Control: AWS > CIS v4.0 > 5 - Networking > 5.06 - Ensure routing tables for VPC peering are "least access"
Configures auditing against a CIS Benchmark item.
Level: 2
Once a VPC peering connection is established, routing tables must be updated to establish any connections between the peered VPCs. These routes can be as specific as desired - even peering a VPC to only a single host on the other side of the connection.
Resource Types
This control targets the following resource types:
Policies
This control type relies on these other policies when running actions:
- AWS > CIS v4.0 > Maximum Attestation Duration
- AWS > CIS v4.0 > 5 - Networking > 5.06 - Ensure routing tables for VPC peering are 'least access' > 5.06 - VPC Peering Routes Least Access > Attestation
- AWS > CIS v4.0
- AWS > CIS v4.0 > 5 - Networking > 5.06 - Ensure routing tables for VPC peering are 'least access'
- AWS > CIS v4.0 > 5 - Networking
- AWS > CIS v4.0 > 5 - Networking > Maximum Attestation Duration
Category
In Your Workspace
Developers
- tmod:@turbot/aws-cisv4-0#/control/types/r0506
- tmod:@turbot/cis#/control/categories/cis
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-cisv4-0#/control/types/r0506"
Get Controls
Control Type URI
Category URI
GraphQL
CLI