Skip to content

Commit

Permalink
8 Cpack updates
Browse files Browse the repository at this point in the history
  • Loading branch information
lculotta committed Dec 15, 2022
1 parent 7110c26 commit edf8d76
Show file tree
Hide file tree
Showing 8 changed files with 1,379 additions and 529 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -41,10 +41,10 @@ Parameters:
Default: 'true'
Type: String
RedshiftClusterConfigurationCheckParamClusterDbEncrypted:
Default: 'TRUE'
Default: 'true'
Type: String
RedshiftClusterConfigurationCheckParamLoggingEnabled:
Default: 'TRUE'
Default: 'true'
Type: String
RestrictedIncomingTrafficParamBlockedPort1:
Default: '20'
Expand All @@ -62,16 +62,16 @@ Parameters:
Default: '4333'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamBlockPublicAcls:
Default: 'True'
Default: 'true'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamBlockPublicPolicy:
Default: 'True'
Default: 'true'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamIgnorePublicAcls:
Default: 'True'
Default: 'true'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamRestrictPublicBuckets:
Default: 'True'
Default: 'true'
Type: String
VpcSgOpenOnlyToAuthorizedPortsParamAuthorizedTcpPorts:
Default: '443'
Expand Down Expand Up @@ -331,7 +331,7 @@ Resources:
Owner: AWS
SourceIdentifier: EC2_MANAGEDINSTANCE_PATCH_COMPLIANCE_STATUS_CHECK
Type: AWS::Config::ConfigRule
Ec2SecurityGroupAttachedToEni:
Ec2SecurityGroupAttachedToEniPeriodic:
Properties:
ConfigRuleName: ec2-security-group-attached-to-eni-periodic
Scope:
Expand Down Expand Up @@ -701,6 +701,46 @@ Resources:
Owner: AWS
SourceIdentifier: NO_UNRESTRICTED_ROUTE_TO_IGW
Type: AWS::Config::ConfigRule
OpensearchEncryptedAtRest:
Properties:
ConfigRuleName: opensearch-encrypted-at-rest
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_ENCRYPTED_AT_REST
Type: AWS::Config::ConfigRule
OpensearchInVpcOnly:
Properties:
ConfigRuleName: opensearch-in-vpc-only
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_IN_VPC_ONLY
Type: AWS::Config::ConfigRule
OpensearchLogsToCloudwatch:
Properties:
ConfigRuleName: opensearch-logs-to-cloudwatch
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_LOGS_TO_CLOUDWATCH
Type: AWS::Config::ConfigRule
OpensearchNodeToNodeEncryptionCheck:
Properties:
ConfigRuleName: opensearch-node-to-node-encryption-check
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_NODE_TO_NODE_ENCRYPTION_CHECK
Type: AWS::Config::ConfigRule
RdsAutomaticMinorVersionUpgradeEnabled:
Properties:
ConfigRuleName: rds-automatic-minor-version-upgrade-enabled
Expand Down Expand Up @@ -1164,6 +1204,14 @@ Resources:
Owner: AWS
SourceIdentifier: WAFV2_LOGGING_ENABLED
Type: AWS::Config::ConfigRule
ResponsePlanExistsMaintained:
Properties:
ConfigRuleName: response-plan-exists-maintained
Description: Ensure incident response plans are established, maintained, and distributed to responsible personnel.
Source:
Owner: AWS
SourceIdentifier: AWS_CONFIG_PROCESS_CHECK
Type: AWS::Config::ConfigRule
VulnManagementPlanExists:
Properties:
ConfigRuleName: vuln-management-plan-exists
Expand All @@ -1188,14 +1236,6 @@ Resources:
Owner: AWS
SourceIdentifier: AWS_CONFIG_PROCESS_CHECK
Type: AWS::Config::ConfigRule
ResponsePlanExistsMaintained:
Properties:
ConfigRuleName: response-plan-exists-maintained
Description: Ensure incident response plans are established, maintained, and distrubuted to responsible personel.
