11791179 <tag >cweid-308</tag >
11801180 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
11811181 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
1182+ </rule >
1183+ <rule >
1184+ <key >F79</key >
1185+ <name >A NetworkACL's rule numbers cannot be repeated unless one is egress and one is ingress.</name >
1186+ <internalKey >F79</internalKey >
1187+ <description >A NetworkACL's rule numbers cannot be repeated unless one is egress and one is ingress.</description >
1188+ <severity >BLOCKER</severity >
1189+ <cardinality >SINGLE</cardinality >
1190+ <status >READY</status >
1191+ <type >VULNERABILITY</type >
1192+ <tag >security</tag >
1193+ <tag >cfn-nag</tag >
1194+ <tag >owasp-a6</tag >
1195+ <tag >cweid-284</tag >
1196+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
1197+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
1198+ </rule >
1199+ <rule >
1200+ <key >F80</key >
1201+ <name >RDS instance should have deletion protection enabled.</name >
1202+ <internalKey >F80</internalKey >
1203+ <description >RDS instance should have deletion protection enabled.</description >
1204+ <severity >BLOCKER</severity >
1205+ <cardinality >SINGLE</cardinality >
1206+ <status >READY</status >
1207+ <type >VULNERABILITY</type >
1208+ <tag >security</tag >
1209+ <tag >cfn-nag</tag >
1210+ <tag >owasp-a6</tag >
1211+ <tag >cweid-693</tag >
1212+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
1213+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
11821214 </rule >
11831215 <rule >
11841216 <key >F665</key >
18351867 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
18361868 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
18371869 </rule >
1838-
18391870 <rule >
18401871 <key >W46</key >
18411872 <name >ApiGateway V2 should have access logging configured</name >
18521883 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
18531884 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
18541885 </rule >
1855-
1856-
18571886 <rule >
18581887 <key >W47</key >
18591888 <name >SNS Topic should specify KmsMasterKeyId property</name >
19341963 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
19351964 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
19361965 </rule >
1937-
19381966 <rule >
19391967 <key >W52</key >
19401968 <name >Elastic Load Balancer V2 should have access logging enabled</name >
20152043 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
20162044 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
20172045 </rule >
2018-
2019-
20202046 <rule >
20212047 <key >W57</key >
20222048 <name >AWS::Cognito::IdentityPool AllowUnauthenticatedIdentities property should be false but CAN be true if proper restrictive IAM roles and permissions are established for unauthenticated users.</name >
21292155 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
21302156 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
21312157 </rule >
2132-
2133-
21342158 <rule >
21352159 <key >W64</key >
21362160 <name >AWS::ApiGateway::Stage resources should be associated with an AWS::ApiGateway::UsagePlan.</name >
21462170 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
21472171 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
21482172 </rule >
2149-
2150-
2151-
21522173 <rule >
21532174 <key >W65</key >
21542175 <name >GameLift fleet EC2InboundPermissions found with port range instead of just a single port</name >
21652186 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
21662187 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
21672188 </rule >
2168-
21692189 <rule >
21702190 <key >W66</key >
21712191 <name >To avoid opening all ports for Allow rules, EC2 NetworkACL Entry Protocol should be specified</name >
22302250 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
22312251 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
22322252 </rule >
2253+ <rule >
2254+ <key >W70</key >
2255+ <name >Cloudfront should use minimum protocol version TLS 1.2</name >
2256+ <internalKey >W70</internalKey >
2257+ <description >Cloudfront should use minimum protocol version TLS 1.2</description >
2258+ <severity >BLOCKER</severity >
2259+ <cardinality >SINGLE</cardinality >
2260+ <status >READY</status >
2261+ <type >VULNERABILITY</type >
2262+ <tag >security</tag >
2263+ <tag >cfn-nag</tag >
2264+ <tag >owasp-a6</tag >
2265+ <tag >cweid-326</tag >
2266+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
2267+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
2268+ </rule >
2269+ <rule >
2270+ <key >W71</key >
