All AWS Compliance ControlsAWS Audit Manager Control Tower GuardrailsAWS Australian Cyber Security Center (ACSC) Essential EightAWS CIS Compute Services Benchmark v1.0.0AWS CIS Controls v8 IG1AWS CIS v1.2.0AWS CIS v1.3.0AWS CIS v1.4.0AWS CIS v1.5.0AWS CIS v2.0.0AWS CIS v3.0.0AWS CIS v4.0.0AWS CIS v5.0.0AWS CISA Cyber EssentialsAWS Federal Financial Institutions Examination Council (FFIEC)AWS FedRAMP Low Revision 4AWS FedRAMP Moderate Revision 4AWS Foundational Security Best PracticesAWS General Data Protection Regulation (GDPR)AWS GxP 21 CFR Part 11AWS GxP EU Annex 11AWS HIPAA Final Omnibus Security Rule 2013AWS HIPAA Security Rule 2003AWS NIST 800-171 Revision 2AWS NIST 800-172AWS NIST 800-53 Revision 4AWS NIST 800-53 Revision 5AWS NIST Cybersecurity Framework (CSF) v1.1AWS NIST Cybersecurity Framework (CSF) v2.0AWS NYDFS 23AWS PCI DSS v3.2.1AWS PCI DSS v4.0AWS RBI Cyber Security FrameworkAWS Reserve Bank of India - Information Technology Framework for Non-Banking Financial Companies (RBI ITF-NBFC)AWS SOC 2
Dashboard: All AWS Compliance Controls
Description
This benchmark contains all controls grouped by service to help you detect resource configurations that do not meet best practices.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select All AWS Compliance Controls dashboard.
You could also snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe benchmark run aws_compliance.benchmark.all_controls --share
Benchmark
This dashboard is automatically generated from the following benchmark:
benchmark.all_controls