Prowler 5.23.0
Test results for this specific product, vendor, and version combination
| Vendor | Prowler |
| Product | Prowler |
| Version | 5.23.0 |
Download Raw Results
Download the original OCSF or HTML result files used to generate this page
Test Summary
Aggregate summary of all tests for this configuration result
| Resources In Configuration | 64 |
| Count of Tests | 199 |
| Passing Tests | 85 |
| Failing Tests | 114 |
| Catalogs Tested |
Control Catalog Summary
Summary of test results grouped by control catalog and resource
| Control Catalog | Resources | Total Tests | Passing | Failing | Tested Requirements | Missing Requirements | Unused Core Requirements |
|---|---|---|---|---|---|---|---|
| CCC.AuditLog | /aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c...211203495394 | 55 | 10 | 45 | None | ||
| CCC.Core | /aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c...211203495394<root_account>AWSResourceExplorerS...AWSSupportServiceRol...AWSTrustedAdvisorSer...AdministratorAccessCN03PeeringGuardrailElastiCacheServiceRo...TerraformRoleanalyzer/unknowncfi-1775705443-cn04-...cfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...cfi-1775706869-cn04-...cfi-1775707735-cn04-...cfi-1775707735-cn04-...cfi-1775708371-cn04-...cfi-1775708371-cn04-...cfi-1775708863-cn04-...cfi-1775708863-cn04-...cfi-1775709103-cn04-...cfi-1775709103-cn04-...cfi-1775709431-cn04-...cfi-1775709431-cn04-...cfi-1775709523-cn04-...cfi-1775709523-cn04-...defaulti-006bedcd8ca170316i-0242490a1db448d4ci-057e48ba6243cde84i-0ccc8234d44434f1dterraform-userterraform-user/Admin...unknown | 175 | 73 | 102 | CCC.Core.CN01.AR02CCC.Core.CN02.AR01CCC.Core.CN03.AR01CCC.Core.CN03.AR02CCC.Core.CN03.AR03CCC.Core.CN03.AR04CCC.Core.CN04.AR01CCC.Core.CN04.AR02CCC.Core.CN04.AR03CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR03CCC.Core.CN05.AR04CCC.Core.CN05.AR06CCC.Core.CN06.AR01CCC.Core.CN06.AR02CCC.Core.CN08.AR01CCC.Core.CN09.AR01CCC.Core.CN09.AR02CCC.Core.CN09.AR03CCC.Core.CN14.AR02 | ||
| CCC.KeyMgmt | cfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...cfi-1775707735-cn04-...cfi-1775708371-cn04-...cfi-1775708863-cn04-...cfi-1775709103-cn04-...cfi-1775709431-cn04-...cfi-1775709523-cn04-... | 10 | 10 | 0 | None | ||
| CCC.LB | 211203495394AWSResourceExplorerS...AWSSupportServiceRol...AWSTrustedAdvisorSer...AdministratorAccessCN03PeeringGuardrailElastiCacheServiceRo...TerraformRolecfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...cfi-1775707735-cn04-...cfi-1775708371-cn04-...cfi-1775708863-cn04-...cfi-1775709103-cn04-...cfi-1775709431-cn04-...cfi-1775709523-cn04-...terraform-userterraform-user/Admin... | 53 | 48 | 5 | None | ||
| CCC.Logging | /aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c...211203495394 | 51 | 0 | 51 | None | ||
| CCC.Monitor | /aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c.../aws/vpc/flow-logs/c...211203495394<root_account>cfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...cfi-1775707735-cn04-...cfi-1775708371-cn04-...cfi-1775708863-cn04-...cfi-1775709103-cn04-...cfi-1775709431-cn04-...cfi-1775709523-cn04-...terraform-user/Admin... | 70 | 31 | 39 | None | ||
| CCC.Vector | CN03PeeringGuardrailTerraformRolecfi-1775705443-cn04-...cfi-1775706318-cn04-...cfi-1775706481-cn04-...cfi-1775706869-cn04-...cfi-1775707735-cn04-...cfi-1775708371-cn04-...cfi-1775708863-cn04-...cfi-1775709103-cn04-...cfi-1775709431-cn04-...cfi-1775709523-cn04-...terraform-userterraform-user/Admin... | 35 | 32 | 3 | None |
Test Mapping Summary
Summary of test mappings showing how event codes map to test requirements
| Control Catalog | Test Requirement | Mapped Tests (Event Code | Total | Passing | Failing) |
|---|---|---|
| CCC.AuditLog | CCC.AuditLog.CN02.AR01 When a manual action is performed to generate each audit log type,
then the corresponding audit log type MUST be generated and recorded.
| cloudtrail_multi_region_enabled17017 cloudtrail_multi_region_enabled_logging_management_events17017 |
| CCC.AuditLog | CCC.AuditLog.CN03.AR01 When an attempt is made to disable a log source, then an alert MUST be generated.
| cloudtrail_multi_region_enabled17017 cloudtrail_multi_region_enabled_logging_management_events17017 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 |
| CCC.AuditLog | CCC.AuditLog.CN03.AR02 When an attempt is made to alter the retention or object lock status
of an external data log source or bucket, then an alert MUST be generated.
| cloudwatch_changes_to_network_acls_alarm_configured101 cloudwatch_changes_to_network_gateways_alarm_configured101 cloudwatch_changes_to_network_route_tables_alarm_configured101 cloudwatch_changes_to_vpcs_alarm_configured101 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 cloudwatch_log_metric_filter_aws_organizations_changes101 cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk101 cloudwatch_log_metric_filter_for_s3_bucket_policy_changes101 cloudwatch_log_metric_filter_policy_changes101 cloudwatch_log_metric_filter_security_group_changes101 cloudwatch_log_metric_filter_unauthorized_api_calls101 |
| CCC.AuditLog | CCC.AuditLog.CN04.AR01 When audit log buckets are created then verify that server access
logging MUST be enabled for the audit log bucket,
with logs delivered to a separate, secure logging bucket.
