AWS Security Hub controls supported by AWS Audit Manager
You can use Audit Manager to capture Security Hub findings as evidence for audits. When you create or edit a custom control, you can specify one or more Security Hub controls as a data source mapping for evidence collection. Security Hub performs compliance checks based on these controls, and Audit Manager reports the results as compliance check evidence.
Key points
-
Audit Manager doesn’t collect evidence from service-linked AWS Config rules that are created by Security Hub.
-
On November 9, 2022, Security Hub launched automated security checks aligned to the Center for Internet Security’s (CIS) AWS Foundations Benchmark version 1.4.0 requirements, Level 1 and 2 (CIS v1.4.0). In Security Hub, the CIS v1.4.0 standard is supported in addition to the CIS v1.2.0 standard.
-
We recommend that you turn on the consolidated control findings setting in Security Hub if it's not turned on already. If you enable Security Hub on or after February 23, 2023, this setting is turned on by default.
When consolidated findings is enabled, Security Hub produces a single finding for each security check (even when the same check applies to multiple standards). Each Security Hub finding is collected as one unique resource assessment in Audit Manager. As a result, consolidated findings results in a decrease of the total unique resource assessments that Audit Manager performs for Security Hub findings. For this reason, using consolidated findings can often result in a reduction in your Audit Manager usages costs, without sacrificing evidence quality and availability. For more information about pricing, see AWS Audit Manager Pricing
.
The following examples show a comparison of how Audit Manager collects and presents evidence depending on your Security Hub settings.
Supported Security Hub controls
The following Security Hub controls are currently supported by Audit Manager. You can use any of the following standard-specific control ID keywords when you set up a data source for a custom control.
Security standard | Supported keyword in Audit Manager (standard control ID in Security Hub) |
Related control documentation (corresponding security control ID in Security Hub) |
---|---|---|
CIS v1.2.0 | 1.2 | |
CIS v1.2.0 | 1.3 | |
CIS v1.2.0 | 1.4 | |
CIS v1.2.0 | 1.5 | |
CIS v1.2.0 | 1.6 | |
CIS v1.2.0 | 1.7 | |
CIS v1.2.0 | 1.8 | |
CIS v1.2.0 | 1.9 | |
CIS v1.2.0 | 1.10 | |
CIS v1.2.0 | 1.11 | |
CIS v1.2.0 | 1.12 | |
CIS v1.2.0 |
1.13 |
|
CIS v1.2.0 |
1.14 |
|
CIS v1.2.0 |
1.16 |
|
CIS v1.2.0 |
1.20 |
|
CIS v1.2.0 |
1.22 |
|
CIS v1.2.0 |
2.1 |
|
CIS v1.2.0 |
2.2 |
|
CIS v1.2.0 |
2.3 |
|
CIS v1.2.0 |
2.4 |
|
CIS v1.2.0 |
2.5 |
|
CIS v1.2.0 |
2.6 |
|
CIS v1.2.0 |
2.7 |
|
CIS v1.2.0 |
2.8 |
|
CIS v1.2.0 |
2.9 |
|
CIS v1.2.0 |
3.1 |
|
CIS v1.2.0 |
3.2 |
|
CIS v1.2.0 |
3.3 |
|
CIS v1.2.0 |
3.4 |
|
CIS v1.2.0 |
3.5 |
|
CIS v1.2.0 |
3.6 |
|
CIS v1.2.0 |
3.7 |
|
CIS v1.2.0 |
3.8 |
|
CIS v1.2.0 |
3.9 |
|
CIS v1.2.0 |
3.10 |
|
CIS v1.2.0 |
3.11 |
|
CIS v1.2.0 |
3.12 |
|
CIS v1.2.0 |
3.13 |
|
CIS v1.2.0 |
3.14 |
|
CIS v1.2.0 |
4.1 |
|
CIS v1.2.0 |
4.2 |
|
CIS v1.2.0 |
4.3 |
|
PCI DSS |
PCI.AutoScaling.1 |
|
PCI DSS |
PCI.CloudTrail.1 |
|
PCI DSS |
