Class ManagedRuleIdentifiers
java.lang.Object
software.amazon.jsii.JsiiObject
software.amazon.awscdk.services.config.ManagedRuleIdentifiers
- All Implemented Interfaces:
software.amazon.jsii.JsiiSerializable
@Generated(value="jsii-pacmak/1.84.0 (build 5404dcf)",
date="2023-06-19T16:30:48.621Z")
@Stability(Stable)
public class ManagedRuleIdentifiers
extends software.amazon.jsii.JsiiObject
Managed rules that are supported by AWS Config.
Example:
// https://docs.aws.amazon.com/config/latest/developerguide/access-keys-rotated.html // https://docs.aws.amazon.com/config/latest/developerguide/access-keys-rotated.html ManagedRule.Builder.create(this, "AccessKeysRotated") .identifier(ManagedRuleIdentifiers.ACCESS_KEYS_ROTATED) .inputParameters(Map.of( "maxAccessKeyAge", 60)) // default is 24 hours .maximumExecutionFrequency(MaximumExecutionFrequency.TWELVE_HOURS) .build();
-
Nested Class Summary
Nested classes/interfaces inherited from class software.amazon.jsii.JsiiObject
software.amazon.jsii.JsiiObject.InitializationMode
-
Field Summary
Modifier and TypeFieldDescriptionstatic final String
Checks whether the active access keys are rotated within the number of days specified in maxAccessKeyAge.static final String
Checks whether AWS account is part of AWS Organizations.static final String
Checks whether ACM Certificates in your account are marked for expiration within the specified number of days.static final String
Checks if rule evaluates Application Load Balancers (ALBs) to ensure they are configured to drop http headers.static final String
Checks whether HTTP to HTTPS redirection is configured on all HTTP listeners of Application Load Balancer.static final String
Checks if Web Application Firewall (WAF) is enabled on Application Load Balancers (ALBs).static final String
Checks that all methods in Amazon API Gateway stages have caching enabled and encrypted.static final String
Checks that Amazon API Gateway APIs are of the type specified in the rule parameter endpointConfigurationType.static final String
Checks that all methods in Amazon API Gateway stage has logging enabled.static final String
Checks whether running instances are using specified AMIs.static final String
Checks whether running instances are using specified AMIs.static final String
Checks whether your Auto Scaling groups that are associated with a load balancer are using Elastic Load Balancing health checks.static final String
Checks whether AWS CloudTrail trails are configured to send logs to Amazon CloudWatch Logs.static final String
Checks whether AWS CloudTrail is enabled in your AWS account.static final String
Checks whether AWS CloudTrail is configured to use the server side encryption (SSE) AWS Key Management Service (AWS KMS) customer master key (CMK) encryption.static final String
Checks whether AWS CloudTrail creates a signed digest file with logs.static final String
Checks whether an AWS CloudFormation stack's actual configuration differs, or has drifted, from it's expected configuration.static final String
Checks whether your CloudFormation stacks are sending event notifications to an SNS topic.static final String
Checks if an Amazon CloudFront distribution is configured to return a specific object that is the default root object.static final String
Checks that Amazon CloudFront distribution with Amazon S3 Origin type has Origin Access Identity (OAI) configured.static final String
Checks whether an origin group is configured for the distribution of at least 2 origins in the origin group for Amazon CloudFront.static final String
Checks if Amazon CloudFront distributions are using a custom SSL certificate and are configured to use SNI to serve HTTPS requests.static final String
Checks whether your Amazon CloudFront distributions use HTTPS (directly or via a redirection).static final String
Checks that there is at least one multi-region AWS CloudTrail.static final String
Checks whether at least one AWS CloudTrail trail is logging Amazon S3 data events for all S3 buckets.static final String
Checks that there is at least one AWS CloudTrail trail defined with security best practices.static final String
Checks whether CloudWatch alarms have at least one alarm action, one INSUFFICIENT_DATA action, or one OK action enabled.static final String
Checks whether the specified resource type has a CloudWatch alarm for the specified metric.static final String
Checks whether CloudWatch alarms with the given metric name have the specified settings.static final String
Checks whether a log group in Amazon CloudWatch Logs is encrypted with a AWS Key Management Service (KMS) managed Customer Master Keys (CMK).static final String
Checks that key rotation is enabled for each key and matches to the key ID of the customer created customer master key (CMK).static final String
Checks whether the project contains environment variables AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.static final String
Checks whether the GitHub or Bitbucket source repository URL contains either personal access tokens or user name and password.static final String
Checks whether the first deployment stage of the AWS CodePipeline performs more than one deployment.static final String
Checks whether each stage in the AWS CodePipeline deploys to more than N times the number of the regions the AWS CodePipeline has deployed in all the previous combined stages, where N is the region fanout number.static final String
Checks whether Amazon CloudWatch LogGroup retention period is set to specific number of days.static final String
Checks that DynamoDB Accelerator (DAX) clusters are encrypted.static final String
Checks whether AWS Database Migration Service replication instances are public.static final String