| cloudwatch_log_group_not_publicly_accessible10100 |
| CCC.AuditLog | CCC.AuditLog.CN05.AR01 When audit logs are exported, then audit logs MUST be present in the configured data location.
| cloudtrail_multi_region_enabled17017 cloudtrail_multi_region_enabled_logging_management_events17017 |
| CCC.AuditLog | CCC.AuditLog.CN09.AR01 When restricted fields are accessed by unauthorized users, then those fields MUST remain masked.
| cloudwatch_log_group_not_publicly_accessible10100 |
| CCC.Core | CCC.Core.CN01.AR02 When a port is exposed for SSH network traffic, all traffic MUST
include a SSH handshake AND be encrypted using SSHv2 or higher.
| ec2_instance_port_ssh_exposed_to_internet440 |
| CCC.Core | CCC.Core.CN02.AR01 When data is stored, it MUST be encrypted using the latest
industry-standard encryption methods.
| cloudwatch_log_group_kms_encryption_enabled10010 |
| CCC.Core | CCC.Core.CN03.AR01 When an entity attempts to modify the service through a user
interface, the authentication process MUST require multiple
identifying factors for authentication.
| iam_root_hardware_mfa_enabled101 iam_root_mfa_enabled110 iam_user_mfa_enabled_console_access110 |
| CCC.Core | CCC.Core.CN03.AR02 When an entity attempts to modify the service through an API
endpoint, the authentication process MUST require a credential
such as an API key or token AND originate from within the trust
perimeter.
| iam_root_hardware_mfa_enabled101 iam_root_mfa_enabled110 iam_user_mfa_enabled_console_access110 |
| CCC.Core | CCC.Core.CN03.AR03 When an entity attempts to view information on the service through
a user interface, the authentication process MUST require multiple
identifying factors from the user.
| iam_root_hardware_mfa_enabled101 iam_root_mfa_enabled110 iam_user_hardware_mfa_enabled101 iam_user_mfa_enabled_console_access110 |
| CCC.Core | CCC.Core.CN03.AR04 When an entity attempts to view information on the service through
an API endpoint, the authentication process MUST require a
credential such as an API key or token AND originate from within
the trust perimeter.
| iam_root_hardware_mfa_enabled101 iam_root_mfa_enabled110 iam_user_hardware_mfa_enabled101 iam_user_mfa_enabled_console_access110 |
| CCC.Core | CCC.Core.CN04.AR01 When administrative access or configuration change is attempted on
the service or a child resource, the service MUST log the client
identity, time, and result of the attempt.
| cloudtrail_multi_region_enabled17017 cloudwatch_changes_to_network_acls_alarm_configured101 cloudwatch_changes_to_network_gateways_alarm_configured101 cloudwatch_changes_to_network_route_tables_alarm_configured101 cloudwatch_changes_to_vpcs_alarm_configured101 cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled101 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 cloudwatch_log_metric_filter_authentication_failures101 cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk101 cloudwatch_log_metric_filter_for_s3_bucket_policy_changes101 cloudwatch_log_metric_filter_policy_changes101 cloudwatch_log_metric_filter_root_usage101 cloudwatch_log_metric_filter_security_group_changes101 cloudwatch_log_metric_filter_sign_in_without_mfa101 cloudwatch_log_metric_filter_unauthorized_api_calls101 |
| CCC.Core | CCC.Core.CN04.AR02 When any attempt is made to modify data on the service or a child
resource, the service MUST log the client identity, time, and
result of the attempt.
| cloudtrail_multi_region_enabled_logging_management_events17017 |
| CCC.Core | CCC.Core.CN04.AR03 When any attempt is made to read data on the service or a child
resource, the service MUST log the client identity, time, and
result of the attempt.
| cloudtrail_multi_region_enabled17017 cloudwatch_log_group_kms_encryption_enabled10010 cloudwatch_log_group_not_publicly_accessible10100 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 cloudwatch_log_metric_filter_authentication_failures101 |
| CCC.Core | CCC.Core.CN05.AR01 When an attempt is made to modify data on the service or a child
resource, the service MUST block requests from unauthorized
entities.
| iam_inline_policy_no_full_access_to_cloudtrail10100 iam_inline_policy_no_full_access_to_kms10100 iam_policy_attached_only_to_group_or_roles101 iam_policy_no_full_access_to_cloudtrail110 iam_policy_no_full_access_to_kms110 iam_role_administratoraccess_policy101 iam_role_cross_account_readonlyaccess_policy110 iam_role_cross_service_confused_deputy_prevention10010 iam_user_administrator_access_policy101 |
| CCC.Core | CCC.Core.CN05.AR02 When administrative access or configuration change is attempted on
the service or a child resource, the service MUST refuse requests
from unauthorized entities.
| iam_avoid_root_usage101 iam_aws_attached_policy_no_administrative_privileges541 iam_check_saml_providers_sts101 iam_customer_attached_policy_no_administrative_privileges110 iam_inline_policy_allows_privilege_escalation10100 iam_inline_policy_no_full_access_to_cloudtrail10100 iam_inline_policy_no_full_access_to_kms10100 iam_password_policy_expires_passwords_within_90_days_or_less101 iam_password_policy_lowercase101 iam_password_policy_minimum_length_14101 iam_password_policy_number101 iam_password_policy_reuse_24101 iam_password_policy_symbol101 iam_password_policy_uppercase101 iam_policy_allows_privilege_escalation110 iam_policy_attached_only_to_group_or_roles101 iam_policy_no_full_access_to_cloudtrail110 iam_policy_no_full_access_to_kms110 iam_role_administratoraccess_policy101 iam_root_hardware_mfa_enabled101 iam_root_mfa_enabled110 iam_user_mfa_enabled_console_access110 |
| CCC.Core | CCC.Core.CN05.AR03 When administrative access or configuration change is attempted on
the service or a child resource in a multi-tenant environment, the
service MUST refuse requests across tenant boundaries unless the
origin is explicitly included in a pre-approved allowlist.
