checks if the connection between the CloudFront and the origin server is encrypted Documentation
CloudFront Without Minimum Protocol TLS 1.2
dc17ee4b-ddf2-4e23-96e8-7a36abad1303
High Insecure Configurations CloudFront Minimum Protocol version should be at least TLS 1.2 Documentation
Batch Job Definition With Privileged Container Properties
76ddf32c-85b1-4808-8935-7eef8030ab36
High Insecure Configurations Batch Job Definition should not have Privileged Container Properties Documentation
KMS Key With Vulnerable Policy
da905474-7454-43c0-b8d2-5756ab951aba
High Insecure Configurations Checks if the policy is vulnerable and needs updating Documentation
Redshift Publicly Accessible
bdf8dcb4-75df-4370-92c4-606e4ae6c4d3
High Insecure Configurations AWS Redshift Clusters must not be publicly accessible, which means the attribute 'PubliclyAccessible' must be set to false Documentation
S3 Static Website Host Enabled
90501b1b-cded-4cc1-9e8b-206b85cda317
High Insecure Configurations It's dangerous disabling a block public access settings in bucket or writing a bucket policy that grants public read access Documentation
ECS Task Definition Network Mode Not Recommended
027a4b7a-8a59-4938-a04f-ed532512cf45
High Insecure Configurations Network_Mode should be 'awsvpc' in ecs_task_definition. AWS VPCs provides the controls to facilitate a formal process for approving and testing all network connections and changes to the firewall and router configurations Documentation
API Gateway Without Security Policy
8275fab0-68ec-4705-bbf4-86975edb170e
High Insecure Configurations API Gateway should have a Security Policy defined and use TLS 1.2. Documentation
Root Account Has Active Access Keys
4c137350-7307-4803-8c04-17c09a7a9fcf
High Insecure Configurations Check if the root user has any access keys associated to it. Documentation
DB Security Group Has Public IP
de38e1d5-54cb-4111-a868-6f7722695007
High Insecure Configurations RDS must not be defined with public interface, which means the attribute 'PubliclyAccessible' must be set to false. Documentation
Vulnerable Default SSL Certificate
b4d9c12b-bfba-4aeb-9cb8-2358546d8041
High Insecure Defaults CloudFront web distributions should use custom (and not default) SSL certificates. Custom SSL certificates allow only defined users to access content by using an alternate domain name instead of the default one. Documentation
Permissive Web ACL Default Action
6d64f311-3da6-45f3-80f1-14db9771ea40
High Insecure Defaults WebAcl DefaultAction should not be ALLOW Documentation
HTTP Port Open
ddfc4eaa-af23-409f-b96c-bf5c45dc4daa
High Networking and Firewall The HTTP port is open in a Security Group Documentation
EC2 Public Instance Exposed Through Subnet
c44c95fc-ae92-4bb8-bdf8-bb9bc412004a
High Networking and Firewall EC2 instances with public IP addresses shouldn't allow for unrestricted traffic to their subnets Documentation
DB Security Group with Public Scope
9564406d-e761-4e61-b8d7-5926e3ab8e79
High Networking and Firewall The IP address in a DB Security Group must not be '0.0.0.0/0' (IPv4) or '::/0' (IPv6). Documentation
Security Group With Unrestricted Access To SSH
6e856af2-62d7-4ba2-adc1-73b62cef9cc1
High Networking and Firewall Security Groups allows all traffic for SSH (port:22) Documentation
ALB Listening on HTTP
275a3217-ca37-40c1-a6cf-bb57d245ab32
High Networking and Firewall All Application Load Balancers (ALB) should block connection requests over HTTP Documentation
ELB Sensitive Port Is Exposed To Entire Network
78055456-f670-4d2e-94d5-392d1cf4f5e4
High Networking and Firewall The load balancer of the application with a sensitive port connection is exposed to the entire internet. Documentation
Route53 Record Undefined
24d932e1-91f0-46ea-836f-fdbd81694151
High Networking and Firewall Route53 HostedZone must have the Record Set defined. Documentation
Security Group Unrestricted Access To RDP
3ae83918-7ec7-4cb8-80db-b91ef0f94002
High Networking and Firewall Security Groups does not allow 0.0.0.0/0 for rdp (port:3389) Documentation
Fully Open Ingress
e415f8d3-fc2b-4f52-88ab-1129e8c8d3f5
High Networking and Firewall ECS Service's security group should not allow unrestricted access to all ports from all IPv4 addresses Documentation
Security Groups Allows Unrestricted Outbound Traffic
66f2d8f9-a911-4ced-ae27-34f09690bb2c
High Networking and Firewall No security group should allow unrestricted egress access Documentation