Checks whether Auto Scaling or On-Demand is enabled on your DynamoDB tables and/or global secondary indexes.static final String
Checks whether Amazon DynamoDB table is present in AWS Backup plans.static final String
Checks that point in time recovery (PITR) is enabled for Amazon DynamoDB tables.static final String
Checks whether Amazon DynamoDB table is encrypted with AWS Key Management Service (KMS).static final String
Checks whether the Amazon DynamoDB tables are encrypted and checks their status.static final String
Checks whether provisioned DynamoDB throughput is approaching the maximum limit for your account.static final String
Checks whether the EBS volumes that are in an attached state are encrypted.static final String
Checks if Amazon Elastic Block Store (Amazon EBS) volumes are added in backup plans of AWS Backup.static final String
Checks whether EBS optimization is enabled for your EC2 instances that can be EBS-optimized.static final String
Checks whether Amazon Elastic Block Store snapshots are not publicly restorable.static final String
Checks instances for specified tenancy.static final String
Checks whether your EC2 instances are of the specified instance types.static final String
Check that Amazon Elastic Block Store (EBS) encryption is enabled by default.static final String
Checks whether your Amazon Elastic Compute Cloud (Amazon EC2) instance metadata version is configured with Instance Metadata Service Version 2 (IMDSv2).static final String
Checks whether detailed monitoring is enabled for EC2 instances.static final String
Checks whether the Amazon EC2 instances in your account are managed by AWS Systems Manager.static final String
Checks whether Amazon Elastic Compute Cloud (Amazon EC2) instances have a public IP association.static final String
Checks if an Amazon Elastic Compute Cloud (Amazon EC2) instance has an Identity and Access Management (IAM) profile attached to it.static final String
Checks whether your EC2 instances belong to a virtual private cloud (VPC).static final String
Checks that none of the specified applications are installed on the instance.static final String
Checks whether all of the specified applications are installed on the instance.static final String
Checks whether the compliance status of AWS Systems Manager association compliance is COMPLIANT or NON_COMPLIANT after the association execution on the instance.static final String
Checks whether instances managed by AWS Systems Manager are configured to collect blocked inventory types.static final String
Checks whether the compliance status of the Amazon EC2 Systems Manager patch compliance is COMPLIANT or NON_COMPLIANT after the patch installation on the instance.static final String
Checks whether EC2 managed instances have the desired configurations.static final String
Checks that security groups are attached to Amazon Elastic Compute Cloud (Amazon EC2) instances or to an elastic network interface.static final String
Checks whether the incoming SSH traffic for the security groups is accessible.static final String
Checks whether the security groups in use do not allow unrestricted incoming TCP traffic to the specified ports.static final String
Checks whether there are instances stopped for more than the allowed number of days.static final String
Checks whether EBS volumes are attached to EC2 instances.static final String
hecks whether Amazon Elastic File System (Amazon EFS) is configured to encrypt the file data using AWS Key Management Service (AWS KMS).static final String
Checks whether Amazon Elastic File System (Amazon EFS) file systems are added in the backup plans of AWS Backup.static final String
Checks whether all Elastic IP addresses that are allocated to a VPC are attached to EC2 instances or in-use elastic network interfaces (ENIs).static final String
Checks whether Amazon Elastic Kubernetes Service (Amazon EKS) endpoint is not publicly accessible.static final String
Checks whether Amazon Elastic Kubernetes Service clusters are configured to have Kubernetes secrets encrypted using AWS Key Management Service (KMS) keys.static final String
Check if the Amazon ElastiCache Redis clusters have automatic backup turned on.static final String
Checks whether Amazon Elasticsearch Service (Amazon ES) domains have encryption at rest configuration enabled.static final String
Checks whether Amazon Elasticsearch Service (Amazon ES) domains are in Amazon Virtual Private Cloud (Amazon VPC).static final String
Check that Amazon ElasticSearch Service nodes are encrypted end to end.static final String
Checks whether the Classic Load Balancers use SSL certificates provided by AWS Certificate Manager.static final String
Checks if cross-zone load balancing is enabled for the Classic Load Balancers (CLBs).static final String
Checks whether your Classic Load Balancer SSL listeners are using a custom policy.static final String
Checks whether Elastic Load Balancing has deletion protection enabled.static final String
Checks whether the Application Load Balancer and the Classic Load Balancer have logging enabled.static final String
Checks whether your Classic Load Balancer SSL listeners are using a predefined policy.static final String
Checks whether your Classic Load Balancer is configured with SSL or HTTPS listeners.static final String
Checks that Amazon EMR clusters have Kerberos enabled.static final String
Checks whether Amazon Elastic MapReduce (EMR) clusters' master nodes have public IPs.static final String
Checks whether the security groups associated inScope resources are compliant with the master security groups at each rule level based on allowSecurityGroup and denySecurityGroup flag.static final String
Checks whether AWS Firewall Manager created security groups content is the same as the master security groups.static final String
