|
| 1 | +Running CMMC Level 1 (17 practices) - Open Source |
| 2 | +CMMC Level 1 complete: 17 controls |
| 3 | + |
| 4 | +UPGRADE TO CMMC LEVEL 2: |
| 5 | + 110 additional practices for CUI handling |
| 6 | + Required for DoD contractors processing CUI |
| 7 | + Complete evidence collection guides |
| 8 | + November 10, 2025 deadline compliance |
| 9 | + |
| 10 | +Visit auditkit.io/pro or contact info@auditkit.io |
| 11 | + |
| 12 | +AuditKit CMMC Compliance Scan Results |
| 13 | +===================================== |
| 14 | +AWS Account: 405894844061 |
| 15 | +Framework: CMMC |
| 16 | +Scan Time: 2025-10-09 00:47:03 |
| 17 | + |
| 18 | +Compliance Score: [31m17.6%[0m |
| 19 | +Controls Passed: 3/17 |
| 20 | + |
| 21 | +Other Issues: |
| 22 | +================ |
| 23 | +[FAIL] AC.L1-3.1.2 - Security Control |
| 24 | + Issue: No custom IAM policies found - relying only on AWS managed policies |
| 25 | + Fix: Create custom IAM policies that restrict specific actions for CUI protection |
| 26 | + |
| 27 | +[FAIL] IA.L1-3.5.2 - Security Control |
| 28 | + Issue: 2 users without MFA enabled: auditkit-test, test-user-no-mfa |
| 29 | + Fix: Enable MFA for all IAM users accessing CUI systems |
| 30 | + |
| 31 | +[FAIL] SC.L1-3.13.1 - Security Control |
| 32 | + Issue: 1 security groups allow unrestricted internet access (0.0.0.0/0) |
| 33 | + Fix: Restrict Security Group rules to specific IP ranges, not 0.0.0.0/0 |
| 34 | + |
| 35 | +Manual Documentation Required: |
| 36 | +================================= |
| 37 | +[INFO] MP.L1-3.8.3 - Security Control |
| 38 | + Guidance: MANUAL PROCESS: Verify secure deletion procedures for EBS volumes and S3 objects containing CUI |
| 39 | + Evidence: Document secure deletion procedures | EC2 → Volumes → Screenshot encrypted volumes | S3 → Lifecycle policies |
| 40 | + |
| 41 | +[INFO] MP.L1-3.8.2 - Security Control |
| 42 | + Guidance: Found 1 S3 buckets - manual review of bucket policies required |
| 43 | + Evidence: AWS Console → S3 → Each bucket → Permissions → Screenshot bucket policies and access controls |
| 44 | + |
| 45 | +[INFO] PS.L1-3.9.1 - Security Control |
| 46 | + Guidance: MANUAL PROCESS: Personnel screening procedures must be documented and implemented |
| 47 | + Evidence: HR Documentation → Screenshot personnel screening policy | Access approval records → Screenshot showing completed screenings |
| 48 | + |
| 49 | +[INFO] SC.L1-3.13.5 - Security Control |
| 50 | + Guidance: MANUAL CHECK: Verify KMS encryption is configured for all CUI data |
| 51 | + Evidence: AWS Console → KMS → Keys → Screenshot showing customer-managed keys | S3/EBS/RDS → Screenshot showing encryption enabled |
| 52 | + |
| 53 | +[INFO] SC.L1-3.13.11 - Security Control |
| 54 | + Guidance: AWS KMS uses FIPS 140-2 validated cryptographic modules - verify usage |
| 55 | + Evidence: AWS Console → KMS → Screenshot showing FIPS-validated key usage | Documentation → Screenshot FIPS compliance |
| 56 | + |
| 57 | +[INFO] SC.L1-3.13.17 - Security Control |
| 58 | + Guidance: MANUAL CHECK: Verify IAM session timeout policies are configured |
| 59 | + Evidence: AWS Console → IAM → Account settings → Screenshot session duration limits |
| 60 | + |
| 61 | +[INFO] SI.L1-3.14.1 - Security Control |
| 62 | + Guidance: MANUAL CHECK: Verify Systems Manager Patch Manager is configured |
| 63 | + Evidence: AWS Console → Systems Manager → Patch Manager → Screenshot patch compliance |
| 64 | + |
| 65 | +[INFO] SI.L1-3.14.2 - Security Control |
| 66 | + Guidance: MANUAL CHECK: Verify GuardDuty is enabled and endpoint protection is deployed |
| 67 | + Evidence: AWS Console → GuardDuty → Screenshot enabled status | EC2 → Screenshot endpoint protection |
| 68 | + |
| 69 | +[INFO] SI.L1-3.14.4 - Security Control |
| 70 | + Guidance: GuardDuty automatically updates - verify endpoint protection has auto-updates enabled |
| 71 | + Evidence: AWS Console → GuardDuty → Settings | EC2 → Screenshot endpoint auto-update config |
| 72 | + |
| 73 | +[INFO] SI.L1-3.14.6 - Security Control |
| 74 | + Guidance: MANUAL CHECK: Verify Security Hub is enabled and alerting is configured |
| 75 | + Evidence: AWS Console → Security Hub → Screenshot alerts dashboard | CloudWatch → Screenshot alarms |
| 76 | + |
| 77 | +[INFO] SI.L1-3.14.7 - Security Control |
| 78 | + Guidance: AWS security services auto-update - verify endpoint agents have update mechanisms |
| 79 | + Evidence: AWS Console → Security services → Screenshot version status |
| 80 | + |
| 81 | +[32mPassed Controls:[0m |
| 82 | +=================== |
| 83 | + - AC.L1-3.1.1 - Security Control |
| 84 | + - IA.L1-3.5.1 - Security Control |
| 85 | + - SC.L1-3.13.16 - Security Control |
| 86 | + |
| 87 | +Priority Action Items: |
| 88 | +========================= |
| 89 | + 1. Enable continuous compliance monitoring |
| 90 | + 2. Document your security policies and procedures |
| 91 | + 3. Set up automated alerting for security events |
| 92 | + 4. Schedule quarterly access reviews |
| 93 | + |
| 94 | +For detailed CMMC report with full evidence checklist: |
| 95 | + auditkit scan -provider aws -framework cmmc -format pdf -output report.pdf |
| 96 | + |
| 97 | +To track evidence collection progress: |
| 98 | + auditkit evidence -provider aws |
| 99 | + |
0 commit comments