Benchmark: GV.OC-02
Description
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-complianceStart the Powerpipe server:
steampipe service startpowerpipe serverOpen http://localhost:9033 in your browser and select GV.OC-02.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.nist_csf_v2_gv_oc_02Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.nist_csf_v2_gv_oc_02 --shareControls
- AWS account should be part of AWS Organizations
 - IAM password policies for users should have strong configurations
 - IAM groups, users, and roles should not have any inline policies