Control: AWS > CIS v3.0 > 1 - Identity and Access Management > 1.22 - Ensure access to AWSCloudShellFullAccess is restricted
Configures auditing against a CIS Benchmark item.
Level: 1
AWS CloudShell is a convenient way of running CLI commands against AWS services; a managed IAM policy ('AWSCloudShellFullAccess') provides full access to CloudShell, which allows file upload and download capability between a user's local system and the CloudShell environment. Within the CloudShell environment a user has sudo permissions, and can access the internet. So it is feasible to install file transfer software (for example) and move data from CloudShell to external internet servers.
Resource Types
This control targets the following resource types:
Primary Policies
The following policies can be used to configure this control:
- 1.22 - Ensure access to AWSCloudShellFullAccess is restricted
- 1.22 - Ensure access to AWSCloudShellFullAccess is restricted > Attestation
Category
In Your Workspace
Developers
- tmod:@turbot/aws-cisv3-0#/control/types/r0122
- tmod:@turbot/cis#/control/categories/v0714
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-cisv3-0#/control/types/r0122"
Get Controls
Control Type URI
Category URI
GraphQL
CLI