Checks whether Amazon EC2 or an elastic network interface is associated with AWS Firewall Manager security groups.static final String
Checks whether an Application Load Balancer, Amazon CloudFront distributions, Elastic Load Balancer or Elastic IP has AWS Shield protection.static final String
Checks whether the web ACL is associated with an Application Load Balancer, API Gateway stage, or Amazon CloudFront distributions.static final String
Checks that the rule groups associate with the web ACL at the correct priority.static final String
Checks whether Amazon GuardDuty is enabled in your AWS account and region.static final String
Checks whether the Amazon GuardDuty has findings that are non archived.static final String
Checks that the managed AWS Identity and Access Management policies that you create do not allow blocked actions on all AWS AWS KMS keys.static final String
Checks whether IAM groups have at least one IAM user.static final String
Checks that the inline policies attached to your AWS Identity and Access Management users, roles, and groups do not allow blocked actions on all AWS Key Management Service keys.static final String
Checks that inline policy feature is not in use.static final String
Checks whether the account password policy for IAM users meets the specified requirements indicated in the parameters.static final String
Checks whether for each IAM resource, a policy ARN in the input parameter is attached to the IAM resource.static final String
Checks whether the IAM policy ARN is attached to an IAM user, or an IAM group with one or more IAM users, or an IAM role with one or more trusted entity.static final String
Checks the IAM policies that you create for Allow statements that grant permissions to all actions on all resources.static final String
Checks that AWS Identity and Access Management (IAM) policies in a list of policies are attached to all AWS roles.static final String
Checks whether the root user access key is available.static final String
Checks whether IAM users are members of at least one IAM group.static final String
Checks whether the AWS Identity and Access Management users have multi-factor authentication (MFA) enabled.static final String
Checks that none of your IAM users have policies attached.static final String
Checks whether your AWS Identity and Access Management (IAM) users have passwords or active access keys that have not been used within the specified number of days you provided.static final String
Checks that Internet gateways (IGWs) are only attached to an authorized Amazon Virtual Private Cloud (VPCs).static final String
Checks whether customer master keys (CMKs) are not scheduled for deletion in AWS Key Management Service (KMS).static final String
Checks whether the AWS Lambda function is configured with function-level concurrent execution limit.static final String
Checks whether an AWS Lambda function is configured with a dead-letter queue.static final String
Checks whether the AWS Lambda function policy attached to the Lambda resource prohibits public access.static final String
Checks that the lambda function settings for runtime, role, timeout, and memory size match the expected values.static final String
Checks whether an AWS Lambda function is in an Amazon Virtual Private Cloud.static final String
Checks whether AWS Multi-Factor Authentication (MFA) is enabled for all IAM users that use a console password.static final String
Checks if an Amazon Relational Database Service (Amazon RDS) cluster has deletion protection enabled.static final String
Checks whether RDS DB instances have backups enabled.static final String
Checks whether enhanced monitoring is enabled for Amazon Relational Database Service (Amazon RDS) instances.static final String
Checks whether Amazon RDS database is present in back plans of AWS Backup.static final String
Checks if an Amazon Relational Database Service (Amazon RDS) instance has deletion protection enabled.static final String
Checks if an Amazon RDS instance has AWS Identity and Access Management (IAM) authentication enabled.static final String
Check whether the Amazon Relational Database Service instances are not publicly accessible.static final String
Checks that respective logs of Amazon Relational Database Service (Amazon RDS) are enabled.static final String
Checks whether high availability is enabled for your RDS DB instances.static final String
Checks whether Amazon Relational Database Service (Amazon RDS) DB snapshots are encrypted.static final String
Checks if Amazon Relational Database Service (Amazon RDS) snapshots are public.static final String
Checks whether storage encryption is enabled for your RDS DB instances.static final String
Checks that Amazon Redshift automated snapshots are enabled for clusters.static final String
Checks whether Amazon Redshift clusters have the specified settings.static final String
Checks whether Amazon Redshift clusters have the specified maintenance settings.static final String
Checks whether Amazon Redshift clusters are not publicly accessible.static final String
Checks whether Amazon Redshift clusters require TLS/SSL encryption to connect to SQL clients.static final String
Checks whether your resources have the tags that you specify.static final String
Checks whether your AWS account is enabled to use multi-factor authentication (MFA) hardware device to sign in with root credentials.static final String
Checks whether users of your AWS account require a multi-factor authentication (MFA) device to sign in with root credentials.static final String
Checks whether the required public access block settings are configured from account level.static final String