Source:
Owner: AWS
SourceIdentifier: AWS_CONFIG_PROCESS_CHECK
Type: AWS::Config::ConfigRule
Conditions:
guarddutyNonArchivedFindingsParamDaysHighSev:
Fn::Not:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,10 +32,10 @@ Parameters:
Default: 'true'
Type: String
RedshiftClusterConfigurationCheckParamClusterDbEncrypted:
Default: 'TRUE'
Default: 'true'
Type: String
RedshiftClusterConfigurationCheckParamLoggingEnabled:
Default: 'TRUE'
Default: 'true'
Type: String
RestrictedIncomingTrafficParamBlockedPort1:
Default: '20'
Expand All @@ -53,16 +53,16 @@ Parameters:
Default: '4333'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamBlockPublicAcls:
Default: 'True'
Default: 'true'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamBlockPublicPolicy:
Default: 'True'
Default: 'true'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamIgnorePublicAcls:
Default: 'True'
Default: 'true'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamRestrictPublicBuckets:
Default: 'True'
Default: 'true'
Type: String
VpcSgOpenOnlyToAuthorizedPortsParamAuthorizedTcpPorts:
Default: '443'
Expand Down Expand Up @@ -324,13 +324,13 @@ Resources:
Type: AWS::Config::ConfigRule
Ec2SecurityGroupAttachedToEni:
Properties:
ConfigRuleName: ec2-security-group-attached-to-eni-periodic
ConfigRuleName: ec2-security-group-attached-to-eni
Scope:
ComplianceResourceTypes:
- AWS::EC2::SecurityGroup
Source:
Owner: AWS
SourceIdentifier: EC2_SECURITY_GROUP_ATTACHED_TO_ENI_PERIODIC
SourceIdentifier: EC2_SECURITY_GROUP_ATTACHED_TO_ENI
Type: AWS::Config::ConfigRule
Ec2StoppedInstance:
Properties:
Expand Down Expand Up @@ -662,6 +662,46 @@ Resources:
Owner: AWS
SourceIdentifier: NO_UNRESTRICTED_ROUTE_TO_IGW
Type: AWS::Config::ConfigRule
OpensearchEncryptedAtRest:
Properties:
ConfigRuleName: opensearch-encrypted-at-rest
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_ENCRYPTED_AT_REST
Type: AWS::Config::ConfigRule
OpensearchInVpcOnly:
Properties:
ConfigRuleName: opensearch-in-vpc-only
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_IN_VPC_ONLY
Type: AWS::Config::ConfigRule
OpensearchLogsToCloudwatch:
Properties:
ConfigRuleName: opensearch-logs-to-cloudwatch
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_LOGS_TO_CLOUDWATCH
Type: AWS::Config::ConfigRule
OpensearchNodeToNodeEncryptionCheck:
Properties:
ConfigRuleName: opensearch-node-to-node-encryption-check
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_NODE_TO_NODE_ENCRYPTION_CHECK
Type: AWS::Config::ConfigRule
RdsAutomaticMinorVersionUpgradeEnabled:
Properties:
ConfigRuleName: rds-automatic-minor-version-upgrade-enabled
Expand Down Expand Up @@ -1125,18 +1165,18 @@ Resources:
Owner: AWS
SourceIdentifier: WAFV2_LOGGING_ENABLED
Type: AWS::Config::ConfigRule
SecurityAwarenessProgramExists:
VulnManagementPlanExists:
Properties:
ConfigRuleName: security-awareness-program-exists
Description: Establish and maintain a security awareness program for your organization. Security awareness programs educate employees on how to protect their organization from various security breaches or incidents.
ConfigRuleName: vuln-management-plan-exists
Description: Ensure a vulnerability management plan is developed and implemented in order to have a formally defined processes to address vulnerabilities in your environment.
Source:
Owner: AWS
SourceIdentifier: AWS_CONFIG_PROCESS_CHECK
Type: AWS::Config::ConfigRule
VulnManagementPlanExists:
SecurityAwarenessProgramExists:
Properties:
ConfigRuleName: vuln-management-plan-exists
Description: Ensure a vulnerability management plan is developed and implemented in order to have a formally defined processes to address vulnerabilities in your environment.
ConfigRuleName: security-awareness-program-exists
Description: Establish and maintain a security awareness program for your organization. Security awareness programs educate employees on how to protect their organization from various security breaches or incidents.