PCI.CloudTrail.2 |
|
PCI DSS |
PCI.CloudTrail.3 |
|
PCI DSS |
PCI.CloudTrail.4 |
|
PCI DSS |
PCI.CodeBuild.1 |
|
PCI DSS |
PCI.CodeBuild.2 |
|
PCI DSS |
PCI.Config.1 |
|
PCI DSS |
PCI.CW.1 |
|
PCI DSS |
PCI.DMS.1 |
|
PCI DSS |
PCI.EC2.1 |
|
PCI DSS |
PCI.EC2.2 |
|
PCI DSS |
PCI.EC2.3 |
|
PCI DSS |
PCI.EC2.4 |
|
PCI DSS |
PCI.EC2.5 |
|
PCI DSS |
PCI.EC2.6 |
|
PCI DSS |
PCI.ELBv2.1 |
|
PCI DSS |
PCI.ES.1 |
|
PCI DSS |
PCI.ES.2 |
|
PCI DSS |
PCI.GuardDuty.1 |
|
PCI DSS |
PCI.IAM.1 |
|
PCI DSS |
PCI.IAM.2 |
|
PCI DSS |
PCI.IAM.3 |
|
PCI DSS |
PCI.IAM.4 |
|
PCI DSS |
PCI.IAM.5 |
|
PCI DSS |
PCI.IAM.6 |
|
PCI DSS |
PCI.IAM.7 |
|
PCI DSS |
PCI.IAM.8 |
|
PCI DSS |
PCI.KMS.1 |
|
PCI DSS |
PCI.Lambda.1 |
|
PCI DSS |
PCI.Lambda.2 |
|
PCI DSS |
PCI.Opensearch.1 |
|
PCI DSS |
PCI.Opensearch.2 |
|
PCI DSS |
PCI.RDS.1 |
|
PCI DSS |
PCI.RDS.2 |
|
PCI DSS |
PCI.Redshift.1 |
|
PCI DSS |
PCI.S3.1 |
|
PCI DSS |
PCI.S3.2 |
|
PCI DSS |
PCI.S3.3 |
|
PCI DSS |
PCI.S3.4 |
|
PCI DSS |
PCI.S3.5 |
|
PCI DSS |
PCI.S3.6 |
|
PCI DSS |
PCI.SageMaker.1 |
|
PCI DSS |
PCI.SSM.1 |
|
PCI DSS |
PCI.SSM.2 |
|
PCI DSS |
PCI.SSM.3 |
|
AWS Foundational Security Best Practices |
Account.1 |
|
AWS Foundational Security Best Practices |
Account.2 |
Account.2 |
AWS Foundational Security Best Practices |
ACM.1 |
|
AWS Foundational Security Best Practices |
ACM.2 |
|
AWS Foundational Security Best Practices |
APIGateway.1 |
|
AWS Foundational Security Best Practices |
APIGateway.2 |
|
AWS Foundational Security Best Practices |
APIGateway.3 |
|
AWS Foundational Security Best Practices |
APIGateway.4 |
|
AWS Foundational Security Best Practices |
APIGateway.5 |
|
AWS Foundational Security Best Practices |
APIGateway.8 |
|
AWS Foundational Security Best Practices |
APIGateway.9 |
|
AWS Foundational Security Best Practices |
AppSync.2 |
|
AWS Foundational Security Best Practices |
AppSync.5 |
AppSync.5 |
AWS Foundational Security Best Practices |
Athena.1 |
Athena.1 |
AWS Foundational Security Best Practices |
AutoScaling.1 |
|
AWS Foundational Security Best Practices |
AutoScaling.2 |
|
AWS Foundational Security Best Practices |
AutoScaling.3 |
|
AWS Foundational Security Best Practices |
AutoScaling.4 |
|
AWS Foundational Security Best Practices |
Autoscaling.5 |
|
AWS Foundational Security Best Practices |
AutoScaling.6 |
|
AWS Foundational Security Best Practices |
AutoScaling.9 |
|
AWS Foundational Security Best Practices |
Backup.1 |
|
AWS Foundational Security Best Practices |
CloudFormation.1 |
|
AWS Foundational Security Best Practices |
CloudFront.1 |
|
AWS Foundational Security Best Practices |
CloudFront.2 |
|
AWS Foundational Security Best Practices |
CloudFront.3 |
|
AWS Foundational Security Best Practices |
CloudFront.4 |
|
AWS Foundational Security Best Practices |
CloudFront.5 |
|
AWS Foundational Security Best Practices |
CloudFront.6 |
|
AWS Foundational Security Best Practices |
CloudFront.7 |
|
AWS Foundational Security Best Practices |
CloudFront.8 |
|
AWS Foundational Security Best Practices |
CloudFront.9 |
|
AWS Foundational Security Best Practices |
CloudFront.10 |
|
AWS Foundational Security Best Practices |
CloudFront.12 |
|
AWS Foundational Security Best Practices |
CloudFront.13 |
|
