Benchmark: PR.DS-2
Description
Data-in-transit is protected.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-complianceStart the Powerpipe server:
steampipe service startpowerpipe serverOpen http://localhost:9033 in your browser and select PR.DS-2.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.nist_csf_pr_ds_2Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.nist_csf_pr_ds_2 --shareControls
- ACM certificates should not expire within 30 days
 - API Gateway stage should uses SSL certificate
 - CloudFront distributions should encrypt traffic to custom origins
 - CloudFront distributions should require encryption in transit
 - CloudFront distributions should not use deprecated SSL protocols between edge locations and custom origins
 - CloudFront distributions should use custom SSL/TLS certificates
 - Application Load Balancer should be configured to drop invalid http headers
 - ELB application load balancers should redirect HTTP requests to HTTPS
 - ELB application and network load balancers should only use SSL or HTTPS listeners
 - ELB classic load balancers should use SSL certificates
 - ELB classic load balancers should only use SSL or HTTPS listeners
 - Elasticsearch domain node-to-node encryption should be enabled
 - OpenSearch domains should use HTTPS
 - OpenSearch domains node-to-node encryption should be enabled
 - Redshift cluster encryption in transit should be enabled
 - S3 buckets should enforce SSL