Benchmark: CM-8(6) Assessed Configurations And Approved Deviations
Description
Include assessed component configurations and any approved deviations to current deployed configurations in the system component inventory.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select CM-8(6) Assessed Configurations And Approved Deviations.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.nist_800_53_rev_5_cm_8_6
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.nist_800_53_rev_5_cm_8_6 --share
Controls
- EBS volumes should be attached to EC2 instances
- EC2 instances should be managed by AWS Systems Manager
- EC2 stopped instances should be removed in 30 days
- ELB application load balancer deletion protection should be enabled
- SSM managed instance associations should be compliant
- VPC security groups should restrict ingress access on ports 20, 21, 22, 3306, 3389, 4333 from 0.0.0.0/0