Checks that the Amazon Simple Storage Service bucket policy does not allow blocked bucket-level and object-level actions on resources in the bucket for principals from other AWS accounts.static final String
Checks whether Amazon Simple Storage Service (Amazon S3) bucket has lock enabled, by default.static final String
Checks if Amazon Simple Storage Service (Amazon S3) buckets are publicly accessible.static final String
Checks whether logging is enabled for your S3 buckets.static final String
Checks that the access granted by the Amazon S3 bucket is restricted by any of the AWS principals, federated users, service principals, IP addresses, or VPCs that you provide.static final String
Verifies that your Amazon Simple Storage Service bucket policies do not allow other inter-account permissions than the control Amazon S3 bucket policy provided.static final String
Checks that your Amazon S3 buckets do not allow public read access.static final String
Checks that your Amazon S3 buckets do not allow public write access.static final String
Checks whether S3 buckets have cross-region replication enabled.static final String
Checks that your Amazon S3 bucket either has Amazon S3 default encryption enabled or that the S3 bucket policy explicitly denies put-object requests without server side encryption that uses AES-256 or AWS Key Management Service.static final String
Checks whether S3 buckets have policies that require requests to use Secure Socket Layer (SSL).static final String
Checks whether versioning is enabled for your S3 buckets.static final String
Checks whether the Amazon Simple Storage Service (Amazon S3) buckets are encrypted with AWS Key Management Service (AWS KMS).static final String
Checks whether AWS Key Management Service (KMS) key is configured for an Amazon SageMaker endpoint configuration.static final String
Check whether an AWS Key Management Service (KMS) key is configured for SageMaker notebook instance.static final String
Checks whether direct internet access is disabled for an Amazon SageMaker notebook instance.static final String
Checks whether AWS Secrets Manager secret has rotation enabled.static final String
Checks whether AWS Secrets Manager secret rotation has rotated successfully as per the rotation schedule.static final String
Checks that AWS Security Hub is enabled for an AWS account.static final String
Checks whether Service Endpoint for the service provided in rule parameter is created for each Amazon VPC.static final String
Checks whether EBS volumes are attached to EC2 instances.static final String
Verify that DDoS response team (DRT) can access AWS account.static final String
Checks whether Amazon SNS topic is encrypted with AWS Key Management Service (AWS KMS).static final String
Checks that the default security group of any Amazon Virtual Private Cloud (VPC) does not allow inbound or outbound traffic.static final String
Checks whether Amazon Virtual Private Cloud flow logs are found and enabled for Amazon VPC.static final String
Checks whether the security group with 0.0.0.0/0 of any Amazon Virtual Private Cloud (Amazon VPC) allows only specific inbound TCP or UDP traffic.static final String
Checks that both AWS Virtual Private Network tunnels provided by AWS Site-to-Site VPN are in UP status.static final String
Checks if logging is enabled on AWS Web Application Firewall (WAF) classic global web ACLs.static final String
Checks whether logging is enabled on AWS Web Application Firewall (WAFV2) regional and global web access control list (ACLs). -
Constructor Summary
ModifierConstructorDescriptionprotected
ManagedRuleIdentifiers
(software.amazon.jsii.JsiiObject.InitializationMode initializationMode) protected
ManagedRuleIdentifiers
(software.amazon.jsii.JsiiObjectRef objRef) -
Method Summary
Methods inherited from class software.amazon.jsii.JsiiObject
jsiiAsyncCall, jsiiAsyncCall, jsiiCall, jsiiCall, jsiiGet, jsiiGet, jsiiSet, jsiiStaticCall, jsiiStaticCall, jsiiStaticGet, jsiiStaticGet, jsiiStaticSet, jsiiStaticSet
Methods inherited from class java.lang.Object
clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
Methods inherited from interface software.amazon.jsii.JsiiSerializable
$jsii$toJson
-
Field Details
-
ACCESS_KEYS_ROTATED
Checks whether the active access keys are rotated within the number of days specified in maxAccessKeyAge. -
ACCOUNT_PART_OF_ORGANIZATIONS
Checks whether AWS account is part of AWS Organizations. -
ACM_CERTIFICATE_EXPIRATION_CHECK
Checks whether ACM Certificates in your account are marked for expiration within the specified number of days. -
ALB_HTTP_DROP_INVALID_HEADER_ENABLED
Checks if rule evaluates Application Load Balancers (ALBs) to ensure they are configured to drop http headers. -
ALB_HTTP_TO_HTTPS_REDIRECTION_CHECK
Checks whether HTTP to HTTPS redirection is configured on all HTTP listeners of Application Load Balancer. -
ALB_WAF_ENABLED
Checks if Web Application Firewall (WAF) is enabled on Application Load Balancers (ALBs). -
API_GW_CACHE_ENABLED_AND_ENCRYPTED
Checks that all methods in Amazon API Gateway stages have caching enabled and encrypted. -
API_GW_ENDPOINT_TYPE_CHECK
Checks that Amazon API Gateway APIs are of the type specified in the rule parameter endpointConfigurationType. -
API_GW_EXECUTION_LOGGING_ENABLED
Checks that all methods in Amazon API Gateway stage has logging enabled. -
APPROVED_AMIS_BY_ID
Checks whether running instances are using specified AMIs. -
APPROVED_AMIS_BY_TAG
Checks whether running instances are using specified AMIs. -
AUTOSCALING_GROUP_ELB_HEALTHCHECK_REQUIRED
Checks whether your Auto Scaling groups that are associated with a load balancer are using Elastic Load Balancing health checks. -
CLOUD_TRAIL_CLOUD_WATCH_LOGS_ENABLED
Checks whether AWS CloudTrail trails are configured to send logs to Amazon CloudWatch Logs. -
CLOUD_TRAIL_ENABLED
