Skip to content

Commit 6a52694

Browse files
techpinkjosh-padnickzackproserrobmorganMarina Limeira
authored
CIS v1.5 upgrade guide (#651)
* HL structure and rough draft * Edits to steps 2 and 3 * Added tf diff checks * Fixed headings * Added refs to changelogs * Added index and core concepts pages * Moved to _docs-sources * Simplified to focus on multi_region_common.hcl * Added next steps and outline patcher guide * Added Steampipe instructions * Update Production Framework guide to remove roadmap items (#648) * Update Production Framework guide to remove roadmap items A customer reported confusion on a roadmap commitment we made here. We shouldn't be making roadmap commitments here since it's too hard to keep track of them and they'll inevitably get out of date. So I've updated the "How Gruntwork Helps" column to reflect our latest offerings and removed the "On the Roadmap" column. * Update callout to reflect new Pipelines example (#650) - New example in service catalog is preferred deployment experience * add pr feedback wip * add install docs * Add generated docs * Update _docs-sources/guides/stay-up-to-date/cis/cis-1.5.0/deployment-walkthrough/step-2-update-references-to-the-gruntwork-infrastructure-as-code-library.md Co-authored-by: Marina <[email protected]> * Fix broken links -- deploy was not working * Fix links -- remove extra deployment-walkthrough/ * Text improvements and add screenshots * More text improvements * Mention cis ref archC * Add 'what are patches' and some text fixes * Updated `_docs-sources` with this contribution and regenerated output. * Add card on the 'Update guides' section * Fix upgrades number * Updated `_docs-sources` with this contribution and regenerated output. * Update _docs-sources/guides/stay-up-to-date/cis/cis-1.5.0/deployment-walkthrough/step-2-update-references-to-the-gruntwork-infrastructure-as-code-library.md * Update generated docs --------- Co-authored-by: Josh Padnick <[email protected]> Co-authored-by: Zack Proser <[email protected]> Co-authored-by: Rob Morgan <[email protected]> Co-authored-by: Marina Limeira <[email protected]> Co-authored-by: Marina <[email protected]> Co-authored-by: docs-sourcer[bot] <99042413+docs-sourcer[bot]@users.noreply.github.com>
1 parent 3bdfaa9 commit 6a52694