Remote Desktop Port Open
c9846969-d066-431f-9b34-8c4abafe422a
High Networking and Firewall The Remote Desktop port is open in a Security Group Documentation
SageMaker Notebook Not Placed In VPC
9c7028d9-04c2-45be-b8b2-1188ccaefb36
High Networking and Firewall SageMaker Notebook must be placed in a VPC Documentation
Default Security Groups With Unrestricted Traffic
ea33fcf7-394b-4d11-a228-985c5d08f205
High Networking and Firewall Security Groups set as default must be denied traffic. Documentation
Unknown Port Exposed To Internet
829ce3b8-065c-41a3-ad57-e0accfea82d2
High Networking and Firewall AWS Security Group should not have an unknown port exposed to the entire Internet Documentation
Security Groups With Exposed Admin Ports
cdbb0467-2957-4a77-9992-7b55b29df7b7
High Networking and Firewall Security Groups should not have ports open in (20, 21, 22, 23, 115, 137, 138, 139, 2049, 3389) Documentation
EC2 Network ACL Overlapping Ports
77b6f1e2-bde4-4a6a-ae7e-a40659ff1576
High Networking and Firewall NetworkACL Entries are reusing or overlapping ports which may create ineffective rules Documentation
DB Security Group Open To Large Scope
0104165b-02d5-426f-abc9-91fb48189899
High Networking and Firewall The IP address in a DB Security Group must not have more than 256 hosts. Documentation
Security Groups With Meta IP
adcd0082-e90b-4b63-862b-21899f6e6a48
High Networking and Firewall Security Groups allows 0.0.0.0/0 for all ports and protocols. Documentation
EC2 Sensitive Port Is Publicly Exposed
494b03d3-bf40-4464-8524-7c56ad0700ed
High Networking and Firewall The EC2 instance has a sensitive port connection exposed to the entire network Documentation
CloudTrail Logging Disabled
5c0b06d5-b7a4-484c-aeb0-75a836269ff0
High Observability Checks if logging is enabled for CloudTrail. Documentation
CMK Rotation Disabled
1c07bfaf-663c-4f6f-b22b-8e2d481e4df5
High Observability Customer Master Keys (CMK) must have rotation enabled, which means the attribute 'EnableKeyRotation' must be set to 'true' when the key is enabled. Documentation
Configuration Aggregator to All Regions Disabled
9f3cf08e-72a2-4eb1-8007-e3b1b0e10d4d
High Observability AWS Config Configuration Aggregator All Regions must be set to True Documentation
S3 Bucket CloudTrail Logging Disabled
c3ce69fd-e3df-49c6-be78-1db3f802261c
High Observability Server Access Logging must be enabled on S3 Buckets so that all changes are logged and trackable when the Service used is CloudTrail Documentation
Empty Roles For ECS Cluster Task Definitions
7f384a5f-b5a2-4d84-8ca3-ee0a5247becb
Medium Access Control Check if any ECS cluster has not defined proper roles for services' task definitions. Documentation
API Gateway Method Does Not Contains An API Key
3641d5b4-d339-4bc2-bfb9-208fe8d3477f
Medium Access Control An API Key should be required on a method request. Documentation
IAM Policy On User
e4239438-e639-44aa-adb8-866e400e3ade
Medium Access Control IAM policies should be applied to groups and not to users Documentation
SQS Queue Policy Allows NotPrincipal
4a8fc9a2-2b2f-4b3f-aa8d-401425872034
Medium Access Control Checks if an SQS Queue policy has an Allow and a NotPrincipal. AWS strongly recommends against using NotPrincipal in the same policy statement as "Effect": "Allow". Documentation
EC2 Instance Has No IAM Role
f914357d-8386-4d56-9ba6-456e5723f9a6
Medium Access Control Check if an EC2 instance refers to an IAM profile, which represents an IAM Role. Documentation
Lambda Permission Principal Is Wildcard
1d6e16f1-5d8a-4379-bfb3-2dadd38ed5a7
Medium Access Control Lambda Permission Principal should not be wildcard. Documentation
Public Lambda via API Gateway
57b12981-3816-4c31-b190-a1e614361dd2
Medium Access Control Allowing to run lambda function using public API Gateway Documentation
SNS Topic Publicity Has Allow and NotAction Simultaneously
818f38ed-8446-4132-9c03-474d49e10195
Medium Access Control SNS topic Publicity Should not have Allow and NotAction at the same time, if it has Allow it should have Action Documentation
IoT Policy Allows Action as Wildcard
4d32780f-43a4-424a-a06d-943c543576a5
Medium Access Control IoT Policy should not allow Action to be set as * Documentation
EC2 Network ACL Ineffective Denied Traffic
2623d682-dccb-44cd-99d0-54d9fd62f8f2
Medium Access Control Ineffective deny rules. A deny rule should be applied to all IP addresses. Documentation
SQS Policy With Public Access