| eventbridge_bus_cross_account_access17170 iam_role_cross_account_readonlyaccess_policy110 iam_role_cross_service_confused_deputy_prevention10010 |
| CCC.Core | CCC.Core.CN05.AR04 When data is requested from outside the trust perimeter, the
service MUST refuse requests from unauthorized entities.
| accessanalyzer_enabled17017 iam_inline_policy_allows_privilege_escalation10100 iam_inline_policy_no_full_access_to_cloudtrail10100 iam_inline_policy_no_full_access_to_kms10100 iam_policy_attached_only_to_group_or_roles101 iam_policy_no_full_access_to_cloudtrail110 iam_policy_no_full_access_to_kms110 iam_user_administrator_access_policy101 iam_user_mfa_enabled_console_access110 |
| CCC.Core | CCC.Core.CN05.AR06 When any request is made to the service or a child resource, the
service MUST refuse requests from unauthorized entities.
| iam_check_saml_providers_sts101 iam_no_root_access_key110 iam_policy_attached_only_to_group_or_roles101 iam_role_cross_account_readonlyaccess_policy110 iam_role_cross_service_confused_deputy_prevention10010 iam_root_hardware_mfa_enabled101 iam_root_mfa_enabled110 iam_user_hardware_mfa_enabled101 iam_user_mfa_enabled_console_access110 |
| CCC.Core | CCC.Core.CN06.AR01 When the service is running, its region and availability zone MUST
be included in a list of explicitly trusted or approved locations
within the trust perimeter.
| organizations_scp_check_deny_regions101 |
| CCC.Core | CCC.Core.CN06.AR02 When a child resource is deployed, its region and availability
zone MUST be included in a list of explicitly trusted or approved
locations within the trust perimeter.
| organizations_scp_check_deny_regions101 |
| CCC.Core | CCC.Core.CN08.AR01 When data is created or modified, the data MUST have a complete
and recoverable duplicate that is stored in a physically separate
data center.
| backup_vaults_exist101 cloudtrail_multi_region_enabled17017 |
| CCC.Core | CCC.Core.CN09.AR01 When the service is operational, its logs and any child resource
logs MUST NOT be accessible from the resource they record access
to.
| cloudtrail_multi_region_enabled17017 |
| CCC.Core | CCC.Core.CN09.AR02 When the service is operational, disabling the logs for the service
or its child resources MUST NOT be possible without also disabling
the corresponding resource.
| cloudwatch_log_group_not_publicly_accessible10100 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 |
| CCC.Core | CCC.Core.CN09.AR03 When the service is operational, any attempt to redirect logs for
the service or its child resources MUST NOT be possible without
halting operation of the corresponding resource and publishing
corresponding events to monitored channels.
| cloudwatch_changes_to_network_acls_alarm_configured101 cloudwatch_changes_to_network_gateways_alarm_configured101 cloudwatch_changes_to_network_route_tables_alarm_configured101 cloudwatch_changes_to_vpcs_alarm_configured101 cloudwatch_log_group_kms_encryption_enabled10010 cloudwatch_log_group_not_publicly_accessible10100 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 |
| CCC.Core | CCC.Core.CN14.AR02 When backups are created for disaster recovery purposes, the
most recent backup MUST have a creation date within the past
30 days.
| backup_vaults_exist202 |
| CCC.KeyMgmt | CCC.KeyMgmt.CN02.AR01 When IAM roles and key policies are reviewed, Decrypt permission
MUST be granted exclusively to documented authorised principals.
| iam_inline_policy_no_full_access_to_kms10100 |
| CCC.LB | CCC.LB.CN04.AR01 When routing weights change, the request MUST originate
from an explicitly defined and trusted identity and MUST
be logged.
| cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 iam_policy_attached_only_to_group_or_roles101 iam_role_administratoraccess_policy101 iam_user_administrator_access_policy101 |
| CCC.LB | CCC.LB.CN05.AR01 When stickiness is enabled, session cookies MUST expire
within 30 minutes of inactivity.
| iam_aws_attached_policy_no_administrative_privileges541 iam_customer_attached_policy_no_administrative_privileges110 iam_inline_policy_allows_privilege_escalation10100 iam_inline_policy_no_administrative_privileges10100 iam_inline_policy_no_full_access_to_cloudtrail10100 iam_inline_policy_no_full_access_to_kms10100 iam_policy_allows_privilege_escalation110 iam_policy_attached_only_to_group_or_roles101 iam_policy_no_full_access_to_cloudtrail110 iam_policy_no_full_access_to_kms110 iam_role_administratoraccess_policy101 iam_user_administrator_access_policy101 |
| CCC.Logging | CCC.Logging.CN01.AR01 When a new cloud account is created, provider-level audit and network flow logging MUST be
enabled by default and directed to the central sink.
| cloudtrail_multi_region_enabled17017 |
| CCC.Logging | CCC.Logging.CN01.AR02 When a new cloud compute resource is deployed, it MUST be configured to forward all relevant
logs (e.g., OS, application, service logs) to the central log sink.
| cloudtrail_multi_region_enabled17017 cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled101 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 cloudwatch_log_metric_filter_for_s3_bucket_policy_changes101 |
| CCC.Logging | CCC.Logging.CN02.AR01 When a new log bucket or stream is created, its retention policy MUST be configured
in accordance with organisation's data retention policy.
| cloudwatch_log_group_retention_policy_specific_days_enabled10010 |
| CCC.Logging | CCC.Logging.CN02.AR02 When a query is performed to retrieve log events older than the number of days defined
in the organisation's data retention policy, it MUST return an empty result.
| cloudwatch_log_group_retention_policy_specific_days_enabled10010 |
| CCC.Logging | CCC.Logging.CN05.AR01 When a log storage bucket is created, the bucket's access control settings MUST
explicitly deny public read and write access.
| cloudtrail_multi_region_enabled17017 |
| CCC.Logging | CCC.Logging.CN07.AR01 When an audit log event is recorded that corresponds to a modification of the logging service
configuration such as disabling a log trail, deleting a log sink, or altering a log forwarding rule,
an alert MUST be generated.
