Class ManagedRuleIdentifiers
java.lang.Object
software.amazon.jsii.JsiiObject
software.amazon.awscdk.services.config.ManagedRuleIdentifiers
- All Implemented Interfaces:
software.amazon.jsii.JsiiSerializable
@Generated(value="jsii-pacmak/1.84.0 (build 5404dcf)",
date="2023-06-19T16:30:48.621Z")
@Stability(Stable)
public class ManagedRuleIdentifiers
extends software.amazon.jsii.JsiiObject
Managed rules that are supported by AWS Config.
Example:
// https://docs.aws.amazon.com/config/latest/developerguide/access-keys-rotated.html // https://docs.aws.amazon.com/config/latest/developerguide/access-keys-rotated.html ManagedRule.Builder.create(this, "AccessKeysRotated") .identifier(ManagedRuleIdentifiers.ACCESS_KEYS_ROTATED) .inputParameters(Map.of( "maxAccessKeyAge", 60)) // default is 24 hours .maximumExecutionFrequency(MaximumExecutionFrequency.TWELVE_HOURS) .build();
- See Also:
-
Nested Class Summary
Nested classes/interfaces inherited from class software.amazon.jsii.JsiiObject
software.amazon.jsii.JsiiObject.InitializationMode
-
Field Summary
Modifier and TypeFieldDescriptionstatic final String
Checks whether the active access keys are rotated within the number of days specified in maxAccessKeyAge.static final String
Checks whether AWS account is part of AWS Organizations.static final String
Checks whether ACM Certificates in your account are marked for expiration within the specified number of days.static final String
Checks if rule evaluates Application Load Balancers (ALBs) to ensure they are configured to drop http headers.static final String
Checks whether HTTP to HTTPS redirection is configured on all HTTP listeners of Application Load Balancer.static final String
Checks if Web Application Firewall (WAF) is enabled on Application Load Balancers (ALBs).static final String
Checks that all methods in Amazon API Gateway stages have caching enabled and encrypted.static final String
Checks that Amazon API Gateway APIs are of the type specified in the rule parameter endpointConfigurationType.static final String
Checks that all methods in Amazon API Gateway stage has logging enabled.static final String
Checks whether running instances are using specified AMIs.static final String
Checks whether running instances are using specified AMIs.static final String
Checks whether your Auto Scaling groups that are associated with a load balancer are using Elastic Load Balancing health checks.static final String
Checks whether AWS CloudTrail trails are configured to send logs to Amazon CloudWatch Logs.static final String
Checks whether AWS CloudTrail is enabled in your AWS account.static final String
Checks whether AWS CloudTrail is configured to use the server side encryption (SSE) AWS Key Management Service (AWS KMS) customer master key (CMK) encryption.static final String
Checks whether AWS CloudTrail creates a signed digest file with logs.static final String
Checks whether an AWS CloudFormation stack's actual configuration differs, or has drifted, from it's expected configuration.static final String
Checks whether your CloudFormation stacks are sending event notifications to an SNS topic.static final String
Checks if an Amazon CloudFront distribution is configured to return a specific object that is the default root object.static final String
Checks that Amazon CloudFront distribution with Amazon S3 Origin type has Origin Access Identity (OAI) configured.static final String
Checks whether an origin group is configured for the distribution of at least 2 origins in the origin group for Amazon CloudFront.static final String
Checks if Amazon CloudFront distributions are using a custom SSL certificate and are configured to use SNI to serve HTTPS requests.static final String
Checks whether your Amazon CloudFront distributions use HTTPS (directly or via a redirection).static final String
Checks that there is at least one multi-region AWS CloudTrail.static final String
Checks whether at least one AWS CloudTrail trail is logging Amazon S3 data events for all S3 buckets.static final String
Checks that there is at least one AWS CloudTrail trail defined with security best practices.static final String
Checks whether CloudWatch alarms have at least one alarm action, one INSUFFICIENT_DATA action, or one OK action enabled.static final String
Checks whether the specified resource type has a CloudWatch alarm for the specified metric.static final String
Checks whether CloudWatch alarms with the given metric name have the specified settings.static final String
Checks whether a log group in Amazon CloudWatch Logs is encrypted with a AWS Key Management Service (KMS) managed Customer Master Keys (CMK).static final String
Checks that key rotation is enabled for each key and matches to the key ID of the customer created customer master key (CMK).static final String
Checks whether the project contains environment variables AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.static final String
Checks whether the GitHub or Bitbucket source repository URL contains either personal access tokens or user name and password.static final String
Checks whether the first deployment stage of the AWS CodePipeline performs more than one deployment.static final String
Checks whether each stage in the AWS CodePipeline deploys to more than N times the number of the regions the AWS CodePipeline has deployed in all the previous combined stages, where N is the region fanout number.static final String
Checks whether Amazon CloudWatch LogGroup retention period is set to specific number of days.static final String
Checks that DynamoDB Accelerator (DAX) clusters are encrypted.static final String
Checks whether AWS Database Migration Service replication instances are public.static final String
Checks whether Auto Scaling or On-Demand is enabled on your DynamoDB tables and/or global secondary indexes.static final String