9b6a3f5b-5fd6-40ee-9bc0-ed604911212d
Medium Access Control Checks for dangerous permissions in Action statements in an SQS Queue Policy. This is deemed a potential security risk as it would allow various attacks to the queue Documentation
ECR Repository Is Publicly Accessible
75be209d-1948-41f6-a8c8-e22dd0121134
Medium Access Control Amazon ECR image repositories shouldn't have public access Documentation
KMS Allows Wildcard Principal
f6049677-ec4a-43af-8779-5190b6d03cba
Medium Access Control KMS Should not allow Principal parameter to be set as * Documentation
Neptune Cluster With IAM Database Authentication Disabled
a3aa0087-8228-4e7e-b202-dc9036972d02
Medium Access Control Neptune Cluster should have IAM Database Authentication enabled Documentation
IoT Policy Allows Wildcard Resource
be5b230d-4371-4a28-a441-85dc760e2aa3
Medium Access Control IoT Policy should not allow Resource to be set as * Documentation
SQS Queue Policy Allows NotAction
4fbfee74-8186-40d5-a24e-4baa76a855de
Medium Access Control AWS SQS Queue Policy should not allow NotAction since the actions specified in this element are the only actions in that are limited Documentation
Auto Scaling Group With No Associated ELB
ad21e616-5026-4b9d-990d-5b007bfe679c
Medium Availability AWS Auto Scaling Groups must have associated ELBs to ensure high availability and improve application performance. This means the attribute 'LoadBalancerNames' must be defined and not empty. Documentation
CMK Is Unusable
2844c749-bd78-4cd1-90e8-b179df827602
Medium Availability AWS Key Management Service (KMS) must only possess usable Customer Master Keys (CMK), which means the CMKs must have the attribute 'Enabled' set to true and the attribute 'PendingWindowInDays' must be undefined. Documentation
ECS Service Without Running Tasks
79d745f0-d5f3-46db-9504-bef73e9fd528
Medium Availability ECS Service should have at least 1 task running Documentation
EBS Volume Not Attached To Instances
1819ac03-542b-4026-976b-f37addd59f3b
Medium Availability EBS Volumes that are unattached to instances may contain sensitive data Documentation
ElastiCache Nodes Not Created Across Multi AZ
cfdef2e5-1fe4-4ef4-bea8-c56e08963150
Medium Availability Check if ElastiCache nodes are not being created across multi AZ Documentation
RDS With Backup Disabled
8c415f6f-7b90-4a27-a44a-51047e1506f9
Medium Backup Make sure the AWS RDS configuration has automatic backup configured. If the retention period is equal to 0 there is no backup Documentation
Low RDS Backup Retention Period
e649a218-d099-4550-86a4-1231e1fcb60d
Medium Backup AWS RDS backup retention policy should be at least 7 days Documentation
RDS Multi-AZ Deployment Disabled
2b1d4935-9acf-48a7-8466-10d18bf51a69
Medium Backup AWS RDS Instance should have a multi-az deployment Documentation
Stack Retention Disabled
fe974ae9-858e-4991-bbd5-e040a834679f
Medium Backup Make sure that retain_stack is enabled to keep the Stack and it's associated resources during resource destruction Documentation
IAM Password Without Lowercase Letter
f4cf35d6-da92-48de-ab70-57be2b2e6497
Medium Best Practices IAM user resource Login Profile Password should have lowercase letter Documentation
IAM Password Without Symbol
d72a7869-e8b9-4e12-bcd2-e8be10b39fa7
Medium Best Practices IAM user resource Login Profile Password should have at least one symbol Documentation
ECS No Load Balancer Attached
fb2b0ecf-1492-491a-a70d-ba1df579175d
Medium Best Practices Amazon ECS service should be configured to use Load Balancing to distribute traffic evenly across the tasks, which means there must exist at least one LoadBalancer. Documentation
IAM Password Without Minimum Length
b1b20ae3-8fa7-4af5-a74d-a2145920fcb1
Medium Best Practices IAM user resource Login Profile Password should have at least 14 characters Documentation
Automatic Minor Upgrades Disabled
f0104061-8bfc-4b45-8a7d-630eb502f281
Medium Best Practices AWS RDS should have automatic minor upgrades enabled, which means the attribute 'AutoMinorVersionUpgrade' must be set to true. Documentation
IAM User Without Password Reset
a964d6e3-8e1e-4d93-8120-61fa640dd55a
Medium Best Practices IAM User Login Profile should exist and have PasswordResetRequired property set to true Documentation
IAM Password Without Number
839f238f-2e3a-4a72-b945-8abdf91af955
Medium Best Practices IAM user resource Login Profile Password should have at least one number Documentation
IAM Password Without Uppercase Letter