| cloudtrail_multi_region_enabled_logging_management_events17017 cloudwatch_changes_to_network_acls_alarm_configured101 cloudwatch_changes_to_network_gateways_alarm_configured101 cloudwatch_changes_to_network_route_tables_alarm_configured101 cloudwatch_changes_to_vpcs_alarm_configured101 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 |
| CCC.Monitor | CCC.Monitor.CN01.AR01 When an External Monitoring system exceeds the anticipated rate of monitoring checks then
Rate Limiting MUST be applied and an Audit Alert MUST be generated.
| cloudtrail_multi_region_enabled_logging_management_events17017 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 |
| CCC.Monitor | CCC.Monitor.CN02.AR01 When an Custom or User-Defined Metric starts to flood a collector, then a rate limit MUST be applied
to reduce the network impact of traffic and an alert must triggered.
| cloudwatch_changes_to_network_acls_alarm_configured101 cloudwatch_changes_to_network_gateways_alarm_configured101 cloudwatch_changes_to_network_route_tables_alarm_configured101 cloudwatch_changes_to_vpcs_alarm_configured101 cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled101 cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled101 cloudwatch_log_metric_filter_authentication_failures101 cloudwatch_log_metric_filter_for_s3_bucket_policy_changes101 cloudwatch_log_metric_filter_policy_changes101 cloudwatch_log_metric_filter_security_group_changes101 cloudwatch_log_metric_filter_unauthorized_api_calls101 |
| CCC.Monitor | CCC.Monitor.CN04.AR01 When monitoring dashboards display degraded services which may become potential targets then the
dashboard MUST be protected from unauthorised access.
| cloudwatch_log_group_kms_encryption_enabled10010 cloudwatch_log_group_not_publicly_accessible10100 |
| CCC.Monitor | CCC.Monitor.CN05.AR01 When monitoring services have generated an alert, the service MUST ensure only authorised
responders silence or acknowledge the alert.
| iam_inline_policy_allows_privilege_escalation10100 iam_inline_policy_no_full_access_to_cloudtrail10100 iam_policy_attached_only_to_group_or_roles101 iam_root_mfa_enabled110 |
| CCC.Monitor | CCC.Monitor.CN06.AR01 When systems push metrics or traces they MUST be authenticated for that particular type of metric or trace
| cloudwatch_log_group_not_publicly_accessible10100 |
| CCC.ObjStor | CCC.ObjStor.CN01.AR01 Description not available | iam_policy_no_full_access_to_kms110 |
| CCC.ObjStor | CCC.ObjStor.CN01.AR02 Description not available | iam_inline_policy_no_full_access_to_kms10100 iam_policy_no_full_access_to_kms110 |
| CCC.ObjStor | CCC.ObjStor.CN01.AR03 Description not available | iam_policy_no_full_access_to_kms110 |
| CCC.ObjStor | CCC.ObjStor.CN01.AR04 Description not available | iam_inline_policy_no_full_access_to_kms10100 iam_policy_no_full_access_to_kms110 |
| CCC.ObjStor | CCC.ObjStor.CN05.AR02 Description not available | iam_rotate_access_key_90_days211 |
| CCC.Vector | CCC.Vector.CN02.AR01 When an index lifecycle event is triggered, the service MUST
verify that the actor has explicit permissions for the operation type.
| iam_customer_attached_policy_no_administrative_privileges110 iam_inline_policy_allows_privilege_escalation10100 iam_inline_policy_no_full_access_to_cloudtrail10100 iam_inline_policy_no_full_access_to_kms10100 iam_no_custom_policy_permissive_role_assumption110 iam_policy_attached_only_to_group_or_roles101 iam_role_administratoraccess_policy101 iam_user_administrator_access_policy101 |
Resource Summary
Summary of all resources mentioned in OCSF results
| Resource Name | Resource Type | Control Catalogs | Total Tests | Passing | Failing |
|---|---|---|---|---|---|
/aws/vpc/flow-logs/cfi-1775705443-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775705443-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
/aws/vpc/flow-logs/cfi-1775706318-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775706318-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
/aws/vpc/flow-logs/cfi-1775706481-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775706481-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
/aws/vpc/flow-logs/cfi-1775706869-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775706869-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
/aws/vpc/flow-logs/cfi-1775707735-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775707735-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
/aws/vpc/flow-logs/cfi-1775708371-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775708371-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
/aws/vpc/flow-logs/cfi-1775708863-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775708863-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
/aws/vpc/flow-logs/cfi-1775709103-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775709103-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
/aws/vpc/flow-logs/cfi-1775709431-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775709431-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
/aws/vpc/flow-logs/cfi-1775709523-vpc | Other | 3 | 2 | 1 | |
/aws/vpc/flow-logs/cfi-1775709523-vpc | AwsLogsLogGroup | 1 | 0 | 1 | |
<root_account> | AwsIamUser | 7 | 5 | 2 | |
<root_account> | AwsIamAccessKey | 1 | 1 | 0 | |
211203495394 | Other | 60 | 17 | 39 | |
211203495394 | AwsBackupBackupVault | 1 | 0 | 1 | |
211203495394 | AwsCloudTrailTrail | 34 | 0 | 34 | |
211203495394 | AwsCloudWatchAlarm | 15 | 0 | 15 | |
211203495394 | AwsIamRole | No CCC catalogs | 2 | 1 | 1 |
211203495394 | AwsEc2Instance | No CCC catalogs | 1 | 0 | 1 |
211203495394 | AwsIamPolicy | 8 | 1 | 7 | |
211203495394 | AwsEc2Vpc | No CCC catalogs | 1 | 0 | 1 |
AdministratorAccess | AwsIamPolicy | 1 | 0 | 1 | |
analyzer/unknown | Other | 17 | 0 | 17 | |
AWSResourceExplorerServiceRolePolicy | AwsIamPolicy | 1 | 1 | 0 | |
AWSSupportServiceRolePolicy | AwsIamPolicy | 1 | 1 | 0 | |
AWSTrustedAdvisorServiceRolePolicy | AwsIamPolicy | 1 | 1 | 0 | |
cfi-1775705443-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
cfi-1775706318-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
cfi-1775706481-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
cfi-1775706869-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
cfi-1775707735-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775707735-cn04-flowlogs-role/cfi-1775707735-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
cfi-1775708371-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775708371-cn04-flowlogs-role/cfi-1775708371-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
cfi-1775708863-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775708863-cn04-flowlogs-role/cfi-1775708863-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
cfi-1775709103-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775709103-cn04-flowlogs-role/cfi-1775709103-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
cfi-1775709431-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775709431-cn04-flowlogs-role/cfi-1775709431-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
cfi-1775709523-cn04-flowlogs-role | AwsIamRole | 1 | 0 | 1 | |
cfi-1775709523-cn04-flowlogs-role/cfi-1775709523-cn04-flowlogs-role-policy | AwsIamPolicy | 4 | 4 | 0 | |
CN03PeeringGuardrail | AwsIamPolicy | 5 | 5 | 0 | |
default | AwsEventsEventbus | 34 | 34 | 0 | |
detector/unknown | AwsGuardDutyDetector | No CCC catalogs | 34 | 0 | 34 |
ElastiCacheServiceRolePolicy | AwsIamPolicy | 1 | 1 | 0 | |
hub/unknown | Other | No CCC catalogs | 17 | 0 | 17 |
i-006bedcd8ca170316 | AwsEc2Instance | 22 | 21 | 1 | |
i-0242490a1db448d4c | AwsEc2Instance | 22 | 21 | 1 | |
i-057e48ba6243cde84 | AwsEc2Instance | 22 | 21 | 1 | |
i-0ccc8234d44434f1d | AwsEc2Instance | 22 | 21 | 1 | |
Inspector2 | Other | No CCC catalogs | 17 | 0 | 17 |