Checks whether Amazon DynamoDB table is present in AWS Backup plans.static final String
Checks that point in time recovery (PITR) is enabled for Amazon DynamoDB tables.static final String
Checks whether Amazon DynamoDB table is encrypted with AWS Key Management Service (KMS).static final String
Checks whether the Amazon DynamoDB tables are encrypted and checks their status.static final String
Checks whether provisioned DynamoDB throughput is approaching the maximum limit for your account.static final String
Checks whether the EBS volumes that are in an attached state are encrypted.static final String
Checks if Amazon Elastic Block Store (Amazon EBS) volumes are added in backup plans of AWS Backup.static final String
Checks whether EBS optimization is enabled for your EC2 instances that can be EBS-optimized.static final String
Checks whether Amazon Elastic Block Store snapshots are not publicly restorable.static final String
Checks instances for specified tenancy.static final String
Checks whether your EC2 instances are of the specified instance types.static final String
Check that Amazon Elastic Block Store (EBS) encryption is enabled by default.static final String
Checks whether your Amazon Elastic Compute Cloud (Amazon EC2) instance metadata version is configured with Instance Metadata Service Version 2 (IMDSv2).static final String
Checks whether detailed monitoring is enabled for EC2 instances.static final String
Checks whether the Amazon EC2 instances in your account are managed by AWS Systems Manager.static final String
Checks whether Amazon Elastic Compute Cloud (Amazon EC2) instances have a public IP association.static final String
Checks if an Amazon Elastic Compute Cloud (Amazon EC2) instance has an Identity and Access Management (IAM) profile attached to it.static final String
Checks whether your EC2 instances belong to a virtual private cloud (VPC).static final String
Checks that none of the specified applications are installed on the instance.static final String
Checks whether all of the specified applications are installed on the instance.static final String
Checks whether the compliance status of AWS Systems Manager association compliance is COMPLIANT or NON_COMPLIANT after the association execution on the instance.static final String
Checks whether instances managed by AWS Systems Manager are configured to collect blocked inventory types.static final String
Checks whether the compliance status of the Amazon EC2 Systems Manager patch compliance is COMPLIANT or NON_COMPLIANT after the patch installation on the instance.static final String
Checks whether EC2 managed instances have the desired configurations.static final String
Checks that security groups are attached to Amazon Elastic Compute Cloud (Amazon EC2) instances or to an elastic network interface.static final String
Checks whether the incoming SSH traffic for the security groups is accessible.static final String
Checks whether the security groups in use do not allow unrestricted incoming TCP traffic to the specified ports.static final String
Checks whether there are instances stopped for more than the allowed number of days.static final String
Checks whether EBS volumes are attached to EC2 instances.static final String
hecks whether Amazon Elastic File System (Amazon EFS) is configured to encrypt the file data using AWS Key Management Service (AWS KMS).static final String
Checks whether Amazon Elastic File System (Amazon EFS) file systems are added in the backup plans of AWS Backup.static final String
Checks whether all Elastic IP addresses that are allocated to a VPC are attached to EC2 instances or in-use elastic network interfaces (ENIs).static final String
Checks whether Amazon Elastic Kubernetes Service (Amazon EKS) endpoint is not publicly accessible.static final String
Checks whether Amazon Elastic Kubernetes Service clusters are configured to have Kubernetes secrets encrypted using AWS Key Management Service (KMS) keys.static final String
Check if the Amazon ElastiCache Redis clusters have automatic backup turned on.static final String
Checks whether Amazon Elasticsearch Service (Amazon ES) domains have encryption at rest configuration enabled.static final String
Checks whether Amazon Elasticsearch Service (Amazon ES) domains are in Amazon Virtual Private Cloud (Amazon VPC).static final String
Check that Amazon ElasticSearch Service nodes are encrypted end to end.static final String
Checks whether the Classic Load Balancers use SSL certificates provided by AWS Certificate Manager.static final String
Checks if cross-zone load balancing is enabled for the Classic Load Balancers (CLBs).static final String
Checks whether your Classic Load Balancer SSL listeners are using a custom policy.static final String
Checks whether Elastic Load Balancing has deletion protection enabled.static final String
Checks whether the Application Load Balancer and the Classic Load Balancer have logging enabled.static final String
Checks whether your Classic Load Balancer SSL listeners are using a predefined policy.static final String
Checks whether your Classic Load Balancer is configured with SSL or HTTPS listeners.static final String
Checks that Amazon EMR clusters have Kerberos enabled.static final String
Checks whether Amazon Elastic MapReduce (EMR) clusters' master nodes have public IPs.static final String
Checks whether the security groups associated inScope resources are compliant with the master security groups at each rule level based on allowSecurityGroup and denySecurityGroup flag.static final String
Checks whether AWS Firewall Manager created security groups content is the same as the master security groups.static final String
Checks whether Amazon EC2 or an elastic network interface is associated with AWS Firewall Manager security groups.static final String
Checks whether an Application Load Balancer, Amazon CloudFront distributions, Elastic Load Balancer or Elastic IP has AWS Shield protection.static final String