AWS Foundational Security Best Practices |
CloudTrail.1 |
|
AWS Foundational Security Best Practices |
CloudTrail.2 |
|
AWS Foundational Security Best Practices |
CloudTrail.3 |
|
AWS Foundational Security Best Practices |
CloudTrail.4 |
|
AWS Foundational Security Best Practices |
CloudTrail.5 |
|
AWS Foundational Security Best Practices |
CloudTrail.6 |
|
AWS Foundational Security Best Practices |
CloudTrail.7 |
|
AWS Foundational Security Best Practices |
CloudWatch.1 |
|
AWS Foundational Security Best Practices |
CloudWatch.2 |
|
AWS Foundational Security Best Practices |
CloudWatch.3 |
|
AWS Foundational Security Best Practices |
CloudWatch.4 |
|
AWS Foundational Security Best Practices |
CloudWatch.5 |
|
AWS Foundational Security Best Practices |
CloudWatch.6 |
|
AWS Foundational Security Best Practices |
CloudWatch.7 |
|
AWS Foundational Security Best Practices |
CloudWatch.8 |
|
AWS Foundational Security Best Practices |
CloudWatch.9 |
|
AWS Foundational Security Best Practices |
CloudWatch.10 |
|
AWS Foundational Security Best Practices |
CloudWatch.11 |
|
AWS Foundational Security Best Practices |
CloudWatch.12 |
|
AWS Foundational Security Best Practices |
CloudWatch.13 |
|
AWS Foundational Security Best Practices |
CloudWatch.14 |
|
AWS Foundational Security Best Practices |
CloudWatch.15 |
|
AWS Foundational Security Best Practices |
CloudWatch.16 |
|
AWS Foundational Security Best Practices |
CloudWatch.17 |
|
AWS Foundational Security Best Practices |
CodeBuild.1 |
|
AWS Foundational Security Best Practices |
CodeBuild.2 |
|
AWS Foundational Security Best Practices |
CodeBuild.3 |
|
AWS Foundational Security Best Practices |
CodeBuild.4 |
|
AWS Foundational Security Best Practices |
CodeBuild.5 |
|
AWS Foundational Security Best Practices |
Config.1 |
|
AWS Foundational Security Best Practices |
DMS.1 |
|
AWS Foundational Security Best Practices |
DMS.6 |
|
AWS Foundational Security Best Practices |
DMS.7 |
|
AWS Foundational Security Best Practices |
DMS.8 |
|
AWS Foundational Security Best Practices |
DMS.9 |
|
AWS Foundational Security Best Practices |
DocumentDB.1 |
|
AWS Foundational Security Best Practices |
DocumentDB.2 |
|
AWS Foundational Security Best Practices |
DocumentDB.3 |
|
AWS Foundational Security Best Practices |
DocumentDB.4 |
|
AWS Foundational Security Best Practices |
DocumentDB.5 |
|
AWS Foundational Security Best Practices |
DynamoDB.1 |
|
AWS Foundational Security Best Practices |
DynamoDB.2 |
|
AWS Foundational Security Best Practices |
DynamoDB.3 |
|
AWS Foundational Security Best Practices |
DynamoDB.4 |
DynamoDB.4 |
AWS Foundational Security Best Practices |
DynamoDB.6 |
|
AWS Foundational Security Best Practices |
EC2.1 |
|
AWS Foundational Security Best Practices |
EC2.2 |
|
AWS Foundational Security Best Practices |
EC2.3 |
|
AWS Foundational Security Best Practices |
EC2.4 |
|
AWS Foundational Security Best Practices |
EC2.6 |
|
AWS Foundational Security Best Practices |
EC2.7 |
|
AWS Foundational Security Best Practices |
EC2.8 |
|
AWS Foundational Security Best Practices |
EC2.9 |
|
AWS Foundational Security Best Practices |
EC2.10 |
|
AWS Foundational Security Best Practices |
EC2.12 |
|
AWS Foundational Security Best Practices |