Checks whether AWS CloudTrail is enabled in your AWS account. -
CLOUD_TRAIL_ENCRYPTION_ENABLED
Checks whether AWS CloudTrail is configured to use the server side encryption (SSE) AWS Key Management Service (AWS KMS) customer master key (CMK) encryption. -
CLOUD_TRAIL_LOG_FILE_VALIDATION_ENABLED
Checks whether AWS CloudTrail creates a signed digest file with logs. -
CLOUDFORMATION_STACK_DRIFT_DETECTION_CHECK
Checks whether an AWS CloudFormation stack's actual configuration differs, or has drifted, from it's expected configuration. -
CLOUDFORMATION_STACK_NOTIFICATION_CHECK
Checks whether your CloudFormation stacks are sending event notifications to an SNS topic. -
CLOUDFRONT_DEFAULT_ROOT_OBJECT_CONFIGURED
Checks if an Amazon CloudFront distribution is configured to return a specific object that is the default root object. -
CLOUDFRONT_ORIGIN_ACCESS_IDENTITY_ENABLED
Checks that Amazon CloudFront distribution with Amazon S3 Origin type has Origin Access Identity (OAI) configured. -
CLOUDFRONT_ORIGIN_FAILOVER_ENABLED
Checks whether an origin group is configured for the distribution of at least 2 origins in the origin group for Amazon CloudFront. -
CLOUDFRONT_SNI_ENABLED
Checks if Amazon CloudFront distributions are using a custom SSL certificate and are configured to use SNI to serve HTTPS requests. -
CLOUDFRONT_VIEWER_POLICY_HTTPS
Checks whether your Amazon CloudFront distributions use HTTPS (directly or via a redirection). -
CLOUDTRAIL_MULTI_REGION_ENABLED
Checks that there is at least one multi-region AWS CloudTrail. -
CLOUDTRAIL_S3_DATAEVENTS_ENABLED
Checks whether at least one AWS CloudTrail trail is logging Amazon S3 data events for all S3 buckets. -
CLOUDTRAIL_SECURITY_TRAIL_ENABLED
Checks that there is at least one AWS CloudTrail trail defined with security best practices. -
CLOUDWATCH_ALARM_ACTION_CHECK
Checks whether CloudWatch alarms have at least one alarm action, one INSUFFICIENT_DATA action, or one OK action enabled. -
CLOUDWATCH_ALARM_RESOURCE_CHECK
Checks whether the specified resource type has a CloudWatch alarm for the specified metric. -
CLOUDWATCH_ALARM_SETTINGS_CHECK
Checks whether CloudWatch alarms with the given metric name have the specified settings. -
CLOUDWATCH_LOG_GROUP_ENCRYPTED
Checks whether a log group in Amazon CloudWatch Logs is encrypted with a AWS Key Management Service (KMS) managed Customer Master Keys (CMK). -
CMK_BACKING_KEY_ROTATION_ENABLED
Checks that key rotation is enabled for each key and matches to the key ID of the customer created customer master key (CMK). -
CODEBUILD_PROJECT_ENVVAR_AWSCRED_CHECK
Checks whether the project contains environment variables AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY. -
CODEBUILD_PROJECT_SOURCE_REPO_URL_CHECK
Checks whether the GitHub or Bitbucket source repository URL contains either personal access tokens or user name and password. -
CODEPIPELINE_DEPLOYMENT_COUNT_CHECK
Checks whether the first deployment stage of the AWS CodePipeline performs more than one deployment. -
CODEPIPELINE_REGION_FANOUT_CHECK
Checks whether each stage in the AWS CodePipeline deploys to more than N times the number of the regions the AWS CodePipeline has deployed in all the previous combined stages, where N is the region fanout number. -
CW_LOGGROUP_RETENTION_PERIOD_CHECK
Checks whether Amazon CloudWatch LogGroup retention period is set to specific number of days. -
DAX_ENCRYPTION_ENABLED
Checks that DynamoDB Accelerator (DAX) clusters are encrypted. -
DMS_REPLICATION_NOT_PUBLIC
Checks whether AWS Database Migration Service replication instances are public. -
DYNAMODB_AUTOSCALING_ENABLED
Checks whether Auto Scaling or On-Demand is enabled on your DynamoDB tables and/or global secondary indexes. -
DYNAMODB_IN_BACKUP_PLAN
Checks whether Amazon DynamoDB table is present in AWS Backup plans. -
DYNAMODB_PITR_ENABLED
Checks that point in time recovery (PITR) is enabled for Amazon DynamoDB tables. -
DYNAMODB_TABLE_ENCRYPTED_KMS
Checks whether Amazon DynamoDB table is encrypted with AWS Key Management Service (KMS). -
DYNAMODB_TABLE_ENCRYPTION_ENABLED
Checks whether the Amazon DynamoDB tables are encrypted and checks their status. -
DYNAMODB_THROUGHPUT_LIMIT_CHECK
Checks whether provisioned DynamoDB throughput is approaching the maximum limit for your account. -
EBS_ENCRYPTED_VOLUMES
Checks whether the EBS volumes that are in an attached state are encrypted. -
EBS_IN_BACKUP_PLAN
Checks if Amazon Elastic Block Store (Amazon EBS) volumes are added in backup plans of AWS Backup. -
EBS_OPTIMIZED_INSTANCE
Checks whether EBS optimization is enabled for your EC2 instances that can be EBS-optimized. -
EBS_SNAPSHOT_PUBLIC_RESTORABLE_CHECK
Checks whether Amazon Elastic Block Store snapshots are not publicly restorable. -
EC2_DESIRED_INSTANCE_TENANCY
Checks instances for specified tenancy. -
EC2_DESIRED_INSTANCE_TYPE
Checks whether your EC2 instances are of the specified instance types. -
EC2_EBS_ENCRYPTION_BY_DEFAULT
Check that Amazon Elastic Block Store (EBS) encryption is enabled by default. -
EC2_IMDSV2_CHECK
Checks whether your Amazon Elastic Compute Cloud (Amazon EC2) instance metadata version is configured with Instance Metadata Service Version 2 (IMDSv2). -
EC2_INSTANCE_DETAILED_MONITORING_ENABLED
Checks whether detailed monitoring is enabled for EC2 instances. -
EC2_INSTANCE_MANAGED_BY_SSM
Checks whether the Amazon EC2 instances in your account are managed by AWS Systems Manager. -
EC2_INSTANCE_NO_PUBLIC_IP
Checks whether Amazon Elastic Compute Cloud (Amazon EC2) instances have a public IP association. -
EC2_INSTANCE_PROFILE_ATTACHED
Checks if an Amazon Elastic Compute Cloud (Amazon EC2) instance has an Identity and Access Management (IAM) profile attached to it.This rule is NON_COMPLIANT if no IAM profile is attached to the Amazon EC2 instance.