Checks whether the web ACL is associated with an Application Load Balancer, API Gateway stage, or Amazon CloudFront distributions.static final String
Checks that the rule groups associate with the web ACL at the correct priority.static final String
Checks whether Amazon GuardDuty is enabled in your AWS account and region.static final String
Checks whether the Amazon GuardDuty has findings that are non archived.static final String
Checks that the managed AWS Identity and Access Management policies that you create do not allow blocked actions on all AWS AWS KMS keys.static final String
Checks whether IAM groups have at least one IAM user.static final String
Checks that the inline policies attached to your AWS Identity and Access Management users, roles, and groups do not allow blocked actions on all AWS Key Management Service keys.static final String
Checks that inline policy feature is not in use.static final String
Checks whether the account password policy for IAM users meets the specified requirements indicated in the parameters.static final String
Checks whether for each IAM resource, a policy ARN in the input parameter is attached to the IAM resource.static final String
Checks whether the IAM policy ARN is attached to an IAM user, or an IAM group with one or more IAM users, or an IAM role with one or more trusted entity.static final String
Checks the IAM policies that you create for Allow statements that grant permissions to all actions on all resources.static final String
Checks that AWS Identity and Access Management (IAM) policies in a list of policies are attached to all AWS roles.static final String
Checks whether the root user access key is available.static final String
Checks whether IAM users are members of at least one IAM group.static final String
Checks whether the AWS Identity and Access Management users have multi-factor authentication (MFA) enabled.static final String
Checks that none of your IAM users have policies attached.static final String
Checks whether your AWS Identity and Access Management (IAM) users have passwords or active access keys that have not been used within the specified number of days you provided.static final String
Checks that Internet gateways (IGWs) are only attached to an authorized Amazon Virtual Private Cloud (VPCs).static final String
Checks whether customer master keys (CMKs) are not scheduled for deletion in AWS Key Management Service (KMS).static final String
Checks whether the AWS Lambda function is configured with function-level concurrent execution limit.static final String
Checks whether an AWS Lambda function is configured with a dead-letter queue.static final String
Checks whether the AWS Lambda function policy attached to the Lambda resource prohibits public access.static final String
Checks that the lambda function settings for runtime, role, timeout, and memory size match the expected values.static final String
Checks whether an AWS Lambda function is in an Amazon Virtual Private Cloud.static final String
Checks whether AWS Multi-Factor Authentication (MFA) is enabled for all IAM users that use a console password.static final String
Checks if an Amazon Relational Database Service (Amazon RDS) cluster has deletion protection enabled.static final String
Checks whether RDS DB instances have backups enabled.static final String
Checks whether enhanced monitoring is enabled for Amazon Relational Database Service (Amazon RDS) instances.static final String
Checks whether Amazon RDS database is present in back plans of AWS Backup.static final String
Checks if an Amazon Relational Database Service (Amazon RDS) instance has deletion protection enabled.static final String
Checks if an Amazon RDS instance has AWS Identity and Access Management (IAM) authentication enabled.static final String
Check whether the Amazon Relational Database Service instances are not publicly accessible.static final String
Checks that respective logs of Amazon Relational Database Service (Amazon RDS) are enabled.static final String
Checks whether high availability is enabled for your RDS DB instances.static final String
Checks whether Amazon Relational Database Service (Amazon RDS) DB snapshots are encrypted.static final String
Checks if Amazon Relational Database Service (Amazon RDS) snapshots are public.static final String
Checks whether storage encryption is enabled for your RDS DB instances.static final String
Checks that Amazon Redshift automated snapshots are enabled for clusters.static final String
Checks whether Amazon Redshift clusters have the specified settings.static final String
Checks whether Amazon Redshift clusters have the specified maintenance settings.static final String
Checks whether Amazon Redshift clusters are not publicly accessible.static final String
Checks whether Amazon Redshift clusters require TLS/SSL encryption to connect to SQL clients.static final String
Checks whether your resources have the tags that you specify.static final String
Checks whether your AWS account is enabled to use multi-factor authentication (MFA) hardware device to sign in with root credentials.static final String
Checks whether users of your AWS account require a multi-factor authentication (MFA) device to sign in with root credentials.static final String
Checks whether the required public access block settings are configured from account level.static final String
Checks that the Amazon Simple Storage Service bucket policy does not allow blocked bucket-level and object-level actions on resources in the bucket for principals from other AWS accounts.static final String
Checks whether Amazon Simple Storage Service (Amazon S3) bucket has lock enabled, by default.static final String
Checks if Amazon Simple Storage Service (Amazon S3) buckets are publicly accessible.static final String