EC2.13 |
|
AWS Foundational Security Best Practices |
EC2.14 |
|
AWS Foundational Security Best Practices |
EC2.15 |
|
AWS Foundational Security Best Practices |
EC2.16 |
|
AWS Foundational Security Best Practices |
EC2.17 |
|
AWS Foundational Security Best Practices |
EC2.18 |
|
AWS Foundational Security Best Practices |
EC2.19 |
|
AWS Foundational Security Best Practices |
EC2.20 |
|
AWS Foundational Security Best Practices |
EC2.21 |
|
AWS Foundational Security Best Practices |
EC2.22 |
|
AWS Foundational Security Best Practices |
EC2.23 |
|
AWS Foundational Security Best Practices |
EC2.24 |
|
AWS Foundational Security Best Practices |
EC2.25 |
|
AWS Foundational Security Best Practices |
EC2.28 |
|
AWS Foundational Security Best Practices |
EC2.51 |
|
AWS Foundational Security Best Practices |
ECR.1 |
|
AWS Foundational Security Best Practices |
ECR.2 |
|
AWS Foundational Security Best Practices |
ECR.3 |
|
AWS Foundational Security Best Practices |
ECS.1 |
|
AWS Foundational Security Best Practices |
ECS.2 |
|
AWS Foundational Security Best Practices |
ECS.3 |
|
AWS Foundational Security Best Practices |
ECS.4 |
|
AWS Foundational Security Best Practices |
ECS.5 |
|
AWS Foundational Security Best Practices |
ECS.8 |
|
AWS Foundational Security Best Practices |
ECS.9 |
ECS.9 |
AWS Foundational Security Best Practices |
ECS.10 |
|
AWS Foundational Security Best Practices |
ECS.12 |
|
AWS Foundational Security Best Practices |
EFS.1 |
|
AWS Foundational Security Best Practices |
EFS.2 |
|
AWS Foundational Security Best Practices |
EFS.3 |
|
AWS Foundational Security Best Practices |
EFS.4 |
|
AWS Foundational Security Best Practices |
EKS.1 |
|
AWS Foundational Security Best Practices |
EKS.2 |
|
AWS Foundational Security Best Practices |
EKS.8 |
EKS.8 |
AWS Foundational Security Best Practices |
ElastiCache.1 |
ElastiCache.1 |
AWS Foundational Security Best Practices |
ElastiCache.2 |
ElastiCache.2 |
AWS Foundational Security Best Practices |
ElastiCache.3 |
ElastiCache.3 |
AWS Foundational Security Best Practices |
ElastiCache.4 |
ElastiCache.4 |
AWS Foundational Security Best Practices |
ElastiCache.5 |
ElastiCache.5 |
AWS Foundational Security Best Practices |
ElastiCache.6 |
ElastiCache.6 |
AWS Foundational Security Best Practices |
ElastiCache.7 |
ElastiCache.7 |
AWS Foundational Security Best Practices |
ElasticBeanstalk.1 |
|
AWS Foundational Security Best Practices |
ElasticBeanstalk.2 |
|
AWS Foundational Security Best Practices |
ElasticBeanstalk.3 |
|
AWS Foundational Security Best Practices |
ELB.1 |
ELB.1 |
AWS Foundational Security Best Practices |
ELB.2 |
|
AWS Foundational Security Best Practices |
ELB.3 |
|
AWS Foundational Security Best Practices |
ELB.4 |
|
AWS Foundational Security Best Practices |
ELB.5 |
|
AWS Foundational Security Best Practices |
ELB.6 |
|
AWS Foundational Security Best Practices |
ELB.7 |
|
AWS Foundational Security Best Practices |
ELB.8 |
|
AWS Foundational Security Best Practices |
ELB.9 |
|
AWS Foundational Security Best Practices |
ELB.10 |
|
AWS Foundational Security Best Practices |
ELB.12 |
|
AWS Foundational Security Best Practices |
ELB.13 |
|
AWS Foundational Security Best Practices |
ELB.14 |
|
