AWS
by Amazon Web Services, Inc.
Comprehensive cloud platform with integrated security services for identity, network, data, and workload protection
Overview
Security configuration baseline for AWS accounts. Covers IAM, storage, logging, monitoring, networking. 40+ automated checks available via AWS Security Hub.
Configuration Examples(5)
Defines IaaS: "The consumer is able to deploy and run arbitrary software... has control over operating systems, storage, and deployed applications." AWS operates under the shared responsibility model where AWS secures the infrastructure and customers secure their workloads.
Configuration Examples(2)
§5.3.6: "Keys should have a limited cryptoperiod to limit the amount of data protected by a single key." §8.1.5: "Key establishment provides cryptographic keys to entities that will use them for cryptographic operations." AWS KMS implements these requirements with automatic key rotation and secure key generation.
Configuration Examples(1)
NIST SP 800-144 Executive Summary: "Carefully plan the security and privacy aspects of cloud computing solutions before engaging them." §3.2: "Assurances furnished by the cloud provider to support security or privacy claims should be verified whenever possible through independent assessment." §4.7: "Organizations should employ appropriate safeguards to protect data in transit and at rest." §4.5: "Identity and access management requires establishing trust in user identities and controlling access to resources based on the authenticated identity." §4.2: "Cloud computing has significant implications for the security of organizational data, regardless of which service model is used."
Configuration Examples(1)
NIST SP 800-125B §3.1: "Virtual networks must provide traffic isolation equivalent to physically separate networks." §4.1: "Segmentation should be based on the sensitivity of data handled and the trust level of workloads." §4.3: "Deny-by-default policies should be implemented where traffic is blocked unless explicitly allowed." AWS VPC security groups and NACLs implement these virtual network segmentation requirements.
Configuration Examples(2)
Official AWS security best practices framework. Design principles for identity, detection, infrastructure protection, data protection, and incident response.
Configuration Examples(10)
US government cloud security guidance applicable to AWS deployments. Covers shared responsibility, identity federation, and logging requirements.
CCM IVS (Infrastructure & Virtualization Security): "Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections." CCM IAM (Identity & Access Management): "User access shall be authorized through a formal access request process." CCM LOG (Logging & Monitoring): "Logging and monitoring shall be enabled within an organization." AWS services map to 17 CCM domains covering cloud security best practices. Source: CSA Cloud Controls Matrix v4.0.
SOC 2 CC6.6: "The entity implements logical access security measures to protect against threats from sources outside its system boundaries." CC6.7: "The entity restricts the transmission, movement, and removal of information to authorized internal and external users." CC7.1: "To meet its objectives, the entity uses detection and monitoring procedures." AWS implements infrastructure controls aligned with SOC 2 Common Criteria requirements. Source: AICPA TSC-NIST Mapping.
ISO 27001:2022 A.5.23: "Information security requirements for cloud services shall be established." A.8.22: "Networks shall be segregated from each other based on types of information services." A.8.15: "Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected and analyzed." AWS security features support ISO 27001 cloud security requirements. Source: NIST OLIR Informative Reference Catalog.
Security Topics
Detailed guidance organized by security domain. Each topic includes authoritative sources, configuration responsibilities, and verification commands.
Root Security
FedRAMP RSC guidance for securing AWS root account operations, recovery settings, and organizational controls
Privileged Accounts
FedRAMP RSC guidance for managing privileged access, role-based controls, and administrative account lifecycle
Top-Level Admin
FedRAMP RSC guidance for top-level administrative account security, MFA enforcement, and audit logging
Amazon EC2
FedRAMP RSC secure configuration for EC2 instances including OS hardening, encryption, and network controls
Amazon RDS
FedRAMP RSC secure configuration for RDS databases including encryption, access management, and audit logging
Aurora MySQL
FedRAMP RSC secure configuration for Aurora MySQL including encryption, parameter groups, and monitoring
Aurora PostgreSQL
FedRAMP RSC secure configuration for Aurora PostgreSQL including SSL enforcement, logging, and access controls
DocumentDB
FedRAMP RSC secure configuration for DocumentDB including TLS enforcement, encryption, and audit logging
Neptune
FedRAMP RSC secure configuration for Neptune graph database including encryption, IAM auth, and network isolation
Verification Commands
Commands and queries for testing and verifying security configurations.
aws iam list-users --query "Users[*].{UserName:UserName,CreateDate:CreateDate}" aws iam generate-credential-report && sleep 5 && aws iam get-credential-report --output text --query Content | base64 -d aws iam get-account-summary --query "SummaryMap.AccountMFAEnabled" aws s3api list-buckets --query "Buckets[].Name" --output text | xargs -I {} aws s3api get-public-access-block --bucket {} 2>/dev/null || echo "Check failed" aws cloudtrail describe-trails --query "trailList[*].{Name:Name,IsMultiRegion:IsMultiRegionTrail,IsLogging:IsLogging}" aws ec2 describe-security-groups --filters "Name=ip-permission.cidr,Values=0.0.0.0/0" --query "SecurityGroups[*].{ID:GroupId,Name:GroupName}" aws securityhub get-findings --filters '{"ComplianceStatus":[{"Value":"FAILED","Comparison":"EQUALS"}]}' --max-items 10 aws s3api get-bucket-encryption --bucket BUCKET-NAME aws s3control get-public-access-block --account-id $(aws sts get-caller-identity --query Account --output text) aws configservice describe-conformance-pack-compliance --conformance-pack-name AWS-CIS-Benchmark-v5.0 aws ec2 describe-volumes --filters "Name=encrypted,Values=false" --query "Volumes[*].{ID:VolumeId,Size:Size}" aws iam list-users --query "Users[?PasswordLastUsed!=null].UserName" --output text | xargs -I {} sh -c 'aws iam list-mfa-devices --user-name {} --query "MFADevices" --output text | grep -q . || echo "No MFA: {}"' aws guardduty list-detectors --query "DetectorIds" --output text | xargs -I {} aws guardduty get-detector --detector-id {} --query "{Status:Status,FindingPublishingFrequency:FindingPublishingFrequency}" Related Controls
Security controls from various frameworks that relate to AWS.