@cloudgraph/policy-pack-aws-pci-dss-3.2.1
TypeScript icon, indicating that this package has built-in type declarations

1.19.0 • Public • Published

PCI Data Security Standard version 3.2.1

Policy Pack based on the PCI DSS version 3.2.1 benchmark provided by the Payment Card Industry Data Security Standard (PCI DSS)

First Steps

  1. Install Cloud Graph CLI.

  2. Set up the AWS Provider for CG with the cg init aws command.

  3. Add Policy Pack for AWS PCI DSS benchmark using cg policy add aws-pci-dss-3.2.1 command.

  4. Execute the ruleset using the scan command cg scan aws.

  5. Query the findings using the different options:

    5a. Querying findings by provider:

    query {
      queryawsFindings {
        PCIFindings {
          id
          resourceId
          result
        }
      }
    }

    5b. Querying findings by specific benchmark:

    query {
      queryawsPCIFindings {
        id
        resourceId
        result
      }
    }

    5c. Querying findings by resource:

    query {
      queryawsCodebuild {
        id
        arn
        accountId
        PCIFindings {
          id
          resourceId
          result
        }
      }
    }

Available Ruleset

Rule Description
autoscaling-check-1 Auto Scaling groups associated with a load balancer should use health checks
cloudfront-check-1 Cloudfront distributions should be protected by WAFs
cloudtrail-check-1 CloudTrail logs should be encrypted at rest using AWS KMS keys
cloudtrail-check-2 CloudTrail should be enabled
cloudtrail-check-3 CloudTrail log file validation should be enabled
cloudtrail-check-4 CloudTrail trails should be integrated with CloudWatch Logs
cloudwatch-check-1 A log metric filter and alarm should exist for usage of the "root" user
codebuild-check-1 CodeBuild GitHub or Bitbucket source repository URLs should use OAuth
codebuild-check-2 CodeBuild project environment variables should not contain clear text credentials
config-check-1 AWS Config should be enabled
dms-check-1 AWS Database Migration Service replication instances should not be public
ec2-check-1 Amazon EBS snapshots should not be publicly restorable
ec2-check-2 VPC default security group should prohibit inbound and outbound traffic
ec2-check-4 Unused EC2 EIPs should be removed
ec2-check-5 Security groups should not allow ingress from 0.0.0.0/0 to port 22
ec2-check-6 VPC flow logging should be enabled in all VPCs
elasticsearch-check-1 ElasticSearch domains should be in a VPC
elasticsearch-check-2 Elasticsearch domains should have encryption at rest enabled
elbv2-check-1 Application Load Balancer should be configured to redirect all HTTP requests to HTTPS
guardDuty-check-1 GuardDuty should be enabled
iam-check-1 IAM root user access key should not exist
iam-check-2 IAM users should not have IAM policies attached
iam-check-3 IAM policies should not allow full "*" administrative privileges
iam-check-4 Hardware MFA should be enabled for the root user
iam-check-5 Virtual MFA should be enabled for the root user
iam-check-6 MFA should be enabled for all IAM users
iam-check-7 IAM user credentials should be disabled if not used within a predefined number of days
iam-check-8 Password policies for IAM users should have strong configurations
kms-check-1 KMS key rotation should be enabled
lambda-check-1 Lambda functions should prohibit public access
lambda-check-2 Lambda functions should be in a VPC
rds-check-1 RDS snapshots should prohibit public access
rds-check-2 RDS DB Instances should prohibit public access
redshift-check-1 Amazon Redshift clusters should prohibit public access
s3-check-1 S3 buckets should prohibit public write access
s3-check-2 S3 buckets should prohibit public read access
s3-check-3 S3 buckets should have cross-region replication enabled enabled
s3-check-4 S3 buckets should have server-side encryption enabled
s3-check-5 S3 buckets should require requests to use Secure Socket Layer
s3-check-6 S3 Block Public Access setting should be enabled
sageMaker-check-1 Amazon SageMaker notebook instances should not have direct internet access
ssm-check-1 Amazon EC2 instances managed by Systems Manager should have a patch compliance status of COMPLIANT after a patch installation
ssm-check-2 Instances managed by Systems Manager should have an association compliance status of COMPLIANT
ssm-check-3 EC2 instances should be managed by AWS Systems Manager

Readme

Keywords

Package Sidebar

Install

npm i @cloudgraph/policy-pack-aws-pci-dss-3.2.1

Weekly Downloads

2

Version

1.19.0

License

MPL-2.0

Unpacked Size

310 kB

Total Files

95

Last publish

Collaborators

  • ckoning