445020f6-b69e-4484-847f-02d4b7768902
Medium Best Practices IAM user resource Login Profile Password should have at least one uppercase letter Documentation
High Access Key Rotation Period
800fa019-49dd-421b-9042-7331fdd83fa2
Medium Best Practices Check if there is a rule that enforces access keys to be rotated within 90 days. Documentation
Cognito UserPool Without MFA
74a18d1a-cf02-4a31-8791-ed0967ad7fdc
Medium Best Practices AWS Cognito UserPool should have MFA (Multi-Factor Authentication) defined to users Documentation
IAM Managed Policy Applied to a User
0e5872b4-19a0-4165-8b2f-56d9e14b909f
Medium Best Practices Make sure that any managed IAM policies are implemented in a group and not in a user. Documentation
AmazonMQ Broker Encryption Disabled
316278b3-87ac-444c-8f8f-a733a28da60f
Medium Encryption AmazonMQ Broker should have Encryption Options defined Documentation
API Gateway Without Content Encoding
d6653eee-2d4d-4e6a-976f-6794a497999a
Medium Encryption Enable Content Encoding through the attribute 'MinimumCompressionSize'. This value should be greater than -1 and smaller than 10485760. Documentation
Config Rule For Encrypted Volumes Disabled
1b6322d9-c755-4f8c-b804-32c19250f2d9
Medium Encryption Check if AWS config rules do not identify Encrypted Volumes as a source. Documentation
KMS Key Rotation Disabled
235ca980-eb71-48f4-9030-df0c371029eb
Medium Encryption EnableKeyRotation should not be false or undefined Documentation
SageMaker EndPoint Config Should Specify KmsKeyId Attribute
44034eda-1c3f-486a-831d-e09a7dd94354
Medium Encryption KmsKeyId attribute should be defined Documentation
EMR Security Configuration Encryption Disabled
5b033ec8-f079-4323-b5c8-99d4620433a9
Medium Encryption EMR SecurityConfiguration should enable and properly configure encryption at rest and in transit. Documentation
ElasticSearch Not Encrypted At Rest
86a248ab-0e01-4564-a82a-878303e253bb
Medium Encryption Check if ElasticSearch encryption is disabled at Rest Documentation
Alexa Skill Plaintext Client Secret Exposed
3c3b7a58-b018-4d07-9444-d9ee7156e111
Medium Encryption Alexa skills' client secrets should not be defined as a plaintext string. It should either use 'AWS Systems Manager Parameter Store' or 'AWS Secrets Manager' to retrieve sensitive information Documentation
Neptune Database Cluster Encryption Disabled
bf4473f1-c8a2-4b1b-8134-bd32efabab93
Medium Encryption Neptune database cluster storage should have encryption enabled Documentation
ElasticSearch Encryption With KMS Disabled
d926aa95-0a04-4abc-b20c-acf54afe38a1
Medium Encryption Check if any ElasticSearch domain isn't encrypted with KMS. Documentation
EBS Volume Encryption Disabled
80b7ac3f-d2b7-4577-9b10-df7913497162
Medium Encryption EBS volumes should be encrypted Documentation
RDS Storage Encryption Disabled
65844ba3-03a1-40a8-b3dd-919f122e8c95
Medium Encryption RDS DBCluster should have storage encrypted set to true Documentation
IAM Group Inline Policies
a58d1a2d-4078-4b80-855b-84cc3f7f4540
Medium Encryption IAM Groups should not use inline policies and instead use managed policies. If a group is deleted, the inline policy is also deleted Documentation
CodeBuild Not Encrypted
d7467bb6-3ed1-4c82-8095-5e7a818d0aad
Medium Encryption CodeBuild Should have EncryptionKey defined Documentation
Workspace Without Encryption
89827c57-5a8a-49eb-9731-976a606d70db
Medium Encryption Workspaces should have encryption enabled Documentation
Unscanned ECR Image
9025b2b3-e554-4842-ba87-db7aeec36d35
Medium Encryption Checks if the ECR Image has been scanned Documentation
ECR Image Tag Not Immutable
33f41d31-86b1-46a4-81f7-9c9a671f59ac
Medium Insecure Configurations ECR should have an image tag be immutable Documentation
Instance With No VPC
8a6d36cd-0bc6-42b7-92c4-67acc8576861
Medium Insecure Configurations EC2 Instances should be configured under a VPC network. AWS VPCs provide the controls to facilitate a formal process for approving and testing all network connections and changes to the firewall and router configurations. Documentation
GitHub Repository Set To Public
5906092d-5f74-490d-9a03-78febe0f65e1
Medium Insecure Configurations Repositories must be set to private, which means the attribute 'visibility' must be set to 'private' and/or the attribute 'private' must be set to true (the attribute 'visibility' overrides 'private') Documentation
Inline Policies Are Attached To ECS Service
