PCI Data Security Standard version 3.2.1
Policy Pack based on the PCI DSS version 3.2.1 benchmark provided by the Payment Card Industry Data Security Standard (PCI DSS)
First Steps
-
Install Cloud Graph CLI.
-
Set up the AWS Provider for CG with the
cg init aws
command. -
Add Policy Pack for AWS PCI DSS benchmark using
cg policy add aws-pci-dss-3.2.1
command. -
Execute the ruleset using the scan command
cg scan aws
. -
Query the findings using the different options:
5a. Querying findings by provider:
query { queryawsFindings { PCIFindings { id resourceId result } } }
5b. Querying findings by specific benchmark:
query { queryawsPCIFindings { id resourceId result } }
5c. Querying findings by resource:
query { queryawsCodebuild { id arn accountId PCIFindings { id resourceId result } } }
Available Ruleset
Rule | Description |
---|---|
autoscaling-check-1 | Auto Scaling groups associated with a load balancer should use health checks |
cloudfront-check-1 | Cloudfront distributions should be protected by WAFs |
cloudtrail-check-1 | CloudTrail logs should be encrypted at rest using AWS KMS keys |
cloudtrail-check-2 | CloudTrail should be enabled |
cloudtrail-check-3 | CloudTrail log file validation should be enabled |
cloudtrail-check-4 | CloudTrail trails should be integrated with CloudWatch Logs |
cloudwatch-check-1 | A log metric filter and alarm should exist for usage of the "root" user |
codebuild-check-1 | CodeBuild GitHub or Bitbucket source repository URLs should use OAuth |
codebuild-check-2 | CodeBuild project environment variables should not contain clear text credentials |
config-check-1 | AWS Config should be enabled |
dms-check-1 | AWS Database Migration Service replication instances should not be public |
ec2-check-1 | Amazon EBS snapshots should not be publicly restorable |
ec2-check-2 | VPC default security group should prohibit inbound and outbound traffic |
ec2-check-4 | Unused EC2 EIPs should be removed |
ec2-check-5 | Security groups should not allow ingress from 0.0.0.0/0 to port 22 |
ec2-check-6 | VPC flow logging should be enabled in all VPCs |
elasticsearch-check-1 | ElasticSearch domains should be in a VPC |
elasticsearch-check-2 | Elasticsearch domains should have encryption at rest enabled |
elbv2-check-1 | Application Load Balancer should be configured to redirect all HTTP requests to HTTPS |
guardDuty-check-1 | GuardDuty should be enabled |
iam-check-1 | IAM root user access key should not exist |
iam-check-2 | IAM users should not have IAM policies attached |
iam-check-3 | IAM policies should not allow full "*" administrative privileges |
iam-check-4 | Hardware MFA should be enabled for the root user |
iam-check-5 | Virtual MFA should be enabled for the root user |
iam-check-6 | MFA should be enabled for all IAM users |
iam-check-7 | IAM user credentials should be disabled if not used within a predefined number of days |
iam-check-8 | Password policies for IAM users should have strong configurations |
kms-check-1 | KMS key rotation should be enabled |
lambda-check-1 | Lambda functions should prohibit public access |
lambda-check-2 | Lambda functions should be in a VPC |
rds-check-1 | RDS snapshots should prohibit public access |
rds-check-2 | RDS DB Instances should prohibit public access |
redshift-check-1 | Amazon Redshift clusters should prohibit public access |
s3-check-1 | S3 buckets should prohibit public write access |
s3-check-2 | S3 buckets should prohibit public read access |
s3-check-3 | S3 buckets should have cross-region replication enabled enabled |
s3-check-4 | S3 buckets should have server-side encryption enabled |
s3-check-5 | S3 buckets should require requests to use Secure Socket Layer |
s3-check-6 | S3 Block Public Access setting should be enabled |
sageMaker-check-1 | Amazon SageMaker notebook instances should not have direct internet access |
ssm-check-1 | Amazon EC2 instances managed by Systems Manager should have a patch compliance status of COMPLIANT after a patch installation |
ssm-check-2 | Instances managed by Systems Manager should have an association compliance status of COMPLIANT |
ssm-check-3 | EC2 instances should be managed by AWS Systems Manager |