2271+ <name >NetworkACL Entry Deny rules should affect all CIDR ranges.</name >
2272+ <internalKey >W71</internalKey >
2273+ <description >NetworkACL Entry Deny rules should affect all CIDR ranges.</description >
2274+ <severity >BLOCKER</severity >
2275+ <cardinality >SINGLE</cardinality >
2276+ <status >READY</status >
2277+ <type >VULNERABILITY</type >
2278+ <tag >security</tag >
2279+ <tag >cfn-nag</tag >
2280+ <tag >owasp-a6</tag >
2281+ <tag >cweid-284</tag >
2282+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
2283+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
2284+ </rule >
2285+ <rule >
2286+ <key >W72</key >
2287+ <name >NetworkACL Entries are reusing or overlapping ports which may create ineffective rules.</name >
2288+ <internalKey >W72</internalKey >
2289+ <description >NetworkACL Entries are reusing or overlapping ports which may create ineffective rules.</description >
2290+ <severity >BLOCKER</severity >
2291+ <cardinality >SINGLE</cardinality >
2292+ <status >READY</status >
2293+ <type >VULNERABILITY</type >
2294+ <tag >security</tag >
2295+ <tag >cfn-nag</tag >
2296+ <tag >owasp-a6</tag >
2297+ <tag >cweid-284</tag >
2298+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
2299+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
2300+ </rule >
2301+ <rule >
2302+ <key >W73</key >
2303+ <name >DynamoDB table should have billing mode set to either PAY_PER_REQUEST or PROVISIONED</name >
2304+ <internalKey >W73</internalKey >
2305+ <description >DynamoDB table should have billing mode set to either PAY_PER_REQUEST or PROVISIONED</description >
2306+ <severity >MAJOR</severity >
2307+ <cardinality >SINGLE</cardinality >
2308+ <status >READY</status >
2309+ <type >VULNERABILITY</type >
2310+ <tag >security</tag >
2311+ <tag >cfn-nag</tag >
2312+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
2313+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
2314+ </rule >
2315+ <rule >
2316+ <key >W74</key >
2317+ <name >DynamoDB table should have encryption enabled using a CMK stored in KMS</name >
2318+ <internalKey >W74</internalKey >
2319+ <description >DynamoDB table should have encryption enabled using a CMK stored in KMS</description >
2320+ <severity >BLOCKER</severity >
2321+ <cardinality >SINGLE</cardinality >
2322+ <status >READY</status >
2323+ <type >VULNERABILITY</type >
2324+ <tag >security</tag >
2325+ <tag >cfn-nag</tag >
2326+ <tag >owasp-a6</tag >
2327+ <tag >cweid-311</tag >
2328+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
2329+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
2330+ </rule >
2331+ <rule >
2332+ <key >W75</key >
2333+ <name >RDS instance should have backup retention period greater than 0.</name >
2334+ <internalKey >W75</internalKey >
2335+ <description >RDS instance should have backup retention period greater than 0.</description >
2336+ <severity >BLOCKER</severity >
2337+ <cardinality >SINGLE</cardinality >
2338+ <status >READY</status >
2339+ <type >VULNERABILITY</type >
2340+ <tag >security</tag >
2341+ <tag >cfn-nag</tag >
2342+ <tag >owasp-a6</tag >
2343+ <tag >cweid-693</tag >
2344+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
2345+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
2346+ </rule >
2347+ <rule >
2348+ <key >W1200</key >
2349+ <name >SageMaker EndpointConfig should have a KmsKeyId property set.</name >
2350+ <internalKey >W1200</internalKey >
2351+ <description >SageMaker EndpointConfig should have a KmsKeyId property set.</description >
2352+ <severity >BLOCKER</severity >
2353+ <cardinality >SINGLE</cardinality >
2354+ <status >READY</status >
2355+ <type >VULNERABILITY</type >
2356+ <tag >security</tag >
2357+ <tag >cfn-nag</tag >
2358+ <tag >owasp-a6</tag >
2359+ <tag >cweid-311</tag >
2360+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
2361+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
2362+ </rule >
2363+ <rule >
2364+ <key >W1201</key >
2365+ <name >SageMaker NotebookInstance should have a KmsKeyId property set.</name >
2366+ <internalKey >W1201</internalKey >
2367+ <description >SageMaker NotebookInstance should have a KmsKeyId property set.</description >
2368+ <severity >BLOCKER</severity >
2369+ <cardinality >SINGLE</cardinality >
2370+ <status >READY</status >
2371+ <type >VULNERABILITY</type >
2372+ <tag >security</tag >
2373+ <tag >cfn-nag</tag >
2374+ <tag >owasp-a6</tag >
2375+ <tag >cweid-311</tag >
2376+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
2377+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
2378+ </rule >
22332379</cloudformation-rules >
0 commit comments