AWS Foundational Security Best Practices |
ELB.16 |
ELB.16 |
AWS Foundational Security Best Practices |
ELBv2.1 |
|
AWS Foundational Security Best Practices |
EMR.1 |
|
AWS Foundational Security Best Practices |
EMR.2 |
EMR.2 |
AWS Foundational Security Best Practices |
ES.1 |
|
AWS Foundational Security Best Practices |
ES.2 |
|
AWS Foundational Security Best Practices |
ES.3 |
|
AWS Foundational Security Best Practices |
ES.4 |
|
AWS Foundational Security Best Practices |
ES.5 |
|
AWS Foundational Security Best Practices |
ES.6 |
|
AWS Foundational Security Best Practices |
ES.7 |
|
AWS Foundational Security Best Practices |
ES.8 |
|
AWS Foundational Security Best Practices |
EventBridge.3 |
EventBridge3. |
AWS Foundational Security Best Practices |
EventBridge.4 |
EventBridge.4 |
AWS Foundational Security Best Practices |
FSx.1 |
FSx.1 |
AWS Foundational Security Best Practices |
GuardDuty.1 |
|
AWS Foundational Security Best Practices |
IAM.1 |
|
AWS Foundational Security Best Practices |
IAM.2 |
|
AWS Foundational Security Best Practices |
IAM.3 |
|
AWS Foundational Security Best Practices |
IAM.4 |
|
AWS Foundational Security Best Practices |
IAM.5 |
|
AWS Foundational Security Best Practices |
IAM.6 |
|
AWS Foundational Security Best Practices |
IAM.7 |
|
AWS Foundational Security Best Practices |
IAM.8 |
|
AWS Foundational Security Best Practices |
IAM.9 |
IAM.9 |
AWS Foundational Security Best Practices |
IAM.10 |
IAM.10 |
AWS Foundational Security Best Practices |
IAM.11 |
IAM.11 |
AWS Foundational Security Best Practices |
IAM.12 |
IAM.12 |
AWS Foundational Security Best Practices |
IAM.13 |
IAM.13 |
AWS Foundational Security Best Practices |
IAM.14 |
IAM.14 |
AWS Foundational Security Best Practices |
IAM.15 |
IAM.15 |
AWS Foundational Security Best Practices |
IAM.16 |
IAM.16 |
AWS Foundational Security Best Practices |
IAM.17 |
IAM.17 |
AWS Foundational Security Best Practices |
IAM.18 |
IAM.18 |
AWS Foundational Security Best Practices |
IAM.19 |
IAM.19 |
AWS Foundational Security Best Practices |
IAM.21 |
|
AWS Foundational Security Best Practices |
IAM.22 |
IAM.22 |
AWS Foundational Security Best Practices |
Kinesis.1 |
|
AWS Foundational Security Best Practices |
KMS.1 |
|
AWS Foundational Security Best Practices |
KMS.2 |
|
AWS Foundational Security Best Practices |
KMS.3 |
|
AWS Foundational Security Best Practices |
KMS.4 |
KMS.4 |
AWS Foundational Security Best Practices |
Lambda.1 |
|
AWS Foundational Security Best Practices |
Lambda.2 |
|
AWS Foundational Security Best Practices |
Lambda.3 |
Lambda.3 |
AWS Foundational Security Best Practices |
Lambda.5 |
|
AWS Foundational Security Best Practices |
Macie.1 |
Macie.1 |
AWS Foundational Security Best Practices |
MQ.5 |
MQ.5 |
AWS Foundational Security Best Practices |
MQ.6 |
MQ.6 |
AWS Foundational Security Best Practices |
MSK.1 |
MSK.1 |
AWS Foundational Security Best Practices |
MSK.2 |
MSK.2 |
AWS Foundational Security Best Practices |
Neptune.1 |
Neptune.1 |
AWS Foundational Security Best Practices |
Neptune.2 |
Neptune.2 |
AWS Foundational Security Best Practices |
Neptune.3 |
Neptune.3 |
AWS Foundational Security Best Practices |
Neptune.4 |
Neptune.4 |
AWS Foundational Security Best Practices |