Source:
Owner: AWS
SourceIdentifier: AWS_CONFIG_PROCESS_CHECK
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Parameters:
Default: '365'
Type: String
IamPasswordPolicyParamMinimumPasswordLength:
Default: '14'
Default: '8'
Type: String
IamPasswordPolicyParamPasswordReusePrevention:
Default: '24'
Expand Down Expand Up @@ -47,16 +47,16 @@ Parameters:
Default: '4333'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamBlockPublicAcls:
Default: 'True'
Default: 'true'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamBlockPublicPolicy:
Default: 'True'
Default: 'true'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamIgnorePublicAcls:
Default: 'True'
Default: 'true'
Type: String
S3AccountLevelPublicAccessBlocksPeriodicParamRestrictPublicBuckets:
Default: 'True'
Default: 'true'
Type: String
VpcSgOpenOnlyToAuthorizedPortsParamAuthorizedTcpPorts:
Default: '443'
Expand Down Expand Up @@ -316,7 +316,7 @@ Resources:
Owner: AWS
SourceIdentifier: EC2_MANAGEDINSTANCE_PATCH_COMPLIANCE_STATUS_CHECK
Type: AWS::Config::ConfigRule
Ec2SecurityGroupAttachedToEni:
Ec2SecurityGroupAttachedToEniPeriodic:
Properties:
ConfigRuleName: ec2-security-group-attached-to-eni-periodic
Scope:
Expand Down Expand Up @@ -663,6 +663,46 @@ Resources:
Owner: AWS
SourceIdentifier: NO_UNRESTRICTED_ROUTE_TO_IGW
Type: AWS::Config::ConfigRule
OpensearchEncryptedAtRest:
Properties:
ConfigRuleName: opensearch-encrypted-at-rest
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_ENCRYPTED_AT_REST
Type: AWS::Config::ConfigRule
OpensearchInVpcOnly:
Properties:
ConfigRuleName: opensearch-in-vpc-only
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_IN_VPC_ONLY
Type: AWS::Config::ConfigRule
OpensearchLogsToCloudwatch:
Properties:
ConfigRuleName: opensearch-logs-to-cloudwatch
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_LOGS_TO_CLOUDWATCH
Type: AWS::Config::ConfigRule
OpensearchNodeToNodeEncryptionCheck:
Properties:
ConfigRuleName: opensearch-node-to-node-encryption-check
Scope:
ComplianceResourceTypes:
- AWS::OpenSearch::Domain
Source:
Owner: AWS
SourceIdentifier: OPENSEARCH_NODE_TO_NODE_ENCRYPTION_CHECK
Type: AWS::Config::ConfigRule
RdsAutomaticMinorVersionUpgradeEnabled:
Properties:
ConfigRuleName: rds-automatic-minor-version-upgrade-enabled
Expand Down Expand Up @@ -775,6 +815,16 @@ Resources:
Owner: AWS
SourceIdentifier: REDSHIFT_CLUSTER_CONFIGURATION_CHECK
Type: AWS::Config::ConfigRule
RedshiftClusterConfigurationCheck2:
Properties:
ConfigRuleName: redshift-cluster-configuration-check-2
Scope:
ComplianceResourceTypes:
- AWS::Redshift::Cluster
Source:
Owner: AWS
SourceIdentifier: REDSHIFT_CLUSTER_CONFIGURATION_CHECK
Type: AWS::Config::ConfigRule
RedshiftClusterKmsEnabled:
Properties:
ConfigRuleName: redshift-cluster-kms-enabled
Expand Down Expand Up @@ -1118,18 +1168,18 @@ Resources:
Owner: AWS
SourceIdentifier: WAFV2_LOGGING_ENABLED
Type: AWS::Config::ConfigRule
VulnManagementPlanExists:
ResponsePlanExistsMaintained:
Properties:
ConfigRuleName: vuln-management-plan-exists
Description: Ensure a vulnerability management plan is developed and implemented in order to have a formally defined processes to address vulnerabilities in your environment.
ConfigRuleName: response-plan-exists-maintained
Description: Ensure incident response plans are established, maintained, and distributed to responsible personnel.
Source:
Owner: AWS
SourceIdentifier: AWS_CONFIG_PROCESS_CHECK
Type: AWS::Config::ConfigRule
ResponsePlanExistsMaintained:
VulnManagementPlanExists:
Properties:
ConfigRuleName: response-plan-exists-maintained
Description: Ensure incident response plans are established, maintained, and distrubuted to responsible personel.
ConfigRuleName: vuln-management-plan-exists
Description: Ensure a vulnerability management plan is developed and implemented in order to have a formally defined processes to address vulnerabilities in your environment.
Source:
Owner: AWS
SourceIdentifier: AWS_CONFIG_PROCESS_CHECK
Expand Down
Loading

0 comments on commit edf8d76

Please sign in to comment.