-
EC2_INSTANCES_IN_VPC
Checks whether your EC2 instances belong to a virtual private cloud (VPC). -
EC2_MANAGED_INSTANCE_APPLICATIONS_BLOCKED
Checks that none of the specified applications are installed on the instance. -
EC2_MANAGED_INSTANCE_APPLICATIONS_REQUIRED
Checks whether all of the specified applications are installed on the instance. -
EC2_MANAGED_INSTANCE_ASSOCIATION_COMPLIANCE_STATUS_CHECK
@Stability(Stable) public static final String EC2_MANAGED_INSTANCE_ASSOCIATION_COMPLIANCE_STATUS_CHECKChecks whether the compliance status of AWS Systems Manager association compliance is COMPLIANT or NON_COMPLIANT after the association execution on the instance. -
EC2_MANAGED_INSTANCE_INVENTORY_BLOCKED
Checks whether instances managed by AWS Systems Manager are configured to collect blocked inventory types. -
EC2_MANAGED_INSTANCE_PATCH_COMPLIANCE_STATUS_CHECK
Checks whether the compliance status of the Amazon EC2 Systems Manager patch compliance is COMPLIANT or NON_COMPLIANT after the patch installation on the instance. -
EC2_MANAGED_INSTANCE_PLATFORM_CHECK
Checks whether EC2 managed instances have the desired configurations. -
EC2_SECURITY_GROUP_ATTACHED_TO_ENI
Checks that security groups are attached to Amazon Elastic Compute Cloud (Amazon EC2) instances or to an elastic network interface. -
EC2_SECURITY_GROUPS_INCOMING_SSH_DISABLED
Checks whether the incoming SSH traffic for the security groups is accessible. -
EC2_SECURITY_GROUPS_RESTRICTED_INCOMING_TRAFFIC
Checks whether the security groups in use do not allow unrestricted incoming TCP traffic to the specified ports. -
EC2_STOPPED_INSTANCE
Checks whether there are instances stopped for more than the allowed number of days. -
EC2_VOLUME_INUSE_CHECK
Checks whether EBS volumes are attached to EC2 instances. -
EFS_ENCRYPTED_CHECK
hecks whether Amazon Elastic File System (Amazon EFS) is configured to encrypt the file data using AWS Key Management Service (AWS KMS). -
EFS_IN_BACKUP_PLAN
Checks whether Amazon Elastic File System (Amazon EFS) file systems are added in the backup plans of AWS Backup. -
EIP_ATTACHED
Checks whether all Elastic IP addresses that are allocated to a VPC are attached to EC2 instances or in-use elastic network interfaces (ENIs). -
EKS_ENDPOINT_NO_PUBLIC_ACCESS
Checks whether Amazon Elastic Kubernetes Service (Amazon EKS) endpoint is not publicly accessible. -
EKS_SECRETS_ENCRYPTED
Checks whether Amazon Elastic Kubernetes Service clusters are configured to have Kubernetes secrets encrypted using AWS Key Management Service (KMS) keys. -
ELASTICACHE_REDIS_CLUSTER_AUTOMATIC_BACKUP_CHECK
Check if the Amazon ElastiCache Redis clusters have automatic backup turned on. -
ELASTICSEARCH_ENCRYPTED_AT_REST
Checks whether Amazon Elasticsearch Service (Amazon ES) domains have encryption at rest configuration enabled. -
ELASTICSEARCH_IN_VPC_ONLY
Checks whether Amazon Elasticsearch Service (Amazon ES) domains are in Amazon Virtual Private Cloud (Amazon VPC). -
ELASTICSEARCH_NODE_TO_NODE_ENCRYPTION_CHECK
Check that Amazon ElasticSearch Service nodes are encrypted end to end. -
ELB_ACM_CERTIFICATE_REQUIRED
Checks whether the Classic Load Balancers use SSL certificates provided by AWS Certificate Manager. -
ELB_CROSS_ZONE_LOAD_BALANCING_ENABLED
Checks if cross-zone load balancing is enabled for the Classic Load Balancers (CLBs). -
ELB_CUSTOM_SECURITY_POLICY_SSL_CHECK
Checks whether your Classic Load Balancer SSL listeners are using a custom policy. -
ELB_DELETION_PROTECTION_ENABLED
Checks whether Elastic Load Balancing has deletion protection enabled. -
ELB_LOGGING_ENABLED
Checks whether the Application Load Balancer and the Classic Load Balancer have logging enabled. -
ELB_PREDEFINED_SECURITY_POLICY_SSL_CHECK
Checks whether your Classic Load Balancer SSL listeners are using a predefined policy. -
ELB_TLS_HTTPS_LISTENERS_ONLY
Checks whether your Classic Load Balancer is configured with SSL or HTTPS listeners. -
EMR_KERBEROS_ENABLED
Checks that Amazon EMR clusters have Kerberos enabled. -
EMR_MASTER_NO_PUBLIC_IP
Checks whether Amazon Elastic MapReduce (EMR) clusters' master nodes have public IPs. -
FMS_SECURITY_GROUP_AUDIT_POLICY_CHECK
Checks whether the security groups associated inScope resources are compliant with the master security groups at each rule level based on allowSecurityGroup and denySecurityGroup flag. -
FMS_SECURITY_GROUP_CONTENT_CHECK
Checks whether AWS Firewall Manager created security groups content is the same as the master security groups. -
FMS_SECURITY_GROUP_RESOURCE_ASSOCIATION_CHECK
Checks whether Amazon EC2 or an elastic network interface is associated with AWS Firewall Manager security groups. -
FMS_SHIELD_RESOURCE_POLICY_CHECK
Checks whether an Application Load Balancer, Amazon CloudFront distributions, Elastic Load Balancer or Elastic IP has AWS Shield protection. -
FMS_WEBACL_RESOURCE_POLICY_CHECK
Checks whether the web ACL is associated with an Application Load Balancer, API Gateway stage, or Amazon CloudFront distributions. -
FMS_WEBACL_RULEGROUP_ASSOCIATION_CHECK
Checks that the rule groups associate with the web ACL at the correct priority.The correct priority is decided by the rank of the rule groups in the ruleGroups parameter.
-
GUARDDUTY_ENABLED_CENTRALIZED
Checks whether Amazon GuardDuty is enabled in your AWS account and region.If you provide an AWS account for centralization, the rule evaluates the Amazon GuardDuty results in the centralized account.