Neptune.5 |
Neptune.5 |
AWS Foundational Security Best Practices |
Neptune.6 |
Neptune.6 |
AWS Foundational Security Best Practices |
Neptune.7 |
Neptune.7 |
AWS Foundational Security Best Practices |
Neptune.8 |
Neptune.8 |
AWS Foundational Security Best Practices |
Neptune.9 |
Neptune.9 |
AWS Foundational Security Best Practices |
NetworkFirewall.1 |
NetworkFirewall.1 |
AWS Foundational Security Best Practices |
NetworkFirewall.2 |
NetworkFirewall.2 |
AWS Foundational Security Best Practices |
NetworkFirewall.3 |
|
AWS Foundational Security Best Practices |
NetworkFirewall.4 |
|
AWS Foundational Security Best Practices |
NetworkFirewall.5 |
|
AWS Foundational Security Best Practices |
NetworkFirewall.6 |
|
AWS Foundational Security Best Practices |
NetworkFirewall.9 |
NetworkFirewall.9 |
AWS Foundational Security Best Practices |
Opensearch.1 |
|
AWS Foundational Security Best Practices |
Opensearch.2 |
|
AWS Foundational Security Best Practices |
Opensearch.3 |
|
AWS Foundational Security Best Practices |
Opensearch.4 |
|
AWS Foundational Security Best Practices |
Opensearch.5 |
|
AWS Foundational Security Best Practices |
Opensearch.6 |
|
AWS Foundational Security Best Practices |
Opensearch.7 |
|
AWS Foundational Security Best Practices |
Opensearch.8 |
|
AWS Foundational Security Best Practices |
Opensearch.10 |
Opensearch.10 |
AWS Foundational Security Best Practices |
PCA.1 |
PCA.1 |
AWS Foundational Security Best Practices |
RDS.1 |
|
AWS Foundational Security Best Practices |
RDS.2 |
|
AWS Foundational Security Best Practices |
RDS.3 |
|
AWS Foundational Security Best Practices |
RDS.4 |
|
AWS Foundational Security Best Practices |
RDS.5 |
|
AWS Foundational Security Best Practices |
RDS.6 |
|
AWS Foundational Security Best Practices |
RDS.7 |
|
AWS Foundational Security Best Practices |
RDS.8 |
|
AWS Foundational Security Best Practices |
RDS.9 |
|
AWS Foundational Security Best Practices |
RDS.10 |
|
AWS Foundational Security Best Practices |
RDS.11 |
|
AWS Foundational Security Best Practices |
RDS.12 |
|
AWS Foundational Security Best Practices |
RDS.13 |
|
AWS Foundational Security Best Practices |
RDS.14 |
|
AWS Foundational Security Best Practices |
RDS.15 |
|
AWS Foundational Security Best Practices |
RDS.16 |
|
AWS Foundational Security Best Practices |
RDS.17 |
|
AWS Foundational Security Best Practices |
RDS.18 |
|
AWS Foundational Security Best Practices |
RDS.19 |
|
AWS Foundational Security Best Practices |
RDS.20 |
|
AWS Foundational Security Best Practices |
RDS.21 |
|
AWS Foundational Security Best Practices |
RDS.22 |
|
AWS Foundational Security Best Practices |
RDS.23 |
|
AWS Foundational Security Best Practices |
RDS.24 |
|
AWS Foundational Security Best Practices |
RDS.25 |
|
AWS Foundational Security Best Practices |
RDS.26 |
RDS.26 |
AWS Foundational Security Best Practices |
RDS.27 |
RDS.27 |
AWS Foundational Security Best Practices |
RDS.34 |
RDS.34 |
AWS Foundational Security Best Practices |
RDS.35 |
RDS.35 |
AWS Foundational Security Best Practices |
Redshift.1 |
|
AWS Foundational Security Best Practices |
Redshift.2 |
|
AWS Foundational Security Best Practices |
Redshift.3 |
|
AWS Foundational Security Best Practices |
Redshift.4 |
