1. Docs
  2. Reference
  3. Pre-built Policy Packs
  4. NIST
  5. AWS

NIST SP 800-53 - AWS

    This page lists all 139 policies in the NIST SP 800-53 pack for AWS.

    Policy NameDescriptionFramework ReferenceFramework Specification
    security-group-ssh-rdpEnsures security groups do not allow SSH/RDP from the internetAC-17 Remote AccessThe organization establishes and documents usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed.
    iam-user-group-membership-requiredIAM users must be members of groups for proper access managementAC-2 Account ManagementThe organization manages information system accounts, including establishing, activating, modifying, reviewing, disabling, and removing accounts.
    iam-role-inline-policy-restrictionIAM roles must not have inline policiesAC-2 Account ManagementThe organization manages information system accounts, including establishing, activating, modifying, reviewing, disabling, and removing accounts.
    iam-role-policy-restrictionIAM role policies (inline policy attachments) should not be usedAC-2 Account ManagementThe organization manages information system accounts, including establishing, activating, modifying, reviewing, disabling, and removing accounts.
    iam-user-policy-restrictionIAM user policies (inline policy attachments) should not be usedAC-2 Account ManagementThe organization manages information system accounts, including establishing, activating, modifying, reviewing, disabling, and removing accounts.
    iam-group-policy-restrictionIAM group policies (inline policy attachments) should not be usedAC-2 Account ManagementThe organization manages information system accounts, including establishing, activating, modifying, reviewing, disabling, and removing accounts.
    s3-bucket-public-access-blockEnsures each S3 bucket has a public access block with all settings enabledAC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    s3-bucket-disallow-public-readChecks that S3 Bucket ACLs don’t allow ‘public-read’ or ‘public-read-write’ or ‘authenticated-read’.AC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    ec2-instance-disallow-public-ipChecks that EC2 instances do not have a public IP address.AC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    rds-instance-disallow-public-accessChecks that RDS Instance public access is not enabled.AC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    rds-cluster-instance-disallow-public-accessChecks that RDS Cluster Instances public access is not enabled.AC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    neptune-clusterinstance-no-public-accessChecks that Neptune Cluster Instances public access is not enabled.AC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    dms-no-public-accessEnsures DMS replication instances are not publicly accessible to maintain security.AC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    ecs-task-non-privileged-requiredECS task definitions must use non-privileged user for host modeAC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    emr-no-default-subnetEMR clusters must specify explicit subnet configuration to prevent default subnet usageAC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    emr-no-public-ipEMR clusters must not be deployed in public subnets that auto-assign public IP addressesAC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    lambda-public-access-restrictedLambda functions must restrict public access through resource-based policiesAC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    redshift-public-access-prohibitedEnsures Redshift clusters prohibit public access to prevent unauthorized connections.AC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    sagemaker-notebook-internet-access-disabledEnsures SageMaker notebook instances have direct internet access disabled.AC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    vpc-subnet-auto-assign-public-ip-disabledEnsures VPC subnets have auto-assign public IP disabled to prevent unintended internet exposure.AC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    ec2-iam-profile-requiredEC2 instances must have IAM profile attachedAC-3 Access EnforcementThe information system enforces approved authorizations for logical access to information and system resources.
    iam-policy-least-privilegeEnsures IAM policies follow least privilege principlesAC-6 Least PrivilegeThe organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks.
    iam-role-least-privilegeEnsures IAM roles follow least privilege principlesAC-6 Least PrivilegeThe organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks.
    iam-role-policy-least-privilegeEnsures IAM role policies follow least privilege principlesAC-6 Least PrivilegeThe organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks.
    iam-user-policy-least-privilegeEnsures IAM user policies follow least privilege principlesAC-6 Least PrivilegeThe organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks.
    iam-group-policy-least-privilegeEnsures IAM group policies follow least privilege principlesAC-6 Least PrivilegeThe organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks.