9e8c89b3-7997-4d15-93e4-7911b9db99fd
Medium Insecure Configurations Check if any ECS service has inline policies attached, which are embedded directly into an entity (user, group,...), instead of the equivalent recommended managed policies. Documentation
API Gateway With Open Access
1056dfbb-5802-4762-bf2b-8b9b9684b1b0
Medium Insecure Configurations API Gateway Method should restrict an authorization type, except for the HTTP OPTIONS method. Documentation
EMR Cluster Without Security Configuration
48af92a5-c89b-4936-bc62-1086fe2bab23
Medium Insecure Configurations EMR Cluster should have security configuration defined. Documentation
IAM User Has Too Many Access Keys
48677914-6fdf-40ec-80c4-2b0e94079f54
Medium Insecure Configurations Check if any user has more than one access key, which increases the risk of unauthorized access and compromise of credentials. Documentation
API Gateway Without SSL Certificate
ed4c48b8-eccc-4881-95c1-09fdae23db25
Medium Insecure Configurations SSL Client Certificate should be enabled Documentation
SageMaker Enabling Internet Access
88d55d94-315d-4564-beee-d2d725feab11
Medium Insecure Configurations SageMaker must have disabled internet access and root access for Creating Notebook Instances. Documentation
EC2 Instance Has Public IP
b3de4e4c-14be-4159-b99d-9ad194365e4c
Medium Insecure Configurations EC2 Subnet should not have MapPublicIpOnLaunch set to true Documentation
Lambda Functions Without Unique IAM Roles
ae03f542-1423-402f-9cef-c834e7ee9583
Medium Insecure Configurations AWS Lambda Functions should not share IAM roles to ensure they will have the minimum privileges needed to perform the required tasks Documentation
Lambda Function Without Tags
8df8e857-bd59-44fa-9f4c-d77594b95b46
Medium Insecure Configurations AWS Lambda Functions must have associated tags. Documentation
MQ Broker Is Publicly Accessible
68b6a789-82f8-4cfd-85de-e95332fe6a61
Medium Insecure Configurations Check if any MQ Broker is not publicly accessible Documentation
IAM User LoginProfile Password Is In Plaintext
06adef8c-c284-4de7-aad2-af43b07a8ca1
Medium Insecure Configurations IAM User LoginProfile Password must not be a plaintext string Documentation
S3 Bucket Should Have Bucket Policy
37fa8188-738b-42c8-bf82-6334ea567738
Medium Insecure Defaults Checks if S3 Bucket has the same name as a Bucket Policy, if it has, S3 Bucket has a Bucket Policy associated Documentation
RouterTable with Default Routing
4f0908b9-eb66-433f-9145-134274e1e944
Medium Insecure Defaults NAT gateways are recommended, and not the default route which permits all traffic, in Route Tables. Documentation
TCP/UDP Protocol Network ACL Entry Allows All Ports
f57f849c-883b-4cb7-85e7-f7b199dff163
Medium Networking and Firewall TCP/UDP protocol AWS Network ACL Entry should not allow all ports Documentation
Security Group Egress With Port Range
dae9c373-8287-462f-8746-6f93dad93610
Medium Networking and Firewall AWS Security Group Egress should have a single port Documentation
ELB With Security Group Without Inbound Rules
e200a6f3-c589-49ec-9143-7421d4a2c845
Medium Networking and Firewall An AWS Elastic Load Balancer (ELB) shouldn´t have security groups without outbound rules Documentation
ELB With Security Group Without Outbound Rules
01d5a458-a6c4-452a-ac50-054d59275b7c
Medium Networking and Firewall An AWS Elastic Load Balancer (ELB) shouldn´t have security groups without outbound rules Documentation
API Gateway Endpoint Config is Not Private
4a8daf95-709d-4a36-9132-d3e19878fa34
Medium Networking and Firewall The API Endpoint type in API Gateway should be set to PRIVATE so it's not exposed to the public internet Documentation
Unrestricted Security Group Ingress
4a1e6b34-1008-4e61-a5f2-1f7c276f8d14
Medium Networking and Firewall AWS Security Group Ingress CIDR should not be open to the world Documentation
ALB Is Not Integrated With WAF
105ba098-1e34-48cd-b0f2-a8a43a51bf9b
Medium Networking and Firewall All Application Load Balancers (ALB) must be protected with Web Application Firewall (WAF) service Documentation
GameLift Fleet EC2 InboundPermissions With Port Range
43356255-495d-4148-ad8d-f6af5eac09dd
Medium Networking and Firewall AWS GameLift Fleet EC2InboundPermissions should have a single port Documentation
Security Group Ingress With All Protocols
1a427b25-2e9e-4298-9530-0499a55e736b
Medium Networking and Firewall AWS Security Group Ingress should not specify all protocols to prevent allow traffic on all ports Documentation
