Benchmark: 3.3 Vulnerability Management
Description
A vulnerability can be defined as an inherent configuration flaw in an organization's information technology base, whether hardware or software, which can be exploited by a third party to gather sensitive information regarding the organization. Vulnerability management is an ongoing process to determine the process of eliminating or mitigating vulnerabilities based upon the risk and cost associated with the vulnerabilities. NBFCs may devise a strategy for managing and eliminating vulnerabilities and such strategy may clearly be communicated in the Cyber Security policy.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 3.3 Vulnerability Management.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.rbi_itf_nbfc_3_3
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.rbi_itf_nbfc_3_3 --share
Controls
- EC2 instances should be managed by AWS Systems Manager
- GuardDuty findings should be archived
- RDS DB instance automatic minor version upgrade should be enabled
- AWS Redshift should have required maintenance settings
- SSM managed instance associations should be compliant
- SSM managed instance patching should be compliant