model-invocation-logging | Other | No CCC catalogs | 17 | 0 | 17 |
SecurityAudit | AwsIamPolicy | No CCC catalogs | 1 | 0 | 1 |
sg-00b9e822dd1afe7a5 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-03dbec7ac3e6755e2 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-06d6b075a896668a6 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-070f973bbeb764bae | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0d35b5c70a782c44c | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0db45c41119f49e95 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0f12b14f86e02edac | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
terraform-user | AwsIamUser | 8 | 5 | 3 | |
terraform-user-access-key-1 | AwsIamUser | 1 | 0 | 1 | |
terraform-user/AdministratorAccess | AwsIamUser | 1 | 0 | 1 | |
TerraformRole | AwsIamRole | 2 | 1 | 1 | |
unknown | Other | 4 | 0 | 4 |
Test Results
OCSF test results filtered for entries with CCC compliance mappings
| Status | Finding | Resource Name | Resource Type | Message | Test Requirements |
|---|---|---|---|---|---|
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | IAM Access Analyzer is enabled IAM Access Analyzer in account 211203495394 is not enabled. | analyzer/unknown | Other | IAM Access Analyzer in account 211203495394 is not enabled. | |
| FAIL | At least one AWS Backup vault exists No Backup Vault exist. | 211203495394 | AwsBackupBackupVault | No Backup Vault exist. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | Region has at least one CloudTrail trail logging No CloudTrail trails enabled with logging were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled with logging were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudTrail trail logs management events for read and write operations No CloudTrail trails enabled and logging management events were found. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails enabled and logging management events were found. | |
| FAIL | CloudWatch log metric filter and alarm exist for Network ACL (NACL) change events No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | CloudWatch Logs metric filter and alarm exist for changes to network gateways No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | Account monitors VPC route table changes with a CloudWatch Logs metric filter and alarm No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | AWS account has a CloudWatch Logs metric filter and alarm for VPC changes No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775705443-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc does not have AWS KMS keys associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775706318-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc does not have AWS KMS keys associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775706481-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc does not have AWS KMS keys associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775706869-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc does not have AWS KMS keys associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775707735-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775707735-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775707735-vpc does not have AWS KMS keys associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775708371-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775708371-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775708371-vpc does not have AWS KMS keys associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775708863-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775708863-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775708863-vpc does not have AWS KMS keys associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775709103-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775709103-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775709103-vpc does not have AWS KMS keys associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775709431-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775709431-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775709431-vpc does not have AWS KMS keys associated. | |
| FAIL | CloudWatch log group is encrypted with an AWS KMS key Log Group /aws/vpc/flow-logs/cfi-1775709523-vpc does not have AWS KMS keys associated. | /aws/vpc/flow-logs/cfi-1775709523-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775709523-vpc does not have AWS KMS keys associated. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775705443-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc is not publicly accessible. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775706318-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc is not publicly accessible. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775706481-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc is not publicly accessible. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775706869-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc is not publicly accessible. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775707735-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775707735-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775707735-vpc is not publicly accessible. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775708371-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775708371-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775708371-vpc is not publicly accessible. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775708863-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775708863-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775708863-vpc is not publicly accessible. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775709103-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775709103-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775709103-vpc is not publicly accessible. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775709431-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775709431-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775709431-vpc is not publicly accessible. | |
| PASS | CloudWatch Log Group is not publicly accessible Log Group /aws/vpc/flow-logs/cfi-1775709523-vpc is not publicly accessible. | /aws/vpc/flow-logs/cfi-1775709523-vpc | Other | Log Group /aws/vpc/flow-logs/cfi-1775709523-vpc is not publicly accessible. | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775705443-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775705443-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775706318-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775706318-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775706481-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775706481-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775706869-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775706869-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775707735-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775707735-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775707735-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775708371-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775708371-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775708371-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775708863-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775708863-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775708863-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775709103-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775709103-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775709103-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775709431-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775709431-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775709431-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch log group has a retention policy of at least the configured minimum days or never expires Log Group /aws/vpc/flow-logs/cfi-1775709523-vpc has less than 365 days retention period (7 days). | /aws/vpc/flow-logs/cfi-1775709523-vpc | AwsLogsLogGroup | Log Group /aws/vpc/flow-logs/cfi-1775709523-vpc has less than 365 days retention period (7 days). | |