|
AWS Foundational Security Best Practices |
Redshift.6 |
|
AWS Foundational Security Best Practices |
Redshift.7 |
|
AWS Foundational Security Best Practices |
Redshift.8 |
|
AWS Foundational Security Best Practices |
Redshift.9 |
|
AWS Foundational Security Best Practices |
Redshift.10 |
|
AWS Foundational Security Best Practices |
Route53.2 |
Route53.2 |
AWS Foundational Security Best Practices |
S3.1 |
|
AWS Foundational Security Best Practices |
S3.2 |
|
AWS Foundational Security Best Practices |
S3.3 |
|
AWS Foundational Security Best Practices |
S3.4 |
|
AWS Foundational Security Best Practices |
S3.5 |
|
AWS Foundational Security Best Practices |
S3.6 |
|
AWS Foundational Security Best Practices |
S3.7 |
S3.7 |
AWS Foundational Security Best Practices |
S3.8 |
|
AWS Foundational Security Best Practices |
S3.9 |
|
AWS Foundational Security Best Practices |
S3.11 |
|
AWS Foundational Security Best Practices |
S3.12 |
|
AWS Foundational Security Best Practices |
S3.13 |
|
AWS Foundational Security Best Practices |
S3.14 |
S3.14 |
AWS Foundational Security Best Practices |
S3.15 |
S3.15 |
AWS Foundational Security Best Practices |
S3.17 |
S3.17 |
AWS Foundational Security Best Practices |
S3.19 |
S3.19 |
AWS Foundational Security Best Practices |
S3.19 |
S3.20 |
AWS Foundational Security Best Practices |
SageMaker.1 |
|
AWS Foundational Security Best Practices |
SageMaker.2 |
|
AWS Foundational Security Best Practices |
SageMaker.3 |
|
AWS Foundational Security Best Practices |
SecretsManager.1 |
|
AWS Foundational Security Best Practices |
SecretsManager.2 |
|
AWS Foundational Security Best Practices |
SecretsManager.3 |
|
AWS Foundational Security Best Practices |
SecretsManager.4 |
|
AWS Foundational Security Best Practices |
SNS.1 |
|
AWS Foundational Security Best Practices |
SNS.2 |
|
AWS Foundational Security Best Practices |
SQS.1 |
|
AWS Foundational Security Best Practices |
SSM.1 |
|
AWS Foundational Security Best Practices |
SSM.2 |
|
AWS Foundational Security Best Practices |
SSM.3 |
|
AWS Foundational Security Best Practices |
SSM.4 |
|
AWS Foundational Security Best Practices |
StepFunctions.1 |
|
AWS Foundational Security Best Practices |
WAF.1 |
|
AWS Foundational Security Best Practices |
WAF.2 |
|
AWS Foundational Security Best Practices |
WAF.3 |
|
AWS Foundational Security Best Practices |
WAF.4 |
|
AWS Foundational Security Best Practices |
WAF.6 |
|
AWS Foundational Security Best Practices |
WAF.7 |
|
AWS Foundational Security Best Practices |
WAF.8 |
|
AWS Foundational Security Best Practices |
WAF.10 |
|
AWS Foundational Security Best Practices |
WAF.11 |
WAF.11 |
AWS Foundational Security Best Practices |
WAF.12 |
WAF.12 |
Additional resources
-
To find help with evidence collection issues for this data source type, see My assessment isn’t collecting compliance check evidence from AWS Security Hub.
-
To create a custom control using this data source type, see Creating a custom control in AWS Audit Manager.
-
To create a custom framework that uses your custom control, see Creating a custom framework in AWS Audit Manager.
-
To add your custom control to an existing custom framework, see Editing a custom framework in AWS Audit Manager.