-
GUARDDUTY_NON_ARCHIVED_FINDINGS
Checks whether the Amazon GuardDuty has findings that are non archived. -
IAM_CUSTOMER_POLICY_BLOCKED_KMS_ACTIONS
Checks that the managed AWS Identity and Access Management policies that you create do not allow blocked actions on all AWS AWS KMS keys. -
IAM_GROUP_HAS_USERS_CHECK
Checks whether IAM groups have at least one IAM user. -
IAM_INLINE_POLICY_BLOCKED_KMS_ACTIONS
Checks that the inline policies attached to your AWS Identity and Access Management users, roles, and groups do not allow blocked actions on all AWS Key Management Service keys. -
IAM_NO_INLINE_POLICY_CHECK
Checks that inline policy feature is not in use. -
IAM_PASSWORD_POLICY
Checks whether the account password policy for IAM users meets the specified requirements indicated in the parameters. -
IAM_POLICY_BLOCKED_CHECK
Checks whether for each IAM resource, a policy ARN in the input parameter is attached to the IAM resource. -
IAM_POLICY_IN_USE
Checks whether the IAM policy ARN is attached to an IAM user, or an IAM group with one or more IAM users, or an IAM role with one or more trusted entity. -
IAM_POLICY_NO_STATEMENTS_WITH_ADMIN_ACCESS
Checks the IAM policies that you create for Allow statements that grant permissions to all actions on all resources. -
IAM_ROLE_MANAGED_POLICY_CHECK
Checks that AWS Identity and Access Management (IAM) policies in a list of policies are attached to all AWS roles. -
IAM_ROOT_ACCESS_KEY_CHECK
Checks whether the root user access key is available. -
IAM_USER_GROUP_MEMBERSHIP_CHECK
Checks whether IAM users are members of at least one IAM group. -
IAM_USER_MFA_ENABLED
Checks whether the AWS Identity and Access Management users have multi-factor authentication (MFA) enabled. -
IAM_USER_NO_POLICIES_CHECK
Checks that none of your IAM users have policies attached.IAM users must inherit permissions from IAM groups or roles.
-
IAM_USER_UNUSED_CREDENTIALS_CHECK
Checks whether your AWS Identity and Access Management (IAM) users have passwords or active access keys that have not been used within the specified number of days you provided. -
INTERNET_GATEWAY_AUTHORIZED_VPC_ONLY
Checks that Internet gateways (IGWs) are only attached to an authorized Amazon Virtual Private Cloud (VPCs). -
KMS_CMK_NOT_SCHEDULED_FOR_DELETION
Checks whether customer master keys (CMKs) are not scheduled for deletion in AWS Key Management Service (KMS). -
LAMBDA_CONCURRENCY_CHECK
Checks whether the AWS Lambda function is configured with function-level concurrent execution limit. -
LAMBDA_DLQ_CHECK
Checks whether an AWS Lambda function is configured with a dead-letter queue. -
LAMBDA_FUNCTION_PUBLIC_ACCESS_PROHIBITED
Checks whether the AWS Lambda function policy attached to the Lambda resource prohibits public access. -
LAMBDA_FUNCTION_SETTINGS_CHECK
Checks that the lambda function settings for runtime, role, timeout, and memory size match the expected values. -
LAMBDA_INSIDE_VPC
Checks whether an AWS Lambda function is in an Amazon Virtual Private Cloud. -
MFA_ENABLED_FOR_IAM_CONSOLE_ACCESS
Checks whether AWS Multi-Factor Authentication (MFA) is enabled for all IAM users that use a console password. -
RDS_CLUSTER_DELETION_PROTECTION_ENABLED
Checks if an Amazon Relational Database Service (Amazon RDS) cluster has deletion protection enabled. -
RDS_DB_INSTANCE_BACKUP_ENABLED
Checks whether RDS DB instances have backups enabled. -
RDS_ENHANCED_MONITORING_ENABLED
Checks whether enhanced monitoring is enabled for Amazon Relational Database Service (Amazon RDS) instances. -
RDS_IN_BACKUP_PLAN
Checks whether Amazon RDS database is present in back plans of AWS Backup. -
RDS_INSTANCE_DELETION_PROTECTION_ENABLED
Checks if an Amazon Relational Database Service (Amazon RDS) instance has deletion protection enabled. -
RDS_INSTANCE_IAM_AUTHENTICATION_ENABLED
Checks if an Amazon RDS instance has AWS Identity and Access Management (IAM) authentication enabled. -
RDS_INSTANCE_PUBLIC_ACCESS_CHECK
Check whether the Amazon Relational Database Service instances are not publicly accessible. -
RDS_LOGGING_ENABLED
Checks that respective logs of Amazon Relational Database Service (Amazon RDS) are enabled. -
RDS_MULTI_AZ_SUPPORT
Checks whether high availability is enabled for your RDS DB instances. -
RDS_SNAPSHOT_ENCRYPTED
Checks whether Amazon Relational Database Service (Amazon RDS) DB snapshots are encrypted. -
RDS_SNAPSHOTS_PUBLIC_PROHIBITED
Checks if Amazon Relational Database Service (Amazon RDS) snapshots are public. -
RDS_STORAGE_ENCRYPTED
Checks whether storage encryption is enabled for your RDS DB instances. -
REDSHIFT_BACKUP_ENABLED
Checks that Amazon Redshift automated snapshots are enabled for clusters. -
REDSHIFT_CLUSTER_CONFIGURATION_CHECK
Checks whether Amazon Redshift clusters have the specified settings. -
REDSHIFT_CLUSTER_MAINTENANCE_SETTINGS_CHECK
Checks whether Amazon Redshift clusters have the specified maintenance settings. -
REDSHIFT_CLUSTER_PUBLIC_ACCESS_CHECK
Checks whether Amazon Redshift clusters are not publicly accessible. -
REDSHIFT_REQUIRE_TLS_SSL
Checks whether Amazon Redshift clusters require TLS/SSL encryption to connect to SQL clients. -
REQUIRED_TAGS
Checks whether your resources have the tags that you specify.For example, you can check whether your Amazon EC2 instances have the CostCenter tag.
