Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
AWS
Loading policies...

Policy: AWS > CIS v2.0 > 1 - Identity and Access Management > 1.22 - Ensure access to AWSCloudShellFullAccess is restricted

Configures auditing against a CIS Benchmark item.

Level: 1

AWS CloudShell is a convenient way of running CLI commands against AWS services; a managed IAM policy ('AWSCloudShellFullAccess') provides full access to CloudShell, which allows file upload and download capability between a user's local system and the CloudShell environment. Within the CloudShell environment a user has sudo permissions, and can access the internet. So it is feasible to install file transfer software (for example) and move data from CloudShell to external internet servers.

Targets

This policy targets the following resource types:

  • AWS > Account

Primary Policy

This policy is used with the following primary policy:

  • AWS > CIS v2.0 > 1 - Identity and Access Management

Related Policies

  • Attestation

Controls

Setting this policy configures this control:

  • AWS > CIS v2.0 > 1 - Identity and Access Management > 1.22 - Ensure access to AWSCloudShellFullAccess is restricted

Policy Specification

Schema Type
string
Default
Per AWS > CIS v2.0 > 1 - Identity and Access Management
Valid Values [YAML]
  • Per AWS > CIS v2.0 > 1 - Identity and Access Management
    
  • Skip
    
  • Check: Benchmark using attestation
    

Category

  • CIS > Controls v7 > 14 Controlled Access Based on the Need to Know

In Your Workspace

  • Policy Settings by Type report

Developers

    Category URI
    • tmod:@turbot/cis#/control/categories/v0714
  • Policy Type URI
    • tmod:@turbot/aws-cisv2-0#/policy/types/r0122
  • GraphQL
    • query policyType(id: "tmod:@turbot/aws-cisv2-0#/policy/types/r0122") { … }
    • query policySettings(filter: "policyTypeId:'tmod:@turbot/aws-cisv2-0#/policy/types/r0122'") { … }
    • query policyValues(filter: "policyTypeId:'tmod:@turbot/aws-cisv2-0#/policy/types/r0122'") { … }
  • CLI
    • Get Policy Type
    • turbot graphql policy-type --id "tmod:@turbot/aws-cisv2-0#/policy/types/r0122"
    • Get Policy Settings
    • turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-cisv2-0#/policy/types/r0122"
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
180
Mods
497
Resource Types
8,691
Policies
3,362
Controls
1,833
Quick Actions
540
IAM