    pubsub-least-privilege-iamEnsures IAM policies follow least privilege principles for Pub/Sub services (SNS, SQS, Kinesis)AC-6 Least PrivilegeThe organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks.
    s3-bucket-least-privilegePrevents overly permissive S3 bucket policiesAC-6 Least PrivilegeThe organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks.
    cloudwatch-log-retentionEnsures CloudWatch log groups have appropriate retention periods for compliance.AU-11 Audit Record RetentionThe organization retains audit records for a defined time period consistent with records retention policy.
    cloudtrail-enabledEnsures CloudTrail is enabled with at least one active trail for audit logging.AU-12 Audit GenerationThe information system provides audit record generation capability for the auditable events defined in AU-2 at organization-defined information system components.
    cloudtrail-multi-region-enabledEnsures CloudTrail trails are configured as multi-region trails for comprehensive audit coverage.AU-12 Audit GenerationThe information system provides audit record generation capability for the auditable events defined in AU-2 at organization-defined information system components.
    api-gateway-access-loggingEnsures API Gateway stages have access logging enabledAU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    api-gateway-v2-access-loggingEnsures API Gateway V2 stages have access logging enabledAU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    s3-bucket-access-loggingEnsures each S3 bucket has access logging enabledAU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    vpc-flow-logsEnsures VPC flow logs use approved destinations for centralized monitoringAU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    elb-load-balancer-configure-access-loggingCheck that ELB Load Balancers uses access logging.AU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    cloudtrail-s3-data-events-enabledEnsures CloudTrail trails have S3 data events enabled for comprehensive object-level logging.AU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    elasticsearch-cloudwatch-logging-enabledElasticsearch domains must send logs to CloudWatch for audit trackingAU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    redshift-logging-enabledEnsures Redshift clusters have logging configurations enabled for audit and monitoring purposes.AU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    wafv2-logging-enabledEnsures WAFv2 Web ACLs have logging configurations enabled for audit and monitoring purposes.AU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    rds-audit-loggingEnsures RDS instances have audit logging enabledAU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    rds-cluster-logging-enabledEnsure RDS clusters have logging enabled for monitoring and audit compliance.AU-2 Audit EventsThe organization determines that the information system is capable of auditing events and coordinates the security audit function with other organizational entities requiring audit-related information.
    sqs-dead-letter-queueEnsures SQS queues have dead letter queue configurationAU-5 Response to Audit Processing FailuresThe information system alerts designated organizational officials in the event of an audit processing failure and takes additional actions.
    s3-bucket-notifications-enabledS3 buckets must have event notifications enabled to alert personnel of important bucket activitiesAU-5 Response to Audit Processing FailuresThe information system alerts designated organizational officials in the event of an audit processing failure and takes additional actions.
    cloudtrail-cloudwatch-logs-integrationEnsures CloudTrail trails have CloudWatch Logs integration enabled for real-time monitoring and analysis.AU-6 Audit Review, Analysis, and ReportingThe organization reviews and analyzes information system audit records regularly for indications of inappropriate or unusual activity.
    cloudtrail-kms-encryption-enabledEnsures CloudTrail trails have encryption enabled using KMS keys.AU-9 Protection of Audit InformationThe information system protects audit information and audit tools from unauthorized access, modification, and deletion.
    cloudwatch-log-group-kms-encryption-enabledEnsures CloudWatch log groups have encryption enabled using KMS keys.AU-9 Protection of Audit InformationThe information system protects audit information and audit tools from unauthorized access, modification, and deletion.
    s3-bucket-object-lock-enabledS3 buckets must have object lock enabled to protect audit information and prevent unauthorized deletionAU-9 Protection of Audit InformationThe information system protects audit information and audit tools from unauthorized access, modification, and deletion.
    cloudtrail-s3-bucket-public-access-deniedEnsures S3 buckets used for CloudTrail logging deny public access to protect audit information.AU-9 Protection of Audit InformationThe information system protects audit information and audit tools from unauthorized access, modification, and deletion.