| FAIL | CloudWatch Logs metric filter and alarm exist for AWS Config configuration changes No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | CloudWatch Logs metric filter and alarm exist for CloudTrail configuration changes No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | Account has a CloudWatch Logs metric filter and alarm for AWS Management Console authentication failures No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | CloudWatch Logs metric filter and alarm exist for AWS Organizations changes No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | Account has a CloudWatch log metric filter and alarm for disabling or scheduled deletion of customer-managed KMS keys No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | CloudWatch log metric filter and alarm exist for S3 bucket policy changes No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | CloudWatch Logs metric filter and alarm exist for IAM policy changes No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | Account has a CloudWatch Logs metric filter and alarm for root account usage No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | CloudWatch Logs metric filter and alarm exist for security group changes No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | CloudWatch log metric filter and alarm exist for Management Console sign-in without MFA No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| FAIL | CloudWatch Logs metric filter and alarm exist for unauthorized API calls No CloudWatch log groups found with metric filters or alarms associated. | 211203495394 | AwsCloudWatchAlarm | No CloudWatch log groups found with metric filters or alarms associated. | |
| PASS | EC2 instance does not allow ingress from the Internet to TCP port 22 (SSH) Instance i-006bedcd8ca170316 does not have SSH port 22 open to the Internet. | i-006bedcd8ca170316 | AwsEc2Instance | Instance i-006bedcd8ca170316 does not have SSH port 22 open to the Internet. | |
| PASS | EC2 instance does not allow ingress from the Internet to TCP port 22 (SSH) Instance i-0ccc8234d44434f1d does not have SSH port 22 open to the Internet. | i-0ccc8234d44434f1d | AwsEc2Instance | Instance i-0ccc8234d44434f1d does not have SSH port 22 open to the Internet. | |
| PASS | EC2 instance does not allow ingress from the Internet to TCP port 22 (SSH) Instance i-057e48ba6243cde84 does not have SSH port 22 open to the Internet. | i-057e48ba6243cde84 | AwsEc2Instance | Instance i-057e48ba6243cde84 does not have SSH port 22 open to the Internet. | |
| PASS | EC2 instance does not allow ingress from the Internet to TCP port 22 (SSH) Instance i-0242490a1db448d4c does not have SSH port 22 open to the Internet. | i-0242490a1db448d4c | AwsEc2Instance | Instance i-0242490a1db448d4c does not have SSH port 22 open to the Internet. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| PASS | AWS EventBridge event bus does not allow cross-account access EventBridge event bus default does not allow cross-account access. | default | AwsEventsEventbus | EventBridge event bus default does not allow cross-account access. | |
| FAIL | AWS account root user has not been used in the last day Root user in the account was last accessed 0 days ago. | <root_account> | AwsIamUser | Root user in the account was last accessed 0 days ago. | |
| PASS | Attached AWS-managed IAM policy does not allow '*:*' administrative privileges AWS policy ElastiCacheServiceRolePolicy is attached but does not allow '*:*' administrative privileges. | ElastiCacheServiceRolePolicy | AwsIamPolicy | AWS policy ElastiCacheServiceRolePolicy is attached but does not allow '*:*' administrative privileges. | |
| PASS | Attached AWS-managed IAM policy does not allow '*:*' administrative privileges AWS policy AWSTrustedAdvisorServiceRolePolicy is attached but does not allow '*:*' administrative privileges. | AWSTrustedAdvisorServiceRolePolicy | AwsIamPolicy | AWS policy AWSTrustedAdvisorServiceRolePolicy is attached but does not allow '*:*' administrative privileges. | |
| FAIL | Attached AWS-managed IAM policy does not allow '*:*' administrative privileges AWS policy AdministratorAccess is attached and allows '*:*' administrative privileges. | AdministratorAccess | AwsIamPolicy | AWS policy AdministratorAccess is attached and allows '*:*' administrative privileges. | |
| PASS | Attached AWS-managed IAM policy does not allow '*:*' administrative privileges AWS policy AWSSupportServiceRolePolicy is attached but does not allow '*:*' administrative privileges. | AWSSupportServiceRolePolicy | AwsIamPolicy | AWS policy AWSSupportServiceRolePolicy is attached but does not allow '*:*' administrative privileges. | |
| PASS | Attached AWS-managed IAM policy does not allow '*:*' administrative privileges AWS policy AWSResourceExplorerServiceRolePolicy is attached but does not allow '*:*' administrative privileges. | AWSResourceExplorerServiceRolePolicy | AwsIamPolicy | AWS policy AWSResourceExplorerServiceRolePolicy is attached but does not allow '*:*' administrative privileges. | |
| FAIL | IAM SAML provider exists in the account No SAML Providers found. | 211203495394 | Other | No SAML Providers found. | |
| PASS | Attached IAM customer-managed policy does not allow '*:*' administrative privileges Custom policy CN03PeeringGuardrail is attached but does not allow '*:*' administrative privileges. | CN03PeeringGuardrail | AwsIamPolicy | Custom policy CN03PeeringGuardrail is attached but does not allow '*:*' administrative privileges. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775707735-cn04-flowlogs-role-policy attached to role cfi-1775707735-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775707735-cn04-flowlogs-role/cfi-1775707735-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775707735-cn04-flowlogs-role-policy attached to role cfi-1775707735-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775708371-cn04-flowlogs-role-policy attached to role cfi-1775708371-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775708371-cn04-flowlogs-role/cfi-1775708371-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775708371-cn04-flowlogs-role-policy attached to role cfi-1775708371-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775708863-cn04-flowlogs-role-policy attached to role cfi-1775708863-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775708863-cn04-flowlogs-role/cfi-1775708863-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775708863-cn04-flowlogs-role-policy attached to role cfi-1775708863-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775709103-cn04-flowlogs-role-policy attached to role cfi-1775709103-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775709103-cn04-flowlogs-role/cfi-1775709103-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709103-cn04-flowlogs-role-policy attached to role cfi-1775709103-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775709431-cn04-flowlogs-role-policy attached to role cfi-1775709431-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775709431-cn04-flowlogs-role/cfi-1775709431-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709431-cn04-flowlogs-role-policy attached to role cfi-1775709431-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | IAM inline policy does not allow privilege escalation Inline policy cfi-1775709523-cn04-flowlogs-role-policy attached to role cfi-1775709523-cn04-flowlogs-role does not allow privilege escalation. | cfi-1775709523-cn04-flowlogs-role/cfi-1775709523-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709523-cn04-flowlogs-role-policy attached to role cfi-1775709523-cn04-flowlogs-role does not allow privilege escalation. