turbot/aws_compliance

Control: 1 AWS Private CA root certificate authority should be disabled

Description

This control checks if AWS Private CA has a root certificate authority (CA) that is disabled. The control fails if the root CA is enabled.

With AWS Private CA, you can create a CA hierarchy that includes a root CA and subordinate CAs. You should minimize the use of the root CA for daily tasks, especially in production environments. The root CA should only be used to issue certificates for intermediate CAs. This allows the root CA to be stored out of harm's way while the intermediate CAs perform the daily task of issuing end-entity certificates.

Remediation

To disable the root CA, see Update CA status in the AWS Private Certificate Authority User Guide.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.foundational_security_pca_1

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.foundational_security_pca_1 --share

SQL

This control uses a named query:

acmpca_root_certificate_authority_disabled

Tags