Control: AWS > CIS v2.0 > 2 - Storage
Covers security recommendations addressing Storage.
Primary Policies
The following policies can be used to configure this control:
- 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.01 - Ensure S3 Bucket Policy is set to deny HTTP requests
- 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.02 - Ensure MFA Delete is enable on S3 buckets
- 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.03 - Ensure all data in Amazon S3 has been discovered, classified and secured when required
- 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.03 - Ensure all data in Amazon S3 has been discovered, classified and secured when required > Attestation
- 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.04 - Ensure that S3 Buckets are configured with 'Block public access (bucket settings)'
- 2 - Storage > 2.02 - Elastic Compute Cloud (EC2) > 2.02.01 - Ensure EBS Volume Encryption is Enabled in all Regions
- 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.01 - Ensure that encryption-at-rest is enabled for RDS Instances
- 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.02 - Ensure Auto Minor Version Upgrade feature is Enabled for RDS Instances
- 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.03 - Ensure that public access is not given to RDS Instance
- 2 - Storage > 2.04 - Elastic File System (EFS) > 2.04.01 - Ensure that encryption is enabled for EFS file systems
- 2 - Storage
- 2 - Storage > 2.01 - Simple Storage Service (S3)
- 2 - Storage > 2.02 - Elastic Compute Cloud (EC2)
- 2 - Storage > 2.03 - Relational Database Service (RDS)
- 2 - Storage > 2.04 - Elastic File System (EFS)
- 2 - Storage > Maximum Attestation Duration
Category
In Your Workspace
Developers
- tmod:@turbot/aws-cisv2-0#/control/types/s02
- tmod:@turbot/cis#/control/categories/cis
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-cisv2-0#/control/types/s02"
Get Controls
Control Type URI
Category URI
GraphQL
CLI