    cloudtrail-log-file-validation-enabledEnsures CloudTrail trails have log file validation enabled to protect audit log integrity.AU-9 Protection of Audit InformationThe information system protects audit information and audit tools from unauthorized access, modification, and deletion.
    autoscaling-health-checks-enabledEnsures Auto Scaling groups with load balancers have ELB health checks configured for proper monitoring.CA-7 Continuous MonitoringThe organization develops a continuous monitoring strategy and implements a continuous monitoring program.
    rds-instance-enhanced-monitoringRDS database instances must have enhanced monitoring enabled to provide detailed system-level metricsCA-7 Continuous MonitoringThe organization develops a continuous monitoring strategy and implements a continuous monitoring program.
    rds-clusterinstance-enhanced-monitoringRDS cluster instances must have enhanced monitoring enabled to provide detailed system-level metricsCA-7 Continuous MonitoringThe organization develops a continuous monitoring strategy and implements a continuous monitoring program.
    security-hub-enabledEnsures AWS Security Hub is enabled for continuous monitoring and security assessment.CA-7 Continuous MonitoringThe organization develops a continuous monitoring strategy and implements a continuous monitoring program.
    elasticbeanstalk-health-reporting-enabledElastic Beanstalk must have enhanced health reporting enabledCA-7 Continuous MonitoringThe organization develops a continuous monitoring strategy and implements a continuous monitoring program.
    config-snapshot-retentionEnsures AWS Config retention configuration meets minimum 7-year requirement for compliance auditing.CM-2 Baseline ConfigurationThe organization develops, documents, and maintains a current baseline configuration of the information system.
    config-recorder-enabledEnsures AWS Config configuration recorders are enabled for tracking and auditing resource changes.CM-3 Configuration Change ControlThe organization determines the types of changes to the information system that are configuration-controlled.
    redshift-maintenance-requiredEnsures Redshift clusters have proper maintenance settings configured for automated updates.CM-3 Configuration Change ControlThe organization determines the types of changes to the information system that are configuration-controlled.
    ebs-unused-volumes-prohibitedEBS volumes must be removed when unusedCM-8 Information System Component InventoryThe organization develops and documents an inventory of information system components that accurately reflects the current information system.
    dynamodb-point-in-time-recovery-enabledDynamoDB tables must have point-in-time recovery enabledCP-10 Information System Recovery and ReconstitutionThe organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure.
    ec2-ebs-optimized-requiredEC2 instances must be EBS optimizedCP-10 Information System Recovery and ReconstitutionThe organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure.
    rds-instance-high-availabilityEnsures RDS instances have Multi-AZ deployment enabled for high availabilityCP-2 Contingency PlanThe organization develops a contingency plan for the information system that identifies essential missions and business functions.
    rds-deletion-protectionRDS database instances must have deletion protection enabled to prevent accidental deletion and ensure data availabilityCP-2 Contingency PlanThe organization develops a contingency plan for the information system that identifies essential missions and business functions.
    elb-deletion-protectionLoad balancers must have deletion protection enabledCP-2 Contingency PlanThe organization develops a contingency plan for the information system that identifies essential missions and business functions.
    rds-cluster-disallow-single-availability-zoneCheck that RDS Cluster doesn’t use single availability zone.CP-2 Contingency PlanThe organization develops a contingency plan for the information system that identifies essential missions and business functions.
    elb-load-balancer-configure-multi-availability-zoneCheck that ELB Load Balancers uses more than one availability zone.CP-2 Contingency PlanThe organization develops a contingency plan for the information system that identifies essential missions and business functions.
    elb-load-balancer-enable-health-checkCheck that ELB Load Balancers have a health check enabled.CP-2 Contingency PlanThe organization develops a contingency plan for the information system that identifies essential missions and business functions.
    s3-bucket-replicationEnsures S3 buckets have replication configured for enhanced availabilityCP-9 Information System BackupThe organization conducts backups of user-level information contained in the information system, system-level information, and information system documentation.