Checks whether logging is enabled for your S3 buckets.static final String
Checks that the access granted by the Amazon S3 bucket is restricted by any of the AWS principals, federated users, service principals, IP addresses, or VPCs that you provide.static final String
Verifies that your Amazon Simple Storage Service bucket policies do not allow other inter-account permissions than the control Amazon S3 bucket policy provided.static final String
Checks that your Amazon S3 buckets do not allow public read access.static final String
Checks that your Amazon S3 buckets do not allow public write access.static final String
Checks whether S3 buckets have cross-region replication enabled.static final String
Checks that your Amazon S3 bucket either has Amazon S3 default encryption enabled or that the S3 bucket policy explicitly denies put-object requests without server side encryption that uses AES-256 or AWS Key Management Service.static final String
Checks whether S3 buckets have policies that require requests to use Secure Socket Layer (SSL).static final String
Checks whether versioning is enabled for your S3 buckets.static final String
Checks whether the Amazon Simple Storage Service (Amazon S3) buckets are encrypted with AWS Key Management Service (AWS KMS).static final String
Checks whether AWS Key Management Service (KMS) key is configured for an Amazon SageMaker endpoint configuration.static final String
Check whether an AWS Key Management Service (KMS) key is configured for SageMaker notebook instance.static final String
Checks whether direct internet access is disabled for an Amazon SageMaker notebook instance.static final String
Checks whether AWS Secrets Manager secret has rotation enabled.static final String
Checks whether AWS Secrets Manager secret rotation has rotated successfully as per the rotation schedule.static final String
Checks that AWS Security Hub is enabled for an AWS account.static final String
Checks whether Service Endpoint for the service provided in rule parameter is created for each Amazon VPC.static final String
Checks whether EBS volumes are attached to EC2 instances.static final String
Verify that DDoS response team (DRT) can access AWS account.static final String
Checks whether Amazon SNS topic is encrypted with AWS Key Management Service (AWS KMS).static final String
Checks that the default security group of any Amazon Virtual Private Cloud (VPC) does not allow inbound or outbound traffic.static final String
Checks whether Amazon Virtual Private Cloud flow logs are found and enabled for Amazon VPC.static final String
Checks whether the security group with 0.0.0.0/0 of any Amazon Virtual Private Cloud (Amazon VPC) allows only specific inbound TCP or UDP traffic.static final String
Checks that both AWS Virtual Private Network tunnels provided by AWS Site-to-Site VPN are in UP status.static final String
Checks if logging is enabled on AWS Web Application Firewall (WAF) classic global web ACLs.static final String
Checks whether logging is enabled on AWS Web Application Firewall (WAFV2) regional and global web access control list (ACLs). -
Constructor Summary
ModifierConstructorDescriptionprotected
ManagedRuleIdentifiers
(software.amazon.jsii.JsiiObject.InitializationMode initializationMode) protected
ManagedRuleIdentifiers
(software.amazon.jsii.JsiiObjectRef objRef) -
Method Summary
Methods inherited from class software.amazon.jsii.JsiiObject
jsiiAsyncCall, jsiiAsyncCall, jsiiCall, jsiiCall, jsiiGet, jsiiGet, jsiiSet, jsiiStaticCall, jsiiStaticCall, jsiiStaticGet, jsiiStaticGet, jsiiStaticSet, jsiiStaticSet
Methods inherited from class java.lang.Object
clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
Methods inherited from interface software.amazon.jsii.JsiiSerializable
$jsii$toJson
-
Field Details
-
ACCESS_KEYS_ROTATED
Checks whether the active access keys are rotated within the number of days specified in maxAccessKeyAge.- See Also:
-
ACCOUNT_PART_OF_ORGANIZATIONS
Checks whether AWS account is part of AWS Organizations.- See Also:
-
ACM_CERTIFICATE_EXPIRATION_CHECK
Checks whether ACM Certificates in your account are marked for expiration within the specified number of days.- See Also:
-
ALB_HTTP_DROP_INVALID_HEADER_ENABLED
Checks if rule evaluates Application Load Balancers (ALBs) to ensure they are configured to drop http headers.- See Also:
-
ALB_HTTP_TO_HTTPS_REDIRECTION_CHECK
Checks whether HTTP to HTTPS redirection is configured on all HTTP listeners of Application Load Balancer.- See Also:
-
ALB_WAF_ENABLED
Checks if Web Application Firewall (WAF) is enabled on Application Load Balancers (ALBs).- See Also:
-
API_GW_CACHE_ENABLED_AND_ENCRYPTED
Checks that all methods in Amazon API Gateway stages have caching enabled and encrypted.- See Also:
-
API_GW_ENDPOINT_TYPE_CHECK
Checks that Amazon API Gateway APIs are of the type specified in the rule parameter endpointConfigurationType.- See Also:
-
API_GW_EXECUTION_LOGGING_ENABLED
Checks that all methods in Amazon API Gateway stage has logging enabled.- See Also:
-
APPROVED_AMIS_BY_ID
Checks whether running instances are using specified AMIs.- See Also:
-
APPROVED_AMIS_BY_TAG
Checks whether running instances are using specified AMIs.- See Also:
-
AUTOSCALING_GROUP_ELB_HEALTHCHECK_REQUIRED
Checks whether your Auto Scaling groups that are associated with a load balancer are using Elastic Load Balancing health checks.- See Also:
-
CLOUD_TRAIL_CLOUD_WATCH_LOGS_ENABLED
Checks whether AWS CloudTrail trails are configured to send logs to Amazon CloudWatch Logs.- See Also:
-
CLOUD_TRAIL_ENABLED
Checks whether AWS CloudTrail is enabled in your AWS account.- See Also:
-
CLOUD_TRAIL_ENCRYPTION_ENABLED
Checks whether AWS CloudTrail is configured to use the server side encryption (SSE) AWS Key Management Service (AWS KMS) customer master key (CMK) encryption.- See Also:
-
CLOUD_TRAIL_LOG_FILE_VALIDATION_ENABLED
Checks whether AWS CloudTrail creates a signed digest file with logs.- See Also:
-
CLOUDFORMATION_STACK_DRIFT_DETECTION_CHECK
Checks whether an AWS CloudFormation stack's actual configuration differs, or has drifted, from it's expected configuration.- See Also:
-
CLOUDFORMATION_STACK_NOTIFICATION_CHECK
Checks whether your CloudFormation stacks are sending event notifications to an SNS topic.- See Also:
-
CLOUDFRONT_DEFAULT_ROOT_OBJECT_CONFIGURED
Checks if an Amazon CloudFront distribution is configured to return a specific object that is the default root object.- See Also:
-
CLOUDFRONT_ORIGIN_ACCESS_IDENTITY_ENABLED
Checks that Amazon CloudFront distribution with Amazon S3 Origin type has Origin Access Identity (OAI) configured.- See Also:
-
CLOUDFRONT_ORIGIN_FAILOVER_ENABLED
Checks whether an origin group is configured for the distribution of at least 2 origins in the origin group for Amazon CloudFront.- See Also:
-
CLOUDFRONT_SNI_ENABLED
Checks if Amazon CloudFront distributions are using a custom SSL certificate and are configured to use SNI to serve HTTPS requests.- See Also:
-
CLOUDFRONT_VIEWER_POLICY_HTTPS
Checks whether your Amazon CloudFront distributions use HTTPS (directly or via a redirection).- See Also:
-
CLOUDTRAIL_MULTI_REGION_ENABLED
Checks that there is at least one multi-region AWS CloudTrail.- See Also:
-
CLOUDTRAIL_S3_DATAEVENTS_ENABLED
Checks whether at least one AWS CloudTrail trail is logging Amazon S3 data events for all S3 buckets.- See Also:
-
CLOUDTRAIL_SECURITY_TRAIL_ENABLED
Checks that there is at least one AWS CloudTrail trail defined with security best practices.- See Also:
-
CLOUDWATCH_ALARM_ACTION_CHECK
Checks whether CloudWatch alarms have at least one alarm action, one INSUFFICIENT_DATA action, or one OK action enabled.- See Also:
-
CLOUDWATCH_ALARM_RESOURCE_CHECK
Checks whether the specified resource type has a CloudWatch alarm for the specified metric.- See Also:
-
CLOUDWATCH_ALARM_SETTINGS_CHECK
Checks whether CloudWatch alarms with the given metric name have the specified settings.- See Also:
-
CLOUDWATCH_LOG_GROUP_ENCRYPTED
Checks whether a log group in Amazon CloudWatch Logs is encrypted with a AWS Key Management Service (KMS) managed Customer Master Keys (CMK).- See Also:
-
CMK_BACKING_KEY_ROTATION_ENABLED
Checks that key rotation is enabled for each key and matches to the key ID of the customer created customer master key (CMK).- See Also:
-
CODEBUILD_PROJECT_ENVVAR_AWSCRED_CHECK
Checks whether the project contains environment variables AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.- See Also:
-
CODEBUILD_PROJECT_SOURCE_REPO_URL_CHECK
Checks whether the GitHub or Bitbucket source repository URL contains either personal access tokens or user name and password.- See Also:
-
CODEPIPELINE_DEPLOYMENT_COUNT_CHECK
Checks whether the first deployment stage of the AWS CodePipeline performs more than one deployment.- See Also:
-
CODEPIPELINE_REGION_FANOUT_CHECK
Checks whether each stage in the AWS CodePipeline deploys to more than N times the number of the regions the AWS CodePipeline has deployed in all the previous combined stages, where N is the region fanout number.- See Also:
-
CW_LOGGROUP_RETENTION_PERIOD_CHECK
Checks whether Amazon CloudWatch LogGroup retention period is set to specific number of days.- See Also:
-
DAX_ENCRYPTION_ENABLED
Checks that DynamoDB Accelerator (DAX) clusters are encrypted.- See Also:
-
DMS_REPLICATION_NOT_PUBLIC
Checks whether AWS Database Migration Service replication instances are public.- See Also:
-
DYNAMODB_AUTOSCALING_ENABLED
Checks whether Auto Scaling or On-Demand is enabled on your DynamoDB tables and/or global secondary indexes.- See Also:
-
DYNAMODB_IN_BACKUP_PLAN
Checks whether Amazon DynamoDB table is present in AWS Backup plans.- See Also:
-
DYNAMODB_PITR_ENABLED
Checks that point in time recovery (PITR) is enabled for Amazon DynamoDB tables.- See Also:
-
DYNAMODB_TABLE_ENCRYPTED_KMS
Checks whether Amazon DynamoDB table is encrypted with AWS Key Management Service (KMS).- See Also:
-
DYNAMODB_TABLE_ENCRYPTION_ENABLED
Checks whether the Amazon DynamoDB tables are encrypted and checks their status.- See Also:
-
DYNAMODB_THROUGHPUT_LIMIT_CHECK
Checks whether provisioned DynamoDB throughput is approaching the maximum limit for your account.- See Also:
-
EBS_ENCRYPTED_VOLUMES
Checks whether the EBS volumes that are in an attached state are encrypted.- See Also:
-
EBS_IN_BACKUP_PLAN
Checks if Amazon Elastic Block Store (Amazon EBS) volumes are added in backup plans of AWS Backup.- See Also:
-
EBS_OPTIMIZED_INSTANCE
Checks whether EBS optimization is enabled for your EC2 instances that can be EBS-optimized.- See Also:
-
EBS_SNAPSHOT_PUBLIC_RESTORABLE_CHECK
Checks whether Amazon Elastic Block Store snapshots are not publicly restorable.- See Also:
-
EC2_DESIRED_INSTANCE_TENANCY
Checks instances for specified tenancy.- See Also:
-
EC2_DESIRED_INSTANCE_TYPE
Checks whether your EC2 instances are of the specified instance types.- See Also:
-
EC2_EBS_ENCRYPTION_BY_DEFAULT
Check that Amazon Elastic Block Store (EBS) encryption is enabled by default.- See Also:
-
EC2_IMDSV2_CHECK
Checks whether your Amazon Elastic Compute Cloud (Amazon EC2) instance metadata version is configured with Instance Metadata Service Version 2 (IMDSv2).- See Also:
-
EC2_INSTANCE_DETAILED_MONITORING_ENABLED
Checks whether detailed monitoring is enabled for EC2 instances.- See Also:
-
EC2_INSTANCE_MANAGED_BY_SSM
Checks whether the Amazon EC2 instances in your account are managed by AWS Systems Manager.- See Also:
-
EC2_INSTANCE_NO_PUBLIC_IP
Checks whether Amazon Elastic Compute Cloud (Amazon EC2) instances have a public IP association.- See Also:
-
EC2_INSTANCE_PROFILE_ATTACHED
Checks if an Amazon Elastic Compute Cloud (Amazon EC2) instance has an Identity and Access Management (IAM) profile attached to it.This rule is NON_COMPLIANT if no IAM profile is attached to the Amazon EC2 instance.
- See Also:
-
EC2_INSTANCES_IN_VPC
Checks whether your EC2 instances belong to a virtual private cloud (VPC).- See Also:
-
EC2_MANAGED_INSTANCE_APPLICATIONS_BLOCKED
Checks that none of the specified applications are installed on the instance.- See Also:
-
EC2_MANAGED_INSTANCE_APPLICATIONS_REQUIRED
Checks whether all of the specified applications are installed on the instance.- See Also:
-
EC2_MANAGED_INSTANCE_ASSOCIATION_COMPLIANCE_STATUS_CHECK
@Stability(Stable) public static final String EC2_MANAGED_INSTANCE_ASSOCIATION_COMPLIANCE_STATUS_CHECKChecks whether the compliance status of AWS Systems Manager association compliance is COMPLIANT or NON_COMPLIANT after the association execution on the instance.- See Also:
-
EC2_MANAGED_INSTANCE_INVENTORY_BLOCKED
Checks whether instances managed by AWS Systems Manager are configured to collect blocked inventory types.- See Also:
-
EC2_MANAGED_INSTANCE_PATCH_COMPLIANCE_STATUS_CHECK
Checks whether the compliance status of the Amazon EC2 Systems Manager patch compliance is COMPLIANT or NON_COMPLIANT after the patch installation on the instance.- See Also:
-
EC2_MANAGED_INSTANCE_PLATFORM_CHECK
Checks whether EC2 managed instances have the desired configurations.- See Also:
-
EC2_SECURITY_GROUP_ATTACHED_TO_ENI
Checks that security groups are attached to Amazon Elastic Compute Cloud (Amazon EC2) instances or to an elastic network interface.- See Also:
-
EC2_SECURITY_GROUPS_INCOMING_SSH_DISABLED
Checks whether the incoming SSH traffic for the security groups is accessible.- See Also:
-
EC2_SECURITY_GROUPS_RESTRICTED_INCOMING_TRAFFIC
Checks whether the security groups in use do not allow unrestricted incoming TCP traffic to the specified ports.- See Also:
-
EC2_STOPPED_INSTANCE
Checks whether there are instances stopped for more than the allowed number of days.- See Also:
-
EC2_VOLUME_INUSE_CHECK
Checks whether EBS volumes are attached to EC2 instances.- See Also:
-
EFS_ENCRYPTED_CHECK
hecks whether Amazon Elastic File System (Amazon EFS) is configured to encrypt the file data using AWS Key Management Service (AWS KMS).- See Also:
-
EFS_IN_BACKUP_PLAN
Checks whether Amazon Elastic File System (Amazon EFS) file systems are added in the backup plans of AWS Backup.- See Also:
-
EIP_ATTACHED
Checks whether all Elastic IP addresses that are allocated to a VPC are attached to EC2 instances or in-use elastic network interfaces (ENIs).- See Also:
-
EKS_ENDPOINT_NO_PUBLIC_ACCESS
Checks whether Amazon Elastic Kubernetes Service (Amazon EKS) endpoint is not publicly accessible.- See Also:
-
EKS_SECRETS_ENCRYPTED
Checks whether Amazon Elastic Kubernetes Service clusters are configured to have Kubernetes secrets encrypted using AWS Key Management Service (KMS) keys.- See Also:
-
ELASTICACHE_REDIS_CLUSTER_AUTOMATIC_BACKUP_CHECK
Check if the Amazon ElastiCache Redis clusters have automatic backup turned on.- See Also:
-
ELASTICSEARCH_ENCRYPTED_AT_REST
Checks whether Amazon Elasticsearch Service (Amazon ES) domains have encryption at rest configuration enabled.- See Also:
-
ELASTICSEARCH_IN_VPC_ONLY
Checks whether Amazon Elasticsearch Service (Amazon ES) domains are in Amazon Virtual Private Cloud (Amazon VPC).- See Also:
-
ELASTICSEARCH_NODE_TO_NODE_ENCRYPTION_CHECK
Check that Amazon ElasticSearch Service nodes are encrypted end to end.- See Also:
-
ELB_ACM_CERTIFICATE_REQUIRED
Checks whether the Classic Load Balancers use SSL certificates provided by AWS Certificate Manager.- See Also:
-
ELB_CROSS_ZONE_LOAD_BALANCING_ENABLED
Checks if cross-zone load balancing is enabled for the Classic Load Balancers (CLBs).- See Also:
-
ELB_CUSTOM_SECURITY_POLICY_SSL_CHECK
Checks whether your Classic Load Balancer SSL listeners are using a custom policy.- See Also:
-
ELB_DELETION_PROTECTION_ENABLED
Checks whether Elastic Load Balancing has deletion protection enabled.- See Also:
-
ELB_LOGGING_ENABLED
Checks whether the Application Load Balancer and the Classic Load Balancer have logging enabled.- See Also:
-
ELB_PREDEFINED_SECURITY_POLICY_SSL_CHECK
Checks whether your Classic Load Balancer SSL listeners are using a predefined policy.- See Also:
-
ELB_TLS_HTTPS_LISTENERS_ONLY
Checks whether your Classic Load Balancer is configured with SSL or HTTPS listeners.- See Also:
-
EMR_KERBEROS_ENABLED
Checks that Amazon EMR clusters have Kerberos enabled.- See Also:
-
EMR_MASTER_NO_PUBLIC_IP
Checks whether Amazon Elastic MapReduce (EMR) clusters' master nodes have public IPs.- See Also:
-
FMS_SECURITY_GROUP_AUDIT_POLICY_CHECK
Checks whether the security groups associated inScope resources are compliant with the master security groups at each rule level based on allowSecurityGroup and denySecurityGroup flag.- See Also:
-
FMS_SECURITY_GROUP_CONTENT_CHECK
Checks whether AWS Firewall Manager created security groups content is the same as the master security groups.- See Also:
-
FMS_SECURITY_GROUP_RESOURCE_ASSOCIATION_CHECK
Checks whether Amazon EC2 or an elastic network interface is associated with AWS Firewall Manager security groups.- See Also:
-
FMS_SHIELD_RESOURCE_POLICY_CHECK
Checks whether an Application Load Balancer, Amazon CloudFront distributions, Elastic Load Balancer or Elastic IP has AWS Shield protection.- See Also:
-
FMS_WEBACL_RESOURCE_POLICY_CHECK
Checks whether the web ACL is associated with an Application Load Balancer, API Gateway stage, or Amazon CloudFront distributions.- See Also:
-
FMS_WEBACL_RULEGROUP_ASSOCIATION_CHECK
Checks that the rule groups associate with the web ACL at the correct priority.The correct priority is decided by the rank of the rule groups in the ruleGroups parameter.
- See Also:
-
GUARDDUTY_ENABLED_CENTRALIZED
Checks whether Amazon GuardDuty is enabled in your AWS account and region.If you provide an AWS account for centralization, the rule evaluates the Amazon GuardDuty results in the centralized account.
