Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(security): update security hub cis v1.4.0 example config #55

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

msambol
Copy link

@msambol msambol commented Feb 3, 2023

Issue #, if available: #46

Description of changes:

Control ids are named differently in CIS v1.2.0 compared to v1.4.0. This fixes the best practices examples to properly disable controls in CIS v1.4.0.

        {
            "StandardsControlArn": "arn:aws:securityhub:us-east-1:325532037649:control/cis-aws-foundations-benchmark/v/1.2.0/1.10",
            "ControlStatus": "ENABLED",
            "ControlStatusUpdatedAt": "2023-01-22T18:57:39.152000+00:00",
            "ControlId": "CIS.1.10",
            "Title": "Ensure IAM password policy prevents password reuse",
            "Description": "IAM password policies can prevent the reuse of a given password by the same user. It is recommended that the password policy prevent the reuse of passwords.",
            "RemediationUrl": "https://docs.aws.amazon.com/console/securityhub/standards-cis-1.10/remediation",
            "SeverityRating": "LOW",
            "RelatedRequirements": [
                "CIS AWS Foundations 1.10"
            ]
        }

        {
            "StandardsControlArn": "arn:aws:securityhub:us-east-1:325532037649:control/cis-aws-foundations-benchmark/v/1.4.0/1.12",
            "ControlStatus": "ENABLED",
            "ControlStatusUpdatedAt": "2023-02-03T16:15:21.634000+00:00",
            "ControlId": "1.12",
            "Title": "Ensure credentials unused for 45 days or greater are disabled",
            "Description": "AWS IAM users can access AWS resources using different types of credentials, such as passwords or access keys. It is recommended that all credentials that have been unused in 45 or greater days be removed or deactivated.",
            "RemediationUrl": "https://docs.aws.amazon.com/console/securityhub/CIS.v1.4.0.1.12/remediation",
            "SeverityRating": "MEDIUM",
            "RelatedRequirements": [
                "CIS AWS Foundations Benchmark v1.4.0/1.12"
            ]
        }

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant