turbot/aws_compliance

Benchmark: CIS Controls v8 IG1

To obtain the latest version of the official guide, please visit https://www.cisecurity.org/controls/implementation-groups.

Overview

The CIS Critical Security Controls® (CIS Controls®) started as a simple grassroots activity to identify the most common and important real-world cyber-attacks that affect enterprises every day, translate that knowledge and experience into positive, constructive action for defenders, and then share that information with a wider audience. The original goals were modest—to help people and enterprises focus their attention and get started on the most important steps to defend themselves from the attacks that really mattered.

Led by the Center for Internet Security® (CIS®), the CIS Controls have matured into an international community of volunteer individuals and institutions that:

  • Share insights into attacks and attackers, identify root causes, and translate that into classes of defensive action
  • Create and share tools, working aids, and stories of adoption and problem-solving
  • Map the CIS Controls to regulatory and compliance frameworks in order to ensure alignment and bring collective priority and focus to them
  • Identify common problems and barriers (like initial assessment and implementation roadmaps), and solve them as a community

The CIS Controls reflect the combined knowledge of experts from every part of the ecosystem (companies, governments, individuals), with every role (threat responders and analysts, technologists, information technology (IT) operators and defenders, vulnerability-finders, tool makers, solution providers, users, policy-makers, auditors, etc.), and across many sectors (government, power, defense, finance, transportation, academia, consulting, security, IT, etc.), who have banded together to create, adopt, and support the CIS Controls.

Usage

Install the mod:

mkdir dashboards
cd dashboards
powerpipe mod init
powerpipe mod install github.com/turbot/steampipe-mod-aws-compliance

Start the Powerpipe server:

steampipe service start
powerpipe server

Open http://localhost:9033 in your browser and select CIS Controls v8 IG1.

Run this benchmark in your terminal:

powerpipe benchmark run aws_compliance.benchmark.cis_controls_v8_ig1

Snapshot and share results via Turbot Pipes:

powerpipe benchmark run aws_compliance.benchmark.cis_controls_v8_ig1 --share

Benchmarks

Tags