- See Also:
-
GUARDDUTY_NON_ARCHIVED_FINDINGS
Checks whether the Amazon GuardDuty has findings that are non archived.- See Also:
-
IAM_CUSTOMER_POLICY_BLOCKED_KMS_ACTIONS
Checks that the managed AWS Identity and Access Management policies that you create do not allow blocked actions on all AWS AWS KMS keys.- See Also:
-
IAM_GROUP_HAS_USERS_CHECK
Checks whether IAM groups have at least one IAM user.- See Also:
-
IAM_INLINE_POLICY_BLOCKED_KMS_ACTIONS
Checks that the inline policies attached to your AWS Identity and Access Management users, roles, and groups do not allow blocked actions on all AWS Key Management Service keys.- See Also:
-
IAM_NO_INLINE_POLICY_CHECK
Checks that inline policy feature is not in use.- See Also:
-
IAM_PASSWORD_POLICY
Checks whether the account password policy for IAM users meets the specified requirements indicated in the parameters.- See Also:
-
IAM_POLICY_BLOCKED_CHECK
Checks whether for each IAM resource, a policy ARN in the input parameter is attached to the IAM resource.- See Also:
-
IAM_POLICY_IN_USE
Checks whether the IAM policy ARN is attached to an IAM user, or an IAM group with one or more IAM users, or an IAM role with one or more trusted entity.- See Also:
-
IAM_POLICY_NO_STATEMENTS_WITH_ADMIN_ACCESS
Checks the IAM policies that you create for Allow statements that grant permissions to all actions on all resources.- See Also:
-
IAM_ROLE_MANAGED_POLICY_CHECK
Checks that AWS Identity and Access Management (IAM) policies in a list of policies are attached to all AWS roles.- See Also:
-
IAM_ROOT_ACCESS_KEY_CHECK
Checks whether the root user access key is available.- See Also:
-
IAM_USER_GROUP_MEMBERSHIP_CHECK
Checks whether IAM users are members of at least one IAM group.- See Also:
-
IAM_USER_MFA_ENABLED
Checks whether the AWS Identity and Access Management users have multi-factor authentication (MFA) enabled.- See Also:
-
IAM_USER_NO_POLICIES_CHECK
Checks that none of your IAM users have policies attached.IAM users must inherit permissions from IAM groups or roles.
- See Also:
-
IAM_USER_UNUSED_CREDENTIALS_CHECK
Checks whether your AWS Identity and Access Management (IAM) users have passwords or active access keys that have not been used within the specified number of days you provided.- See Also:
-
INTERNET_GATEWAY_AUTHORIZED_VPC_ONLY
Checks that Internet gateways (IGWs) are only attached to an authorized Amazon Virtual Private Cloud (VPCs).- See Also:
-
KMS_CMK_NOT_SCHEDULED_FOR_DELETION
Checks whether customer master keys (CMKs) are not scheduled for deletion in AWS Key Management Service (KMS).- See Also:
-
LAMBDA_CONCURRENCY_CHECK
Checks whether the AWS Lambda function is configured with function-level concurrent execution limit.- See Also:
-
LAMBDA_DLQ_CHECK
Checks whether an AWS Lambda function is configured with a dead-letter queue.- See Also:
-
LAMBDA_FUNCTION_PUBLIC_ACCESS_PROHIBITED
Checks whether the AWS Lambda function policy attached to the Lambda resource prohibits public access.- See Also:
-
LAMBDA_FUNCTION_SETTINGS_CHECK
Checks that the lambda function settings for runtime, role, timeout, and memory size match the expected values.- See Also:
-
LAMBDA_INSIDE_VPC
Checks whether an AWS Lambda function is in an Amazon Virtual Private Cloud.- See Also:
-
MFA_ENABLED_FOR_IAM_CONSOLE_ACCESS
Checks whether AWS Multi-Factor Authentication (MFA) is enabled for all IAM users that use a console password.- See Also:
-
RDS_CLUSTER_DELETION_PROTECTION_ENABLED
Checks if an Amazon Relational Database Service (Amazon RDS) cluster has deletion protection enabled.- See Also:
-
RDS_DB_INSTANCE_BACKUP_ENABLED
Checks whether RDS DB instances have backups enabled.- See Also:
-
RDS_ENHANCED_MONITORING_ENABLED
Checks whether enhanced monitoring is enabled for Amazon Relational Database Service (Amazon RDS) instances.- See Also:
-
RDS_IN_BACKUP_PLAN
Checks whether Amazon RDS database is present in back plans of AWS Backup.- See Also:
-
RDS_INSTANCE_DELETION_PROTECTION_ENABLED
Checks if an Amazon Relational Database Service (Amazon RDS) instance has deletion protection enabled.- See Also:
-
RDS_INSTANCE_IAM_AUTHENTICATION_ENABLED
Checks if an Amazon RDS instance has AWS Identity and Access Management (IAM) authentication enabled.- See Also:
-
RDS_INSTANCE_PUBLIC_ACCESS_CHECK
Check whether the Amazon Relational Database Service instances are not publicly accessible.- See Also:
-
RDS_LOGGING_ENABLED
Checks that respective logs of Amazon Relational Database Service (Amazon RDS) are enabled.- See Also:
-
RDS_MULTI_AZ_SUPPORT
Checks whether high availability is enabled for your RDS DB instances.- See Also:
-
RDS_SNAPSHOT_ENCRYPTED
Checks whether Amazon Relational Database Service (Amazon RDS) DB snapshots are encrypted.- See Also:
-
RDS_SNAPSHOTS_PUBLIC_PROHIBITED
Checks if Amazon Relational Database Service (Amazon RDS) snapshots are public.- See Also:
-
RDS_STORAGE_ENCRYPTED
Checks whether storage encryption is enabled for your RDS DB instances.- See Also:
-
REDSHIFT_BACKUP_ENABLED
Checks that Amazon Redshift automated snapshots are enabled for clusters.- See Also:
-
REDSHIFT_CLUSTER_CONFIGURATION_CHECK
Checks whether Amazon Redshift clusters have the specified settings.- See Also:
-
REDSHIFT_CLUSTER_MAINTENANCE_SETTINGS_CHECK
Checks whether Amazon Redshift clusters have the specified maintenance settings.- See Also:
-
REDSHIFT_CLUSTER_PUBLIC_ACCESS_CHECK
Checks whether Amazon Redshift clusters are not publicly accessible.- See Also:
-
REDSHIFT_REQUIRE_TLS_SSL
Checks whether Amazon Redshift clusters require TLS/SSL encryption to connect to SQL clients.- See Also:
-
REQUIRED_TAGS
Checks whether your resources have the tags that you specify.For example, you can check whether your Amazon EC2 instances have the CostCenter tag.