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775707735-cn04-flowlogs-role-policy attached to role cfi-1775707735-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775707735-cn04-flowlogs-role/cfi-1775707735-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775707735-cn04-flowlogs-role-policy attached to role cfi-1775707735-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775708371-cn04-flowlogs-role-policy attached to role cfi-1775708371-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775708371-cn04-flowlogs-role/cfi-1775708371-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775708371-cn04-flowlogs-role-policy attached to role cfi-1775708371-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775708863-cn04-flowlogs-role-policy attached to role cfi-1775708863-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775708863-cn04-flowlogs-role/cfi-1775708863-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775708863-cn04-flowlogs-role-policy attached to role cfi-1775708863-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775709103-cn04-flowlogs-role-policy attached to role cfi-1775709103-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775709103-cn04-flowlogs-role/cfi-1775709103-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709103-cn04-flowlogs-role-policy attached to role cfi-1775709103-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775709431-cn04-flowlogs-role-policy attached to role cfi-1775709431-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775709431-cn04-flowlogs-role/cfi-1775709431-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709431-cn04-flowlogs-role-policy attached to role cfi-1775709431-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow '*:*' administrative privileges Inline policy cfi-1775709523-cn04-flowlogs-role-policy attached to role cfi-1775709523-cn04-flowlogs-role does not allow '*:*' administrative privileges. | cfi-1775709523-cn04-flowlogs-role/cfi-1775709523-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709523-cn04-flowlogs-role-policy attached to role cfi-1775709523-cn04-flowlogs-role does not allow '*:*' administrative privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775707735-cn04-flowlogs-role-policy attached to role cfi-1775707735-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775707735-cn04-flowlogs-role/cfi-1775707735-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775707735-cn04-flowlogs-role-policy attached to role cfi-1775707735-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775708371-cn04-flowlogs-role-policy attached to role cfi-1775708371-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775708371-cn04-flowlogs-role/cfi-1775708371-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775708371-cn04-flowlogs-role-policy attached to role cfi-1775708371-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775708863-cn04-flowlogs-role-policy attached to role cfi-1775708863-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775708863-cn04-flowlogs-role/cfi-1775708863-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775708863-cn04-flowlogs-role-policy attached to role cfi-1775708863-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775709103-cn04-flowlogs-role-policy attached to role cfi-1775709103-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775709103-cn04-flowlogs-role/cfi-1775709103-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709103-cn04-flowlogs-role-policy attached to role cfi-1775709103-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775709431-cn04-flowlogs-role-policy attached to role cfi-1775709431-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775709431-cn04-flowlogs-role/cfi-1775709431-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709431-cn04-flowlogs-role-policy attached to role cfi-1775709431-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow 'cloudtrail:*' privileges Inline policy cfi-1775709523-cn04-flowlogs-role-policy attached to role cfi-1775709523-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | cfi-1775709523-cn04-flowlogs-role/cfi-1775709523-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709523-cn04-flowlogs-role-policy attached to role cfi-1775709523-cn04-flowlogs-role does not allow 'cloudtrail:*' privileges. | |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775705443-cn04-flowlogs-role/cfi-1775705443-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775705443-cn04-flowlogs-role-policy attached to role cfi-1775705443-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775706318-cn04-flowlogs-role/cfi-1775706318-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706318-cn04-flowlogs-role-policy attached to role cfi-1775706318-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775706481-cn04-flowlogs-role/cfi-1775706481-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706481-cn04-flowlogs-role-policy attached to role cfi-1775706481-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775706869-cn04-flowlogs-role/cfi-1775706869-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775706869-cn04-flowlogs-role-policy attached to role cfi-1775706869-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775707735-cn04-flowlogs-role-policy attached to role cfi-1775707735-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775707735-cn04-flowlogs-role/cfi-1775707735-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775707735-cn04-flowlogs-role-policy attached to role cfi-1775707735-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775708371-cn04-flowlogs-role-policy attached to role cfi-1775708371-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775708371-cn04-flowlogs-role/cfi-1775708371-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775708371-cn04-flowlogs-role-policy attached to role cfi-1775708371-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775708863-cn04-flowlogs-role-policy attached to role cfi-1775708863-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775708863-cn04-flowlogs-role/cfi-1775708863-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775708863-cn04-flowlogs-role-policy attached to role cfi-1775708863-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775709103-cn04-flowlogs-role-policy attached to role cfi-1775709103-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775709103-cn04-flowlogs-role/cfi-1775709103-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709103-cn04-flowlogs-role-policy attached to role cfi-1775709103-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775709431-cn04-flowlogs-role-policy attached to role cfi-1775709431-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775709431-cn04-flowlogs-role/cfi-1775709431-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709431-cn04-flowlogs-role-policy attached to role cfi-1775709431-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Inline IAM policy does not allow kms:* privileges Inline policy cfi-1775709523-cn04-flowlogs-role-policy attached to role cfi-1775709523-cn04-flowlogs-role does not allow 'kms:*' privileges. | cfi-1775709523-cn04-flowlogs-role/cfi-1775709523-cn04-flowlogs-role-policy | AwsIamPolicy | Inline policy cfi-1775709523-cn04-flowlogs-role-policy attached to role cfi-1775709523-cn04-flowlogs-role does not allow 'kms:*' privileges. | CCC.KeyMgmt.CN02.AR01CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR04CCC.Vector.CN02.AR01CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| PASS | Custom IAM policy does not allow STS role assumption on wildcard resources Custom Policy CN03PeeringGuardrail does not allow permissive STS Role assumption. | CN03PeeringGuardrail | AwsIamPolicy | Custom Policy CN03PeeringGuardrail does not allow permissive STS Role assumption. | |