Security Group Ingress With Port Range
87482183-a8e7-4e42-a566-7a23ec231c16
Medium Networking and Firewall AWS Security Group Ingress should have a single port Documentation
Security Group Egress CIDR Open To World
1cc2fbd7-816c-4fbf-ad6d-38a4afa4312a
Medium Networking and Firewall AWS Security Group Egress CIDR should not be open to the world Documentation
Security Group Egress With All Protocols
ee464fc2-54a6-4e22-b10a-c6dcd2474d0c
Medium Networking and Firewall AWS Security Group Egress should not specify all protocols to prevent allow traffic on all ports Documentation
Security Groups Without VPC Attached
493d9591-6249-47bf-8dc0-5c10161cc558
Medium Networking and Firewall Security Groups must have a VPC. Documentation
EC2 Permissive Network ACL Protocols
03879981-efa2-47a0-a818-c843e1441b88
Medium Networking and Firewall To avoid opening all ports for Allow rules, EC2 NetworkACL Entry Protocol should be either 6 (for TCP), 17 (for UDP), 1 (for ICMP), or 58 (for ICMPv6, which must include an IPv6 CIDR block, ICMP type, and code). Documentation
MQ Broker Logging Disabled
e519ed6a-8328-4b69-8eb7-8fa549ac3050
Medium Observability Check if MQ Brokers don't have logging enabled in any of the two options possible (audit and general). Documentation
Redshift Cluster Logging Disabled
3de2d4ff-fe53-4fc9-95d3-2f8a69bf90d6
Medium Observability Make sure Logging is enabled for Redshift Cluster Documentation
MSK Cluster Logging Disabled
fc7c2c15-f5d0-4b80-adb2-c89019f8f62b
Medium Observability Ensure MSK Cluster Logging is enabled Documentation
CloudWatch Metrics Disabled
5d3c1807-acb3-4bb0-be4e-0440230feeaf
Medium Observability Checks if CloudWatch Metrics is Enabled Documentation
API Gateway Deployment Without Access Log Setting
06ec63e3-9f72-4fe2-a218-2eb9200b8db5
Medium Observability API Gateway Deployment should have access log setting defined when connected to an API Gateway Stage. Documentation
CloudTrail SNS Topic Name Undefined
3e09413f-471e-40f3-8626-990c79ae63f3
Medium Observability Check if SNS topic name is set for CloudTrail Documentation
GuardDuty Detector Disabled
a25cd877-375c-4121-a640-730929936fac
Medium Observability Make sure that Amazon GuardDuty is Enabled. Documentation
ELBv2 ALB Access Log Disabled
c62e8b7d-1fdf-4050-ac4c-76ba9e1d9621
Medium Observability ELBv2 ALBs should have access log enabled to capture detailed information about requests sent to your load balancer. Documentation
Stack Notifications Disabled
837e033c-4717-40bd-807e-6abaa30161b7
Medium Observability Enable AWS CloudFormation Stack Notifications Documentation
ElasticSearch Without Slow Logs
086ea2eb-14a6-4fd4-914b-38e0bc8703e8
Medium Observability Ensure that AWS Elasticsearch enables support for slow logs Documentation
CloudTrail Multi Region Disabled
058ac855-989f-4378-ba4d-52d004020da7
Medium Observability AWS CloudTrail should have IsMultiRegionTrail set to true Documentation
CloudFront Logging Disabled
de77cd9f-0e8b-46cc-b4a4-b6b436838642
Medium Observability Make sure AWS CloudFront distribution has access log enabled Documentation
API Gateway V2 Stage Access Logging Settings Not Defined
80d45af4-4920-4236-a56e-b7ef419d1941
Medium Observability API Gateway V2 Stage should have Access Logging Settings defined. Documentation
ELB Access Log Disabled
ee12ad32-2863-4c0f-b13f-28272d115028
Medium Observability ELB should have access log enabled Documentation
API Gateway X-Ray Disabled
4ab10c48-bedb-4deb-8f3b-ff12783b61de
Medium Observability X-Ray Tracing is not enabled Documentation
S3 Bucket Without Versioning
a227ec01-f97a-4084-91a4-47b350c1db54
Medium Observability S3 bucket versioning should be enabled Documentation
CloudWatch Logging Disabled
0f0fb06b-0f2f-4374-8588-f2c7c348c7a0
Medium Observability Check if CloudWatch logging is disabled for Route53 hosted zones Documentation
CloudTrail Not Integrated With CloudWatch
65d07da5-9af5-44df-8983-52d2e6f24c44
Medium Observability CloudTrail should be integrated with CloudWatch Documentation
Directory Service Simple AD Password Exposed
6685d912-d81f-4cfa-95ad-e316ea31c989
Medium Secret Management DirectoryService SimpleAD password must not be a plaintext string or a Ref to a Parameter with a Default value. Documentation
SNS Topic Without KmsMasterKeyId
9d13b150-a2ab-42a1-b6f4-142e41f81e52
Medium Secret Management KmsMasterKeyId attribute should not be undefined Documentation