    s3-bucket-versioningS3 buckets must have versioning enabled using BucketVersioning resourceCP-9 Information System BackupThe organization conducts backups of user-level information contained in the information system, system-level information, and information system documentation.
    rds-instance-enable-backup-retentionChecks that RDS Instances backup retention policy is enabled.CP-9 Information System BackupThe organization conducts backups of user-level information contained in the information system, system-level information, and information system documentation.
    rds-cluster-enable-backup-retentionChecks that RDS Clusters backup retention policy is enabled.CP-9 Information System BackupThe organization conducts backups of user-level information contained in the information system, system-level information, and information system documentation.
    elasticache-backup-retentionElastiCache Redis clusters must have automatic backup retention for 15 daysCP-9 Information System BackupThe organization conducts backups of user-level information contained in the information system, system-level information, and information system documentation.
    redshift-automatic-snapshots-requiredEnsures Redshift clusters have automatic snapshots enabled with minimum 7-day retention period.CP-9 Information System BackupThe organization conducts backups of user-level information contained in the information system, system-level information, and information system documentation.
    iam-user-mfa-console-accessEnsures IAM users with console access have MFA devicesIA-2 Identification and Authentication (Organizational Users)The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
    iam-role-assume-role-mfa-enforcementEnsures IAM roles require MFA when assumed by human users (not AWS services)IA-2 Identification and Authentication (Organizational Users)The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
    iam-role-mfa-enforcementIAM roles must require MFA for privileged actionsIA-2 Identification and Authentication (Organizational Users)The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
    iam-role-policy-mfa-enforcementIAM role policies must require MFA for privileged actionsIA-2 Identification and Authentication (Organizational Users)The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
    iam-policy-mfa-enforcementIAM policies must require MFA for privileged actionsIA-2 Identification and Authentication (Organizational Users)The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
    iam-password-policy-minimum-password-lengthEnsure IAM password policy requires minimum length of 14 or greater.IA-5 Authenticator ManagementThe organization manages information system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator.
    iam-password-policy-prevent-reuseEnsure IAM password policy prevents password reuse.IA-5 Authenticator ManagementThe organization manages information system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator.
    iam-password-expirationIAM password policy must expire passwordsIA-5 Authenticator ManagementThe organization manages information system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator.
    iam-password-complexityIAM password policy must require character complexity (lowercase, uppercase, numbers, symbols)IA-5 Authenticator ManagementThe organization manages information system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator.
    no-direct-user-access-keysPrevents creation of direct IAM user access keys for human usersIA-5 Authenticator ManagementThe organization manages information system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator.
    secrets-manager-rotation-requiredEnsures Secrets Manager secrets have automatic rotation enabled with proper scheduling and frequency limits.IA-5 Authenticator ManagementThe organization manages information system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator.
    cloudwatch-alarms-actions-requiredEnsures CloudWatch alarms have actions enabled and configured for proper incident response.IR-4 Incident HandlingThe organization implements incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.
    lambda-dead-letter-queue-requiredLambda functions must have dead letter queues configured for error handling and incident responseIR-4 Incident HandlingThe organization implements incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.
    s3-bucket-lifecycleEnsures each S3 bucket has lifecycle rules configured for retention/disposalMP-6 Media SanitizationThe organization sanitizes information system media, both paper and digital, prior to disposal, release out of organizational control, or release for reuse.
    kms-key-enable-key-rotationChecks that KMS Keys have key rotation enabled.SC-12 Cryptographic Key Establishment and ManagementThe organization establishes and manages cryptographic keys for required cryptography employed within the information system.
    kms-key-deletion-lifecycleValidates KMS key deletion windows and lifecycle managementSC-12 Cryptographic Key Establishment and ManagementThe organization establishes and manages cryptographic keys for required cryptography employed within the information system.
    kms-key-creationValidates KMS key creation with appropriate specifications and originsSC-12 Cryptographic Key Establishment and ManagementThe organization establishes and manages cryptographic keys for required cryptography employed within the information system.