| PASS | Root account has no active access keys Root account does not have access keys. | <root_account> | AwsIamAccessKey | Root account does not have access keys. | |
| FAIL | IAM account password policy enforces password expiration within 90 days or less Password expiration is not set. | 211203495394 | AwsIamPolicy | Password expiration is not set. | |
| FAIL | IAM password policy requires at least one lowercase letter IAM password policy does not require at least one lowercase letter. | 211203495394 | AwsIamPolicy | IAM password policy does not require at least one lowercase letter. | |
| FAIL | IAM password policy requires passwords to be at least 14 characters long IAM password policy does not require minimum length of 14 characters. | 211203495394 | AwsIamPolicy | IAM password policy does not require minimum length of 14 characters. | |
| FAIL | IAM password policy requires at least one number IAM password policy does not require at least one number. | 211203495394 | AwsIamPolicy | IAM password policy does not require at least one number. | |
| FAIL | IAM password policy prevents reuse of the last 24 passwords IAM password policy reuse prevention is less than 24 or not set. | 211203495394 | AwsIamPolicy | IAM password policy reuse prevention is less than 24 or not set. | |
| FAIL | IAM password policy requires at least one symbol IAM password policy does not require at least one symbol. | 211203495394 | AwsIamPolicy | IAM password policy does not require at least one symbol. | |
| FAIL | IAM password policy requires at least one uppercase letter IAM password policy does not require at least one uppercase letter. | 211203495394 | AwsIamPolicy | IAM password policy does not require at least one uppercase letter. | |
| PASS | Customer managed IAM policy does not allow actions that can lead to privilege escalation Custom Policy arn:aws:iam::211203495394:policy/CN03PeeringGuardrail does not allow privilege escalation. | CN03PeeringGuardrail | AwsIamPolicy | Custom Policy arn:aws:iam::211203495394:policy/CN03PeeringGuardrail does not allow privilege escalation. | |
| FAIL | IAM user has no inline or attached policies User terraform-user has the policy AdministratorAccess attached. | terraform-user/AdministratorAccess | AwsIamUser | User terraform-user has the policy AdministratorAccess attached. | |
| PASS | Customer managed IAM policy does not allow cloudtrail:* privileges Custom Policy CN03PeeringGuardrail does not allow 'cloudtrail:*' privileges. | CN03PeeringGuardrail | AwsIamPolicy | Custom Policy CN03PeeringGuardrail does not allow 'cloudtrail:*' privileges. | |
| PASS | Custom IAM policy does not allow 'kms:*' privileges Custom Policy CN03PeeringGuardrail does not allow 'kms:*' privileges. | CN03PeeringGuardrail | AwsIamPolicy | Custom Policy CN03PeeringGuardrail does not allow 'kms:*' privileges. | CCC.LB.CN05.AR01CCC.ObjStor.CN01.AR01CCC.ObjStor.CN01.AR02CCC.ObjStor.CN01.AR03CCC.ObjStor.CN01.AR04CCC.Core.CN05.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR04 |
| FAIL | IAM role does not have AdministratorAccess policy attached IAM Role TerraformRole has AdministratorAccess policy attached. | TerraformRole | AwsIamRole | IAM Role TerraformRole has AdministratorAccess policy attached. | |
| PASS | IAM role does not grant ReadOnlyAccess to external AWS accounts IAM Role TerraformRole does not have ReadOnlyAccess policy. | TerraformRole | AwsIamRole | IAM Role TerraformRole does not have ReadOnlyAccess policy. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775705443-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775705443-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775705443-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775706318-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775706318-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775706318-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775706481-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775706481-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775706481-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775706869-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775706869-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775706869-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775707735-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775707735-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775707735-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775708371-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775708371-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775708371-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775708863-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775708863-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775708863-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775709103-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775709103-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775709103-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775709431-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775709431-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775709431-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | IAM service role prevents cross-service confused deputy attack IAM Service Role cfi-1775709523-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | cfi-1775709523-cn04-flowlogs-role | AwsIamRole | IAM Service Role cfi-1775709523-cn04-flowlogs-role does not prevent against a cross-service confused deputy attack. | |
| FAIL | Root account has a hardware MFA device enabled Root account has a virtual MFA instead of a hardware MFA device enabled. | <root_account> | AwsIamUser | Root account has a virtual MFA instead of a hardware MFA device enabled. | |
| PASS | Root account has MFA enabled MFA is enabled for root account. | <root_account> | AwsIamUser | MFA is enabled for root account. | |
| PASS | IAM user does not have active access keys older than 90 days User <root_account> does not have access keys. | <root_account> | AwsIamUser | User <root_account> does not have access keys. | CCC.ObjStor.CN05.AR02 |
| FAIL | IAM user does not have active access keys older than 90 days User terraform-user has not rotated access key 1 in over 90 days (184 days). | terraform-user-access-key-1 | AwsIamUser | User terraform-user has not rotated access key 1 in over 90 days (184 days). | CCC.ObjStor.CN05.AR02 |
| FAIL | IAM user does not have AdministratorAccess policy attached IAM User terraform-user has AdministratorAccess policy attached. | terraform-user | AwsIamUser | IAM User terraform-user has AdministratorAccess policy attached. | |
| FAIL | IAM user has hardware MFA enabled User terraform-user does not have any type of MFA enabled. | terraform-user | AwsIamUser | User terraform-user does not have any type of MFA enabled. | |
| PASS | IAM user has MFA enabled for console access or no console password is set User terraform-user does not have Console Password enabled. | terraform-user | AwsIamUser | User terraform-user does not have Console Password enabled. | |
| FAIL | AWS Organization restricts operations to only the configured AWS Regions with SCP policies AWS Organizations is not in-use for this AWS Account. | unknown | Other | AWS Organizations is not in-use for this AWS Account. |