turbot/aws_compliance

Benchmark: 5.4 Restrict Administrator Privileges to Dedicated Administrator Accounts

Description

Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Conduct general computing activities, such as internet browsing, email, and productivity suite use, from the user's primary, non-privileged account.

Usage

Install the mod:

mkdir dashboards
cd dashboards
powerpipe mod init
powerpipe mod install github.com/turbot/steampipe-mod-aws-compliance

Start the Powerpipe server:

steampipe service start
powerpipe server

Open http://localhost:9033 in your browser and select 5.4 Restrict Administrator Privileges to Dedicated Administrator Accounts.

Run this benchmark in your terminal:

powerpipe benchmark run aws_compliance.benchmark.cis_controls_v8_ig1_5_4

Snapshot and share results via Turbot Pipes:

powerpipe benchmark run aws_compliance.benchmark.cis_controls_v8_ig1_5_4 --share

Controls

Tags