    vpc-peering-dns-resolution-enabledEnsures VPC peering connections have DNS resolution enabled for proper name resolution.SC-20 Secure Name / Address Resolution Service (Authoritative Source)The information system provides additional data origin and integrity artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
    s3-bucket-encryptionS3 buckets must have server-side encryption configured using BucketServerSideEncryptionConfiguration resourceSC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    rds-instance-disallow-unencrypted-storageChecks that RDS instance storage is encrypted.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    rds-cluster-disallow-unencrypted-storageChecks that RDS Clusters storage is encrypted.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    ebs-volume-disallow-unencrypted-volumeChecks that EBS volumes are encrypted.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    ec2-instance-disallow-unencrypted-block-deviceChecks that EC2 instances do not have unencrypted block devices.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    ec2-instance-disallow-unencrypted-root-block-deviceChecks that EC2 instances does not have unencrypted root volumes.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    efs-file-system-disallow-unencrypted-file-systemChecks that EFS File Systems do not have an unencrypted file system.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    sqs-encryptionEnsures SQS queues have server-side encryption enabledSC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    secrets-manager-secret-configure-customer-managed-keyCheck that Secrets Manager Secrets use a customer-manager KMS key.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    api-gateway-cache-encryption-enabledEnsures API Gateway method settings have cache data encryption enabled when caching is configured.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    dynamodb-kms-encryption-enabledEnsures DynamoDB tables have encryption enabled using KMS keys.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    redshift-kms-encryption-enabledEnsures Redshift clusters have encryption enabled using KMS keys.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    sagemaker-endpoint-kms-encryption-enabledEnsures SageMaker endpoint configurations have encryption enabled using KMS keys.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    sagemaker-notebook-kms-encryption-enabledEnsures SageMaker notebook instances have encryption enabled using KMS keys.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    sns-kms-encryption-enabledEnsures SNS topics have encryption enabled using KMS keys.SC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    elasticsearch-encryption-enabledElasticsearch domains must have encryption at rest enabledSC-28 Protection of Information at RestThe information system protects the confidentiality and integrity of information at rest.
    dynamodb-auto-scaling-enabledEnsures DynamoDB tables have auto-scaling or on-demand mode enabled for capacity management.SC-5 Denial of Service ProtectionThe information system protects against or limits the effects of denial of service attacks.
    lambda-concurrent-execution-limits-requiredLambda functions must have concurrent execution limits configured to protect resource availabilitySC-5 Denial of Service ProtectionThe information system protects against or limits the effects of denial of service attacks.
    limit-lambda-execution-timeEnsures that AWS Lambda functions are configured to time out after a specified duration to prevent extended accessSC-5 Denial of Service ProtectionThe information system protects against or limits the effects of denial of service attacks.
    shield-advanced-enabledEnsures AWS Shield Advanced is enabled for DDoS protection.SC-5 Denial of Service ProtectionThe information system protects against or limits the effects of denial of service attacks.
    elb-cross-zone-load-balancing-enabledClassic Load Balancers must have cross-zone load balancing enabledSC-5 Denial of Service ProtectionThe information system protects against or limits the effects of denial of service attacks.
    security-group-default-denyEnsures Security Groups follow default deny with explicit allow principleSC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    security-group-strictEnsures security groups follow strict firewall rules with default denySC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    load-balancer-waf-associationEnsures public-facing Load Balancers have WAF associationsSC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    api-gateway-waf-enabledEnsures API Gateway stages have WAF Web ACL associations for protection against web attacks.SC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    elb-waf-enabledApplication Load Balancers must have WAF enabledSC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    lambda-vpc-placement-requiredLambda functions must be deployed in VPC for network isolation and securitySC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    redshift-enhanced-vpc-routing-enabledEnsures Redshift clusters have enhanced VPC routing enabled for network isolation.SC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    vpc-route-table-internet-gateway-restrictedEnsures VPC route tables restrict public access to internet gateways appropriately.SC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    ec2-vpc-placement-requiredEC2 instances must be placed in VPC for network isolationSC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    elasticsearch-vpc-requiredElasticsearch domains must be deployed in VPC for network isolationSC-7 Boundary ProtectionThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
    elb-load-balancer-disallow-unencrypted-trafficCheck that ELB Load Balancers do not allow unencrypted (HTTP) traffic.SC-8 Transmission Confidentiality and IntegrityThe information system protects the confidentiality and integrity of transmitted information.