28 files changed

+1400
-5
lines changed
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
{
2+
"label": "Update to CIS AWS Foundations Benchmark 1.5.0"
3+
}
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
sidebar_label: Core Concepts
3+
---
4+
5+
# Background
6+
7+
Version 1.5.0 of the CIS AWS Foundations Benchmark was released in August of 2022. You can refer to the [CIS website](https://www.cisecurity.org/benchmark/amazon_web_services/)
8+
where you can download the latest version of the Benchmark (as well as all the previous versions).
9+
The latest version introduces five new recommendations, and also updates a couple of existing recommendations.
10+
11+
## Changes in recommendations
12+
13+
Changes in recommendations (both additions and removals) are listed below. You can think of these as a "diff"
14+
between versions 1.4.0 and 1.5.0.
15+
16+
### New recommendations
17+
18+
These are the new recommendations introduced in version 1.5.0 of the benchmark:
19+
20+
- 2.3.2: Ensure Auto Minor Version Upgrade feature is Enabled for RDS Instances
21+
- 2.3.3: Ensure that public access is not given to RDS Instance
22+
- 2.4.1: Ensure that encryption is enabled for EFS file systems
23+
- 4.16: Ensure AWS Security Hub is enabled
24+
- 5.3: Ensure no security groups allow ingress from ::/0 to remote server administration ports
25+
26+
### Updated recommendations
27+
28+
Version 1.5.0 also updated a few recommendations.
29+
30+
- 1.12: Ensure credentials unused for 45 days or greater are disabled. The previous recommendation did not exclude the root account from this requirement.
31+
- 2.1.2: Ensure S3 Bucket Policy is set to deny HTTP requests. The previous recommendation specified `Actions=GetObject`, this is updated to `Actions=*`
32+
- 3.8: Ensure rotation for customer created symmetric CMKs is enabled. The previous recommendation did not specify symmetric keys.
33+
34+
## New Gruntwork modules vs. existing modules
35+
36+
To achieve compliance with the new version of the benchmark, we've updated a bunch of existing modules. We've also
37+
created a new CIS RDS and EFS module to satisfy the expanded recommendations.
38+
39+
To ensure compliance with version 1.5.0 of the CIS AWS Foundations Benchmark, you'll need to follow all the
40+
instructions in the [Deployment walkthrough](deployment-walkthrough/step-1-check-your-live-infrastructure-is-cis-v1.4-compliant.md) section. We've
41+
expanded the steps in the guide to include checking v1.4.0 compliance before updating and checking v1.5.0 compliance after the update.
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
{
2+
"label": "Deployment walkthrough"
3+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,81 @@
1+
---
2+
sidebar_label: Check your live infrastructure is CIS AWS v1.4 compliant
3+
---
4+
5+
# Step 1: Check your live infrastructure is CIS AWS v1.4 compliant
6+
7+
The later steps in this guide assume that you are upgrading from CIS AWS Foundations Benchmark v1.4 to v1.5.
8+
9+
Before you update to CIS AWS Foundations Benchmark v1.5, we strongly recommend that you confirm that your live
10+
infrastructure is compliant with the CIS AWS Foundations Benchmark v1.4.
11+
12+
If you do not have existing tooling in place to confirm this, then we suggest that you run the
13+
[Steampipe CIS v1.4.0](https://hub.steampipe.io/mods/turbot/aws_compliance/controls/benchmark.cis_v140) check against
14+
your infrastructure.
15+
16+
In the final step in this guide, we suggest you run Steampipe to verify that your infrastructure is CIS AWS Foundations
17+
Benchmark v1.5 compliant.
18+
19+
## 1.1 Download and install Steampipe
20+
21+
Homebrew is the recommended way to install Steampipe for Mac. Instructions for different OS versions can be found at
22+
https://steampipe.io/downloads.
23+
24+
```
25+
brew tap turbot/tap
26+
brew install steampipe
27+
```
28+
29+
Next install the AWS plugin with Steampipe:
30+
31+
```
32+
steampipe plugin install aws
33+
```
34+
35+
## 1.2 Configure Steampipe with AWS credentials
36+
37+
The [Steampipe AWS plugin](https://hub.steampipe.io/plugins/turbot/aws) supports a range of options for granting
38+
Steampipe access to your AWS accounts.
39+
40+
In order for the compliance checks to work correctly, you need to:
41+
- Configure [multi-region connections](https://hub.steampipe.io/plugins/turbot/aws#multi-region-connections) so that Steampipe can access to all the regions you are using
42+
- Configure [multi-account connections](https://hub.steampipe.io/plugins/turbot/aws#multi-account-connections) so that Steampipe can access all the accounts you are using
43+
44+
## 1.3 Clone the Steampipe AWS Compliance Mod
45+
46+
The [AWS Compliance Mod](https://hub.steampipe.io/mods/turbot/aws_compliance#aws-compliance-mod) includes compliance
47+
checks for CIS AWS Foundations Benchmark v1.4 and v1.5.
48+
49+
Clone:
50+
51+
```
52+
git clone https://github.com/turbot/steampipe-mod-aws-compliance.git
53+
cd steampipe-mod-aws-compliance
54+
```
55+
56+
## 1.4 Run the CIS v1.4.0 compliance check
57+
58+
Before running, an IAM credential report needs to be generated:
59+
60+
```
61+
aws iam generate-credential-report
62+
```
63+
64+
Run the check while authenticated to the AWS account you want to verify:
65+
66+
```
67+
steampipe check aws_compliance.benchmark.cis_v140
68+
```
69+
70+
Example:
71+
72+
```
73+
aws-vault exec dev -- aws iam generate-credential-report
74+
aws-vault exec dev -- steampipe check aws_compliance.benchmark.cis_v140
75+
```
76+
77+
## Next steps
78+
79+
If you've confirmed that your live infrastructure is compliant with the CIS AWS Foundations Benchmark v1.4 then you're
80+
ready to move to [step 2](step-2-update-references-to-the-gruntwork-infrastructure-as-code-library.md) and update your
81+
references to the Gruntwork Infrastructure as Code Library. Otherwise, if some checks are failing you should check the [Manual steps](/guides/build-it-yourself/achieve-compliance/deployment-walkthrough/manual-steps) section, that contains extra steps to achieve CIS compliance.

0 commit comments

Comments
 (0)