EBS Volume Without KmsKeyId
b7063015-6c31-4658-a8e7-14f98f37fd42
Medium Secret Management EBS Volume should specify a KmsKeyId value Documentation
DMS Endpoint MongoDB Settings Password Exposed
f988a17f-1139-46a3-8928-f27eafd8b024
Medium Secret Management DMS Endpoint MongoDbSettings Password must not be a plaintext string or a Ref to a Parameter with a Default value. Documentation
Amplify App OAuth Token Exposed
03b38885-8f4e-480c-a0e4-12c1affd15db
Medium Secret Management Amplify App OAuth Token must not be a plaintext string or a Ref to a Parameter with a Default value. Documentation
RefreshToken Is Exposed
5b48c507-0d1f-41b0-a630-76817c6b4189
Medium Secret Management Alexa ASK Skill AuthenticationConfiguration RefreshToken should not be a plaintext string Documentation
Hardcoded AWS Access Key In Lambda
2564172f-c92b-4261-9acd-464aed511696
Medium Secret Management Lambda hardcoded AWS access/secret keys Documentation
Amplify Branch Basic Auth Config Password Exposed
dfb56e5d-ee68-446e-b32a-657b62befe69
Medium Secret Management Amplify Branch BasicAuthConfig Password must not be a plaintext string or a Ref to a Parameter with a Default value. Documentation
Secrets Manager Should Specify KmsKeyId
c8ae9ba9-c2f7-4e5c-b32e-a4b7712d4d22
Medium Secret Management Secrets Manager Secret should explicitly specify KmsKeyId, this will allow the secret to be shared cross-account Documentation
SQS with SSE disabled
12726829-93ed-4d51-9cbe-13423f4299e1
Medium Secret Management AWS SQS Queue should have a KMS Master Key defined Documentation
DMS Endpoint Password Exposed
5f700072-b7ce-4e84-b3f3-497bf1c24a4d
Medium Secret Management DMS Endpoint password must not be a plaintext string or a Ref to a Parameter with a Default value. Documentation
Directory Service Microsoft AD Password Set to Plaintext or Default Ref
06b9f52a-8cd5-459b-bdc6-21a22521e1be
Medium Secret Management Directory Service Microsoft AD password must not be a plaintext string or a Ref to a Parameter with a Default value. Documentation
Amplify App Basic Auth Config Password Exposed
71493c8b-3014-404c-9802-078b74496fb7
Medium Secret Management Amplify App BasicAuthConfig Password must not be a plaintext string or a Ref to a Parameter with a Default value. Documentation
Amplify App Access Token Exposed
73980e43-f399-4fcc-a373-658228f7adf7
Medium Secret Management Amplify App Access Token must not be in a plain text string or referenced in a parameter as a default value. Documentation
DocDB Cluster Master Password In Plaintext
39423ce4-9011-46cd-b6b1-009edcd9385d
Medium Secret Management DocDB DB Cluster master user password must not be in a plain text string or referenced in a parameter as a default value. Documentation
IAM Policy Grants 'AssumeRole' Permission Across All Services
e835bd0d-65da-49f7-b6d1-b646da8727e6
Low Access Control Check if any IAM Policy grants 'AssumeRole' permission across all services. Documentation
IAM User With No Group
06933df4-0ea7-461c-b9b5-104d27390e0e
Low Access Control A IAM user should belong to a group Documentation
IAM Role Allows All Principals To Assume
f80e3aa7-7b34-4185-954e-440a6894dde6
Low Access Control IAM role allows all services or principals to assume it Documentation
IAM Policy Grants Full Permissions
f62aa827-4ade-4dc4-89e4-1433d384a368
Low Access Control Check if an IAM policy is granting full permissions to resources from the get-go, instead of granting permissions gradually as necessary. Documentation
IAM Group Without Users
8f957abd-9703-413d-87d3-c578950a753c
Low Access Control IAM Group should have at least one user associated Documentation
Support Has No Role Associated
d71b5fd7-9020-4b2d-9ec8-b3839faa2744
Low Access Control Check if any AWS Support policy does not have any role and users and group associated, which means that is not being managed. Documentation
VPC Attached With Too Many Gateways
97e94d17-e2c7-4109-a53b-6536ac1bb64e
Low Availability The number of gateways approaches or goes beyond the limit in a particular VPC Documentation
RDS With Deletion Protection Disabled
2c161e58-cb52-454f-abea-6470c37b5e6e
Low Backup RDS DBInstance should have deletion protection set to true Documentation
Lambda Permission Misconfigured
9b83114b-b2a1-4534-990d-06da015e47aa
Low Best Practices Lambda permission may be misconfigured if the action field is not filled in by 'lambda: InvokeFunction' Documentation
Geo Restriction Disabled
