Security
You can use the following checks for the security category.
Note
If you enabled Security Hub CSPM for your AWS account, you can view your findings in the Trusted Advisor console. For information, see Viewing AWS Security Hub CSPM controls in AWS Trusted Advisor.
You can view all controls in the AWS Foundational Security Best Practices security standard except for controls that have the Category: Recover > Resilience. For a list of supported controls, see AWS Foundational Security Best Practices controls in the AWS Security Hub CSPM User Guide.
Check names
Amazon RDS Security Group Access Risk
- Description
-
Checks security group configurations for Amazon Relational Database Service (Amazon RDS) and warns when a security group rule grants overly permissive access to your database. The recommended configuration for a security group rule is to allow access only from specific Amazon Elastic Compute Cloud (Amazon EC2) security groups or from a specific IP address.
Note
This check evaluates only security groups that are attached toAmazon RDS instances running outside on an Amazon VPC.
- Check ID
-
nNauJisYIT - Alert Criteria
-
-
Yellow: A DB security group rule references an Amazon EC2 security group that grants global access on one of these ports: 20, 21, 22, 1433, 1434, 3306, 3389, 4333, 5432, 5500.
-
Red: A DB security group rule grants global access (the CIDR rule suffix is /0).
-
Green: A DB security group doesn't include permissive rules.
-
- Recommended Action
-
EC2-Classic was retired on August 15, 2022. It's recommend to move your Amazon RDS instances to a VPC and use Amazon EC2 security groups. For more information of moving your DB instance to a VPC see Moving a DB instance not in a VPC into a VPC.
If you are unable to migrate your Amazon RDS instances to a VPC, then review your security group rules and restrict access to authorized IP addresses or IP ranges. To edit a security group, use the AuthorizeDBSecurityGroupIngress API or the AWS Management Console. For more information, see Working with DB Security Groups.
- Additional Resources
- Report columns
-
-
Status
-
Region
-
RDS Security Group Name
-
Ingress Rule
-
Reason
-
AWS CloudTrail Logging
- Description
-
Checks your use of AWS CloudTrail. CloudTrail provides increased visibility into activity in your AWS account by recording information about AWS API calls made on the account. You can use these logs to determine, for example, what actions a particular user has taken during a specified time period, or which users have taken actions on a particular resource during a specified time period.
Because CloudTrail delivers log files to an Amazon Simple Storage Service (Amazon S3) bucket, CloudTrail must have write permissions for the bucket. If a trail applies to all Regions (the default when creating a new trail),the trail appears multiple times in the Trusted Advisor report.
- Check ID
-
vjafUGJ9H0 - Alert Criteria
-
-
Yellow: CloudTrail reports log delivery errors for a trail.
-
Red: A trail has not been created for a Region, or logging is turned off for a trail.
-
- Recommended Action
-
To create a trail and start logging from the console, go to the AWS CloudTrail console
. To start logging, see Stopping and Starting Logging for a Trail.
If you receive log delivery errors, check to make sure that the bucket exists and that the necessary policy is attached to the bucket. See Amazon S3 Bucket Policy.
- Additional Resources
- Report columns
-
-
Status
-
Region
-
Trail Name
-
Logging Status
-
Bucket Name
-
Last Delivery Date
-
IAM Access Key Rotation
- Description
-
Checks for active IAM access keys that have not been rotated in the last 90 days.
When you rotate your access keys regularly, you reduce the chance that a compromised key could be used without your knowledge to access resources. For the purposes of this check, the last rotation date and time is when the access key was created or most recently activated. The access key number and date come from the
access_key_1_last_rotatedandaccess_key_2_last_rotatedinformation in the most recent IAM credential report.Because the regeneration frequency of a credential report is restricted, refreshing this check might not reflect recent changes. For more information, see Getting Credential Reports for Your AWS account.
In order to create and rotate access keys, a user must have the appropriate permissions. For more information, see Allow Users to Manage Their Own Passwords, Access Keys, and SSH Keys.
- Check ID
-
DqdJqYeRm5 - Alert Criteria
-
-
Green: The access key is active and has been rotated in the last 90 days.
-
Yellow: The access key is active and has been rotated in the last 2 years, but more than 90 days ago.
-
Red: The access key is active and has not been rotated in the last 2 years.
-
- Recommended Action
-
Rotate access keys on a regular basis. See Rotating Access Keys and Managing Access Keys for IAM Users.
- Additional Resources
- Report columns
-
-
Status
-
IAM user
-
Access Key
-
Key Last Rotated
-
Reason
-
IAM Password Policy
- Description
-
Checks the password policy for your account and warns when a password policy is not enabled, or if password content requirements have not been enabled.
Password content requirements increase the overall security of your AWS environment by enforcing the creation of strong user passwords. When you create or change a password policy, the change is enforced immediately for new users but does not require existing users to change their passwords.
- Check ID
-
Yw2K9puPzl - Alert Criteria
-
-
Green: A password policy is enabled with recommended content requirement enabled.
-
Yellow: A password policy is enabled, but at least one content requirement is not enabled.
-
- Recommended Action
-
If some content requirements are not enabled, consider enabling them. If no password policy is enabled, create and configure one. See Setting an Account Password Policy for IAM Users.