- See Also:
-
ROOT_ACCOUNT_HARDWARE_MFA_ENABLED
Checks whether your AWS account is enabled to use multi-factor authentication (MFA) hardware device to sign in with root credentials.- See Also:
-
ROOT_ACCOUNT_MFA_ENABLED
Checks whether users of your AWS account require a multi-factor authentication (MFA) device to sign in with root credentials.- See Also:
-
S3_ACCOUNT_LEVEL_PUBLIC_ACCESS_BLOCKS
Checks whether the required public access block settings are configured from account level.- See Also:
-
S3_BUCKET_BLOCKED_ACTIONS_PROHIBITED
Checks that the Amazon Simple Storage Service bucket policy does not allow blocked bucket-level and object-level actions on resources in the bucket for principals from other AWS accounts.- See Also:
-
S3_BUCKET_DEFAULT_LOCK_ENABLED
Checks whether Amazon Simple Storage Service (Amazon S3) bucket has lock enabled, by default.- See Also:
-
S3_BUCKET_LEVEL_PUBLIC_ACCESS_PROHIBITED
Checks if Amazon Simple Storage Service (Amazon S3) buckets are publicly accessible.This rule is NON_COMPLIANT if an Amazon S3 bucket is not listed in the excludedPublicBuckets parameter and bucket level settings are public.
- See Also:
-
S3_BUCKET_LOGGING_ENABLED
Checks whether logging is enabled for your S3 buckets.- See Also:
-
S3_BUCKET_POLICY_GRANTEE_CHECK
Checks that the access granted by the Amazon S3 bucket is restricted by any of the AWS principals, federated users, service principals, IP addresses, or VPCs that you provide.- See Also:
-
S3_BUCKET_POLICY_NOT_MORE_PERMISSIVE
Verifies that your Amazon Simple Storage Service bucket policies do not allow other inter-account permissions than the control Amazon S3 bucket policy provided.- See Also:
-
S3_BUCKET_PUBLIC_READ_PROHIBITED
Checks that your Amazon S3 buckets do not allow public read access.- See Also:
-
S3_BUCKET_PUBLIC_WRITE_PROHIBITED
Checks that your Amazon S3 buckets do not allow public write access.- See Also:
-
S3_BUCKET_REPLICATION_ENABLED
Checks whether S3 buckets have cross-region replication enabled.- See Also:
-
S3_BUCKET_SERVER_SIDE_ENCRYPTION_ENABLED
Checks that your Amazon S3 bucket either has Amazon S3 default encryption enabled or that the S3 bucket policy explicitly denies put-object requests without server side encryption that uses AES-256 or AWS Key Management Service.- See Also:
-
S3_BUCKET_SSL_REQUESTS_ONLY
Checks whether S3 buckets have policies that require requests to use Secure Socket Layer (SSL).- See Also:
-
S3_BUCKET_VERSIONING_ENABLED
Checks whether versioning is enabled for your S3 buckets.- See Also:
-
S3_DEFAULT_ENCRYPTION_KMS
Checks whether the Amazon Simple Storage Service (Amazon S3) buckets are encrypted with AWS Key Management Service (AWS KMS).- See Also:
-
SAGEMAKER_ENDPOINT_CONFIGURATION_KMS_KEY_CONFIGURED
Checks whether AWS Key Management Service (KMS) key is configured for an Amazon SageMaker endpoint configuration.- See Also:
-
SAGEMAKER_NOTEBOOK_INSTANCE_KMS_KEY_CONFIGURED
Check whether an AWS Key Management Service (KMS) key is configured for SageMaker notebook instance.- See Also:
-
SAGEMAKER_NOTEBOOK_NO_DIRECT_INTERNET_ACCESS
Checks whether direct internet access is disabled for an Amazon SageMaker notebook instance.- See Also:
-
SECRETSMANAGER_ROTATION_ENABLED_CHECK
Checks whether AWS Secrets Manager secret has rotation enabled.- See Also:
-
SECRETSMANAGER_SCHEDULED_ROTATION_SUCCESS_CHECK
Checks whether AWS Secrets Manager secret rotation has rotated successfully as per the rotation schedule.- See Also:
-
SECURITYHUB_ENABLED
Checks that AWS Security Hub is enabled for an AWS account.- See Also:
-
SERVICE_VPC_ENDPOINT_ENABLED
Checks whether Service Endpoint for the service provided in rule parameter is created for each Amazon VPC.- See Also:
-
SHIELD_ADVANCED_ENABLED_AUTO_RENEW
Checks whether EBS volumes are attached to EC2 instances.- See Also:
-
SHIELD_DRT_ACCESS
Verify that DDoS response team (DRT) can access AWS account.- See Also:
-
SNS_ENCRYPTED_KMS
Checks whether Amazon SNS topic is encrypted with AWS Key Management Service (AWS KMS).- See Also:
-
VPC_DEFAULT_SECURITY_GROUP_CLOSED
Checks that the default security group of any Amazon Virtual Private Cloud (VPC) does not allow inbound or outbound traffic.The rule returns NOT_APPLICABLE if the security group is not default.
- See Also:
-
VPC_FLOW_LOGS_ENABLED
Checks whether Amazon Virtual Private Cloud flow logs are found and enabled for Amazon VPC.- See Also:
-
VPC_SG_OPEN_ONLY_TO_AUTHORIZED_PORTS
Checks whether the security group with 0.0.0.0/0 of any Amazon Virtual Private Cloud (Amazon VPC) allows only specific inbound TCP or UDP traffic.- See Also:
-
VPC_VPN_2_TUNNELS_UP
Checks that both AWS Virtual Private Network tunnels provided by AWS Site-to-Site VPN are in UP status.- See Also:
-
WAF_CLASSIC_LOGGING_ENABLED
Checks if logging is enabled on AWS Web Application Firewall (WAF) classic global web ACLs.- See Also:
-
WAFV2_LOGGING_ENABLED
Checks whether logging is enabled on AWS Web Application Firewall (WAFV2) regional and global web access control list (ACLs).- See Also:
-
-
Constructor Details
-
ManagedRuleIdentifiers
protected ManagedRuleIdentifiers(software.amazon.jsii.JsiiObjectRef objRef) -
ManagedRuleIdentifiers
protected ManagedRuleIdentifiers(software.amazon.jsii.JsiiObject.InitializationMode initializationMode)
-