Under active development Content is continuously updated and improved

AWS

by Amazon Web Services, Inc.

Comprehensive cloud platform with integrated security services for identity, network, data, and workload protection

Official Docs

Under Construction: This guidance is being actively developed and verified. Content may change.

Overview

Security configuration baseline for AWS accounts. Covers IAM, storage, logging, monitoring, networking. 40+ automated checks available via AWS Security Hub.

Configuration Examples(5)

·

Defines IaaS: "The consumer is able to deploy and run arbitrary software... has control over operating systems, storage, and deployed applications." AWS operates under the shared responsibility model where AWS secures the infrastructure and customers secure their workloads.

Configuration Examples(2)

·

§5.3.6: "Keys should have a limited cryptoperiod to limit the amount of data protected by a single key." §8.1.5: "Key establishment provides cryptographic keys to entities that will use them for cryptographic operations." AWS KMS implements these requirements with automatic key rotation and secure key generation.

Configuration Examples(1)

·

NIST SP 800-144 Executive Summary: "Carefully plan the security and privacy aspects of cloud computing solutions before engaging them." §3.2: "Assurances furnished by the cloud provider to support security or privacy claims should be verified whenever possible through independent assessment." §4.7: "Organizations should employ appropriate safeguards to protect data in transit and at rest." §4.5: "Identity and access management requires establishing trust in user identities and controlling access to resources based on the authenticated identity." §4.2: "Cloud computing has significant implications for the security of organizational data, regardless of which service model is used."

Configuration Examples(1)

·

NIST SP 800-125B §3.1: "Virtual networks must provide traffic isolation equivalent to physically separate networks." §4.1: "Segmentation should be based on the sensitivity of data handled and the trust level of workloads." §4.3: "Deny-by-default policies should be implemented where traffic is blocked unless explicitly allowed." AWS VPC security groups and NACLs implement these virtual network segmentation requirements.

Configuration Examples(2)

·

Official AWS security best practices framework. Design principles for identity, detection, infrastructure protection, data protection, and incident response.

Configuration Examples(10)

·

US government cloud security guidance applicable to AWS deployments. Covers shared responsibility, identity federation, and logging requirements.

CCM IVS (Infrastructure & Virtualization Security): "Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections." CCM IAM (Identity & Access Management): "User access shall be authorized through a formal access request process." CCM LOG (Logging & Monitoring): "Logging and monitoring shall be enabled within an organization." AWS services map to 17 CCM domains covering cloud security best practices. Source: CSA Cloud Controls Matrix v4.0.

SOC 2 CC6.6: "The entity implements logical access security measures to protect against threats from sources outside its system boundaries." CC6.7: "The entity restricts the transmission, movement, and removal of information to authorized internal and external users." CC7.1: "To meet its objectives, the entity uses detection and monitoring procedures." AWS implements infrastructure controls aligned with SOC 2 Common Criteria requirements. Source: AICPA TSC-NIST Mapping.

ISO 27001:2022 A.5.23: "Information security requirements for cloud services shall be established." A.8.22: "Networks shall be segregated from each other based on types of information services." A.8.15: "Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected and analyzed." AWS security features support ISO 27001 cloud security requirements. Source: NIST OLIR Informative Reference Catalog.

Security Topics

Detailed guidance organized by security domain. Each topic includes authoritative sources, configuration responsibilities, and verification commands.

Verification Commands

Commands and queries for testing and verifying security configurations.

List all IAM users CLI
aws iam list-users --query "Users[*].{UserName:UserName,CreateDate:CreateDate}"
Generate credential report for user activity CLI
aws iam generate-credential-report && sleep 5 && aws iam get-credential-report --output text --query Content | base64 -d
Check MFA on root account CLI
aws iam get-account-summary --query "SummaryMap.AccountMFAEnabled"
List S3 buckets with public access CLI
aws s3api list-buckets --query "Buckets[].Name" --output text | xargs -I {} aws s3api get-public-access-block --bucket {} 2>/dev/null || echo "Check failed"
Check CloudTrail status CLI
aws cloudtrail describe-trails --query "trailList[*].{Name:Name,IsMultiRegion:IsMultiRegionTrail,IsLogging:IsLogging}"
Find security groups with 0.0.0.0/0 ingress CLI
aws ec2 describe-security-groups --filters "Name=ip-permission.cidr,Values=0.0.0.0/0" --query "SecurityGroups[*].{ID:GroupId,Name:GroupName}"
Get Security Hub compliance summary CLI
aws securityhub get-findings --filters '{"ComplianceStatus":[{"Value":"FAILED","Comparison":"EQUALS"}]}' --max-items 10
Check S3 bucket encryption status CLI
aws s3api get-bucket-encryption --bucket BUCKET-NAME
Verify S3 Block Public Access account setting CLI
aws s3control get-public-access-block --account-id $(aws sts get-caller-identity --query Account --output text)
Run AWS Config conformance pack evaluation CLI
aws configservice describe-conformance-pack-compliance --conformance-pack-name AWS-CIS-Benchmark-v5.0
Check for unencrypted EBS volumes CLI
aws ec2 describe-volumes --filters "Name=encrypted,Values=false" --query "Volumes[*].{ID:VolumeId,Size:Size}"
Find IAM users with console access but no MFA CLI
aws iam list-users --query "Users[?PasswordLastUsed!=null].UserName" --output text | xargs -I {} sh -c 'aws iam list-mfa-devices --user-name {} --query "MFADevices" --output text | grep -q . || echo "No MFA: {}"'
Check GuardDuty detector status CLI
aws guardduty list-detectors --query "DetectorIds" --output text | xargs -I {} aws guardduty get-detector --detector-id {} --query "{Status:Status,FindingPublishingFrequency:FindingPublishingFrequency}"

Related Controls

Security controls from various frameworks that relate to AWS.

Related Technologies