AuditCheck

class aws_cdk.aws_iot_alpha.AuditCheck(value, names=None, *, module=None, qualname=None, type=None, start=1, boundary=None)

Bases: Enum

(experimental) The AWS IoT Device Defender audit checks.

See:

https://docs.aws.amazon.com/iot-device-defender/latest/devguide/device-defender-audit-checks.html

Stability:

experimental

ExampleMetadata:

infused

Example:

# config: iot.AccountAuditConfiguration


# Daily audit
daily_audit = iot.ScheduledAudit(self, "DailyAudit",
    account_audit_configuration=config,
    frequency=iot.Frequency.DAILY,
    audit_checks=[iot.AuditCheck.AUTHENTICATED_COGNITO_ROLE_OVERLY_PERMISSIVE_CHECK
    ]
)

# Weekly audit
weekly_audit = iot.ScheduledAudit(self, "WeeklyAudit",
    account_audit_configuration=config,
    frequency=iot.Frequency.WEEKLY,
    day_of_week=iot.DayOfWeek.SUNDAY,
    audit_checks=[iot.AuditCheck.CA_CERTIFICATE_EXPIRING_CHECK
    ]
)

# Monthly audit
monthly_audit = iot.ScheduledAudit(self, "MonthlyAudit",
    account_audit_configuration=config,
    frequency=iot.Frequency.MONTHLY,
    day_of_month=iot.DayOfMonth.of(1),
    audit_checks=[iot.AuditCheck.CA_CERTIFICATE_KEY_QUALITY_CHECK
    ]
)

Attributes

AUTHENTICATED_COGNITO_ROLE_OVERLY_PERMISSIVE_CHECK

(experimental) Checks the permissiveness of an authenticated Amazon Cognito identity pool role.

For this check, AWS IoT Device Defender audits all Amazon Cognito identity pools that have been used to connect to the AWS IoT message broker during the 31 days before the audit is performed.

Stability:

experimental

CA_CERTIFICATE_EXPIRING_CHECK

(experimental) Checks if a CA certificate is expiring.

This check applies to CA certificates expiring within 30 days or that have expired.

Stability:

experimental

CA_CERTIFICATE_KEY_QUALITY_CHECK

(experimental) Checks the quality of the CA certificate key.

The quality checks if the key is in a valid format, not expired, and if the key meets a minimum required size.

This check applies to CA certificates that are ACTIVE or PENDING_TRANSFER.

Stability:

experimental

CONFLICTING_CLIENT_IDS_CHECK

(experimental) Checks if multiple devices connect using the same client ID.

Stability:

experimental

DEVICE_CERTIFICATE_EXPIRING_CHECK

(experimental) Checks if a device certificate is expiring.

This check applies to device certificates expiring within 30 days or that have expired.

Stability:

experimental

DEVICE_CERTIFICATE_KEY_QUALITY_CHECK

(experimental) Checks the quality of the device certificate key.

The quality checks if the key is in a valid format, not expired, signed by a registered certificate authority, and if the key meets a minimum required size.

Stability:

experimental

DEVICE_CERTIFICATE_SHARED_CHECK

(experimental) Checks if multiple concurrent connections use the same X.509 certificate to authenticate with AWS IoT.

Stability:

experimental

IOT_POLICY_OVERLY_PERMISSIVE_CHECK

(experimental) Checks the permissiveness of a policy attached to an authenticated Amazon Cognito identity pool role.

Stability:

experimental

IOT_ROLE_ALIAS_ALLOWS_ACCESS_TO_UNUSED_SERVICES_CHECK

(experimental) Checks if a role alias has access to services that haven’t been used for the AWS IoT device in the last year.

Stability:

experimental

IOT_ROLE_ALIAS_OVERLY_PERMISSIVE_CHECK

(experimental) Checks if the temporary credentials provided by AWS IoT role aliases are overly permissive.

Stability:

experimental

LOGGING_DISABLED_CHECK

(experimental) Checks if AWS IoT logs are disabled.

Stability:

experimental

REVOKED_CA_CERTIFICATE_STILL_ACTIVE_CHECK

(experimental) Checks if a revoked CA certificate is still active.

Stability:

experimental

REVOKED_DEVICE_CERTIFICATE_STILL_ACTIVE_CHECK

(experimental) Checks if a revoked device certificate is still active.

Stability:

experimental

UNAUTHENTICATED_COGNITO_ROLE_OVERLY_PERMISSIVE_CHECK

(experimental) Checks if policy attached to an unauthenticated Amazon Cognito identity pool role is too permissive.

Stability:

experimental