-
ROOT_ACCOUNT_HARDWARE_MFA_ENABLED
Checks whether your AWS account is enabled to use multi-factor authentication (MFA) hardware device to sign in with root credentials. -
ROOT_ACCOUNT_MFA_ENABLED
Checks whether users of your AWS account require a multi-factor authentication (MFA) device to sign in with root credentials. -
S3_ACCOUNT_LEVEL_PUBLIC_ACCESS_BLOCKS
Checks whether the required public access block settings are configured from account level. -
S3_BUCKET_BLOCKED_ACTIONS_PROHIBITED
Checks that the Amazon Simple Storage Service bucket policy does not allow blocked bucket-level and object-level actions on resources in the bucket for principals from other AWS accounts. -
S3_BUCKET_DEFAULT_LOCK_ENABLED
Checks whether Amazon Simple Storage Service (Amazon S3) bucket has lock enabled, by default. -
S3_BUCKET_LEVEL_PUBLIC_ACCESS_PROHIBITED
Checks if Amazon Simple Storage Service (Amazon S3) buckets are publicly accessible.This rule is NON_COMPLIANT if an Amazon S3 bucket is not listed in the excludedPublicBuckets parameter and bucket level settings are public.
-
S3_BUCKET_LOGGING_ENABLED
Checks whether logging is enabled for your S3 buckets. -
S3_BUCKET_POLICY_GRANTEE_CHECK
Checks that the access granted by the Amazon S3 bucket is restricted by any of the AWS principals, federated users, service principals, IP addresses, or VPCs that you provide. -
S3_BUCKET_POLICY_NOT_MORE_PERMISSIVE
Verifies that your Amazon Simple Storage Service bucket policies do not allow other inter-account permissions than the control Amazon S3 bucket policy provided. -
S3_BUCKET_PUBLIC_READ_PROHIBITED
Checks that your Amazon S3 buckets do not allow public read access. -
S3_BUCKET_PUBLIC_WRITE_PROHIBITED
Checks that your Amazon S3 buckets do not allow public write access. -
S3_BUCKET_REPLICATION_ENABLED
Checks whether S3 buckets have cross-region replication enabled. -
S3_BUCKET_SERVER_SIDE_ENCRYPTION_ENABLED
Checks that your Amazon S3 bucket either has Amazon S3 default encryption enabled or that the S3 bucket policy explicitly denies put-object requests without server side encryption that uses AES-256 or AWS Key Management Service. -
S3_BUCKET_SSL_REQUESTS_ONLY
Checks whether S3 buckets have policies that require requests to use Secure Socket Layer (SSL). -
S3_BUCKET_VERSIONING_ENABLED
Checks whether versioning is enabled for your S3 buckets. -
S3_DEFAULT_ENCRYPTION_KMS
Checks whether the Amazon Simple Storage Service (Amazon S3) buckets are encrypted with AWS Key Management Service (AWS KMS). -
SAGEMAKER_ENDPOINT_CONFIGURATION_KMS_KEY_CONFIGURED
Checks whether AWS Key Management Service (KMS) key is configured for an Amazon SageMaker endpoint configuration. -
SAGEMAKER_NOTEBOOK_INSTANCE_KMS_KEY_CONFIGURED
Check whether an AWS Key Management Service (KMS) key is configured for SageMaker notebook instance. -
SAGEMAKER_NOTEBOOK_NO_DIRECT_INTERNET_ACCESS
Checks whether direct internet access is disabled for an Amazon SageMaker notebook instance. -
SECRETSMANAGER_ROTATION_ENABLED_CHECK
Checks whether AWS Secrets Manager secret has rotation enabled. -
SECRETSMANAGER_SCHEDULED_ROTATION_SUCCESS_CHECK
Checks whether AWS Secrets Manager secret rotation has rotated successfully as per the rotation schedule. -
SECURITYHUB_ENABLED
Checks that AWS Security Hub is enabled for an AWS account. -
SERVICE_VPC_ENDPOINT_ENABLED
Checks whether Service Endpoint for the service provided in rule parameter is created for each Amazon VPC. -
SHIELD_ADVANCED_ENABLED_AUTO_RENEW
Checks whether EBS volumes are attached to EC2 instances. -
SHIELD_DRT_ACCESS
Verify that DDoS response team (DRT) can access AWS account. -
SNS_ENCRYPTED_KMS
Checks whether Amazon SNS topic is encrypted with AWS Key Management Service (AWS KMS). -
VPC_DEFAULT_SECURITY_GROUP_CLOSED
Checks that the default security group of any Amazon Virtual Private Cloud (VPC) does not allow inbound or outbound traffic.The rule returns NOT_APPLICABLE if the security group is not default.
-
VPC_FLOW_LOGS_ENABLED
Checks whether Amazon Virtual Private Cloud flow logs are found and enabled for Amazon VPC. -
VPC_SG_OPEN_ONLY_TO_AUTHORIZED_PORTS
Checks whether the security group with 0.0.0.0/0 of any Amazon Virtual Private Cloud (Amazon VPC) allows only specific inbound TCP or UDP traffic. -
VPC_VPN_2_TUNNELS_UP
Checks that both AWS Virtual Private Network tunnels provided by AWS Site-to-Site VPN are in UP status. -
WAF_CLASSIC_LOGGING_ENABLED
Checks if logging is enabled on AWS Web Application Firewall (WAF) classic global web ACLs. -
WAFV2_LOGGING_ENABLED
Checks whether logging is enabled on AWS Web Application Firewall (WAFV2) regional and global web access control list (ACLs).
-
-
Constructor Details
-
ManagedRuleIdentifiers
protected ManagedRuleIdentifiers(software.amazon.jsii.JsiiObjectRef objRef) -
ManagedRuleIdentifiers
protected ManagedRuleIdentifiers(software.amazon.jsii.JsiiObject.InitializationMode initializationMode)
-