7f8843f0-9ea5-42b4-a02b-753055113195
Low Best Practices Geo Restriction feature should be enabled, to restrict or allow users in specific locations accessing web application content Documentation
CDN Configuration Is Missing
e4f54ff4-d352-40e8-a096-5141073c37a2
Low Best Practices Content Delivery Network (CDN) service is used within AWS account to secure and accelerate the delivery of websites. The use of a CDN can provide a layer of security between your origin content and the destination. Documentation
Security Group Rule Without Description
5e6c9c68-8a82-408e-8749-ddad78cbb9c5
Low Best Practices AWS Security Group Rule should have description defined Documentation
IAM Policies Attached To User
edc95c10-7366-4f30-9b4b-f995c84eceb5
Low Best Practices IAM User should embed managed policies instead of inline policies Documentation
Security Group Ingress Has CIDR Not Recommended
a3e4e39a-e5fc-4ee9-8cf5-700febfa86dd
Low Best Practices AWS Security Group Ingress CIDR should not be /32 in case of IPV4 or /128 in case of IPV6 Documentation
IAM Policies Without Groups
5e7acff5-095b-40ac-9073-ac2e4ad8a512
Low Best Practices IAM policy should not apply directly to users, should be with a group Documentation
EFS Without Tags
08e39832-5e42-4304-98a0-aa5b43393162
Low Build Process Amazon Elastic Filesystem should have filesystem tags associated Documentation
DynamoDB With Not Recommented Table Billing Mode
c333e906-8d8b-4275-b999-78b6318f8dc6
Low Build Process Checks if DynamoDB Table Billing Mode is set to either PAY_PER_REQUEST or PROVISIONED Documentation
Open Access To Resources Through API
60112997-8bd0-4c4c-9140-e5111706ea6f
Low Insecure Configurations Open access to back-end resources through API Documentation
Wildcard In ACM Certificate Domain Name
cc8b294f-006f-4f8f-b5bb-0a9140c33131
Low Insecure Configurations ACM Certificate should not use wildcards (*) in the domain name Documentation
CloudFront Without WAF
0f139403-303f-467c-96bd-e717e6cfd62d
Low Networking and Firewall All AWS CloudFront distributions should be integrated with the Web Application Firewall (AWS WAF) service Documentation
EC2 Network ACL Duplicate Rule
045ddb54-cfc5-4abb-9e05-e427b2bc96fe
Low Networking and Firewall A Network ACL's rule numbers cannot be repeated unless one is egress and the other is ingress Documentation
API Gateway Deployment Without API Gateway UsagePlan Associated
783860a3-6dca-4c8b-81d0-7b62769ccbca
Low Observability API Gateway Deployment should have API Gateway UsagePlan defined and associated. Documentation
S3 Bucket Logging Disabled
4552b71f-0a2a-4bc4-92dd-ed7ec1b4674c
Low Observability Server Access Logging must be enabled on S3 Buckets so that all changes are logged and trackable Documentation
ECS Task Definition HealthCheck Missing
d24389b4-b209-4ff0-8345-dc7a4569dcdd
Low Observability Amazon ECS must have the HealthCheck property defined to give more control over monitoring the health of tasks Documentation
VPC FlowLogs Disabled
f6d299d2-21eb-41cc-b1e1-fe12d857500b
Low Observability VPC hasn't got any FlowLog associated Documentation
SNS Topic is Publicly Accessible For Subscription
ae53ce91-42b5-46bf-a84f-9a13366a4f13
Low Observability Ensure appropriate subscribers to each SNS topic Documentation
CloudTrail Log File Validation Disabled
2a3560fe-52ca-4443-b34f-bf0ed5eb74c8
Low Observability CloudTrail log file validation should be enabled Documentation
Lambda Functions Without X-Ray Tracing
9488c451-074e-4cd3-aee3-7db6104f542c
Low Observability AWS Lambda functions should have TracingConfig enabled. For this, property 'tracingConfig.mode' should have the value 'Active' Documentation
API Gateway Stage Without API Gateway UsagePlan Associated
7f8f1b60-43df-4c28-aa21-fb836dbd8071
Low Resource Management API Gateway Stage should have API Gateway UsagePlan defined and associated. Documentation
ECS Task Definition Invalid CPU or Memory
f4c9b5f5-68b8-491f-9e48-4f96644a1d51
Low Resource Management In ECS Task Definition of FARGATE launch type if you specify an invalid CPU or Memory value, you will receive an error Documentation
SDB Domain Declared As A Resource
6ea57c8b-f9c0-4ec7-bae3-bd75a9dee27d
Low Resource Management SimpleDB Domain resource should not be declared Documentation
VPC Without Attached Subnet
3b3b4411-ad1f-40e7-b257-a78a6bb9673a
Low Resource Management VPCs without attached subnets may indicate that they are not being used Documentation