    api-gateway-ssl-certificate-requiredEnsures API Gateway REST API stages have client certificates configured for SSL/TLS authentication to protect data in transit.SC-8 Transmission Confidentiality and IntegrityThe information system protects the confidentiality and integrity of transmitted information.
    redshift-ssl-requiredEnsures Redshift clusters have encryption in transit enabled through SSL parameter configuration.SC-8 Transmission Confidentiality and IntegrityThe information system protects the confidentiality and integrity of transmitted information.
    ec2-imdsv2-requiredEC2 instances must use IMDSv2SC-8 Transmission Confidentiality and IntegrityThe information system protects the confidentiality and integrity of transmitted information.
    elasticsearch-https-requiredElasticsearch domains must require HTTPS for client connectionsSC-8 Transmission Confidentiality and IntegrityThe information system protects the confidentiality and integrity of transmitted information.
    elasticsearch-node-to-node-encryption-enabledElasticsearch domains must have node-to-node encryption enabledSC-8 Transmission Confidentiality and IntegrityThe information system protects the confidentiality and integrity of transmitted information.
    s3-bucket-ssl-enforcement-requiredS3 buckets must enforce SSL/TLS for all requests to ensure encryption in transitSC-8 Transmission Confidentiality and IntegrityThe information system protects the confidentiality and integrity of transmitted information.
    rds-instance-ssl-encryptionEnsures RDS instances have SSL/TLS encryption enabled through parameter group configurationSC-8 Transmission Confidentiality and IntegrityThe information system protects the confidentiality and integrity of transmitted information.
    rds-clusterinstance-ssl-encryptionEnsures RDS cluster instances have SSL/TLS encryption enabled through parameter group configurationSC-8 Transmission Confidentiality and IntegrityThe information system protects the confidentiality and integrity of transmitted information.
    rds-instance-managed-service-patchingEnsures RDS instances have automated minor version upgrades enabledSI-2 Flaw RemediationThe organization identifies, reports, and corrects information system flaws.
    rds-clusterinstance-managed-service-patchingEnsures RDS cluster instances have automated minor version upgrades enabledSI-2 Flaw RemediationThe organization identifies, reports, and corrects information system flaws.
    neptune-clusterinstance-managed-service-patchingEnsures Neptune cluster instances have automated minor version upgrades enabledSI-2 Flaw RemediationThe organization identifies, reports, and corrects information system flaws.
    docdb-clusterinstance-managed-service-patchingEnsures DocumentDB cluster instances have automated minor version upgrades enabledSI-2 Flaw RemediationThe organization identifies, reports, and corrects information system flaws.
    elasticbeanstalk-managed-updates-enabledElastic Beanstalk environments must have managed platform updates enabledSI-2 Flaw RemediationThe organization identifies, reports, and corrects information system flaws.
    guardduty-malware-detection-enabledEnsures AWS GuardDuty is enabled with malware detection capabilities for threat protection.SI-3 Malicious Code ProtectionThe organization implements malicious code protection mechanisms at information system entry and exit points.
    ec2-monitoring-enabledEC2 instances must have detailed monitoring enabledSI-4 Information System MonitoringThe organization monitors the information system to detect attacks and indicators of potential attacks.
    config-rule-auto-remediation-enabledEnsures AWS Config rules have automatic remediation configured for integrity violations.SI-7 Software, Firmware, and Information IntegrityThe organization employs integrity verification tools to detect unauthorized changes to software, firmware, and information.
      Neo just got smarter about infrastructure policy automation