To access the AWS Management Console, IAM users need passwords. As a best practice, AWS highly recommends that instead of creating IAM users, you use federation. Federation allows users to use their existing corporate credentials to log into the AWS Management Console. Use IAM Identity Center to create or federate the user, and then assume an IAM role into an account.
To learn more about identity providers and federation, see Identity providers and federation in the IAM User Guide. To learn more about IAM Identity Center, see the IAM Identity Center User Guide.
- Additional Resources
- Report columns
-
-
Password Policy
-
Uppercase
-
Lowercase
-
Number
-
Non-alphanumeric
-
IAM Use
- Description
-
This check is intended to discourage the use of root access by checking for existence of at least one IAM user. You may ignore the alert if you are following the best practice of centralizing identities and configuring users in an Identity providers and federation or IAM Identity Center.
- Check ID
-
zXCkfM1nI3 - Alert Criteria
-
-
Yellow: No IAM users have been created for this account.
-
- Recommended Action
-
Create an IAM user or use IAM Identity Center to create additional users whose permissions are limited to perform specific tasks in your AWS environment.
- Additional Resources
- Report columns
-
-
Password Policy
-
Uppercase
-
Lowercase
-
Number
-
Non-alphanumeric
-
Security Groups – Specific Ports Unrestricted
- Description
-
Checks security groups for rules that allow unrestricted access (0.0.0.0/0) to specific ports.
Unrestricted access increases opportunities for malicious activity (hacking, denial-of-service attacks, loss of data). The ports with highest risk are flagged red, and those with less risk are flagged yellow. Ports flagged green are typically used by applications that require unrestricted access, such as HTTP and SMTP.
If you have intentionally configured your security groups in this manner, we recommend using additional security measures to secure your infrastructure (such as IP tables).
Note
This check only evaluates security groups that you create and their inbound rules for IPv4 addresses. Security groups created by AWS Directory Service are flagged as red or yellow, but they don’t pose a security risk and can be excluded. For more information, see the Trusted Advisor FAQ
. Note
This check reports the resources that are flagged by the criteria and the total number of resources evaluated, including
OKresources. The resources table lists only the flagged resources. - Check ID
-
HCP4007jGY - Alert Criteria
-
-
Green: Security Group provides unrestricted access on ports 80, 25, 443, or 465.
-
Red: Security Group is attached to a resource and provides unrestricted access to port 20, 21, 22 , 1433, 1434, 3306, 3389, 4333, 5432, or 5500.
-
Yellow: Security Group provides unrestricted access to any other port.
-
Yellow: Security Group is not attached to any resource and provides unrestricted access.
-
- Recommended Action
-
Restrict access to only those IP addresses that require it. To restrict access to a specific IP address, set the suffix to /32 (for example, 192.0.2.10/32). Be sure to delete overly permissive rules after creating rules that are more restrictive.
Review and delete unused security groups. You can use AWS Firewall Manager to centrally configure and manage security groups at scale across AWS accounts, For more information, see the AWS Firewall Manager documentation.
Consider using Systems Manager Sessions Manager for SSH (Port 22) and RDP (Port 3389) access to EC2 instances. With sessions manager, you can access your EC2 instances without enabling port 22 and 3389 in the security group.
- Additional Resources
- Report columns
-
-
Status
-
Region
-
Security Group Name
-
Security Group ID
-
Protocol
-
From Port
-
To Port
-
Association
-
Security Groups – Unrestricted Access
- Description
-
Checks security groups for rules that allow unrestricted access to a resource.
Unrestricted access increases opportunities for malicious activity (hacking, denial-of-service attacks, loss of data).
Note
This check evaluates only security groups that you create and their inbound rules for IPv4 addresses. Security groups created by AWS Directory Service are flagged as red or yellow, but they don’t pose a security risk and can be excluded. For more information, see the Trusted Advisor FAQ
. Note
This check reports the resources that are flagged by the criteria and the total number of resources evaluated, including
OKresources. The resources table lists only the flagged resources. - Check ID
-
1iG5NDGVre - Alert Criteria
-
-
Green: A security group rule has a source IP address with a /0 suffix for ports 25, 80, or 443.
-
Yellow: A security group rule has a source IP address with a /0 suffix for ports other than 25, 80, or 443 and security group is attached to a resource.
-
Red: A security group rule has a source IP address with a /0 suffix for ports other than 25, 80, or 443 and security group is not attached to a resource.
-
- Recommended Action
-
Restrict access to only those IP addresses that require it. To restrict access to a specific IP address, set the suffix to /32 (for example, 192.0.2.10/32). Be sure to delete overly permissive rules after creating rules that are more restrictive.
Review and delete unused security groups. You can use AWS Firewall Manager to centrally configure and manage security groups at scale across AWS accounts, For more information, see the AWS Firewall Manager documentation.
Consider using Systems Manager Sessions Manager for SSH (Port 22) and RDP (Port 3389) access to EC2 instances. With sessions manager, you can access your EC2 instances without enabling port 22 and 3389 in the security group.
- Additional Resources
- Report columns
-
-
Status
-
Region
-
Security Group Name
-
Security Group ID
-
Protocol
-
From Port
-
To Port
-
IP Range
-
Association
-