Skip to content

Commit 4f13078

Browse files
committed
fix: change framework structure
1 parent 8377268 commit 4f13078

File tree

2,003 files changed

+28837
-31777
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,003 files changed

+28837
-31777
lines changed

compliance/frameworks/aws/aws_acsc_essential_eight.yaml

Lines changed: 492 additions & 512 deletions
Large diffs are not rendered by default.

compliance/frameworks/aws/aws_acsc_essential_eight/aws_acsc_essential_eight.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,10 @@ framework:
33
title: Australian Cyber Security Center (ACSC) Essential Eight
44
description: The Australian Cyber Security Center (ACSC) Essential Eight is a set of baseline security strategies designed to mitigate cyber security incidents. The Essential Eight is a prioritized list of mitigation strategies that organizations can implement to protect their systems against a range of adversaries. The Essential Eight is based on the Australian Signals Directorate (ASD) Strategies to Mitigate Cyber Security Incidents.
55
section-code: aws_acsc_essential_eight
6-
metadata:
7-
defaults:
8-
auto-assign: false
9-
enabled: false
10-
tracks-drift-events: false
11-
tags: {}
6+
defaults:
7+
auto-assign: false
8+
enabled: false
9+
tracks-drift-events: false
1210
control-group:
1311
- id: aws_acsc_essential_eight_ml_1
1412
- id: aws_acsc_essential_eight_ml_2

compliance/frameworks/aws/aws_acsc_essential_eight/aws_acsc_essential_eight_ml_1.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,10 @@ control-group:
33
title: ACSC Essential Eight Maturity Level 1
44
description: The availability category refers to the accessibility of information used by the entity’s systems, as well as the products or services provided to its customers.
55
section-code: ml_1
6-
metadata:
7-
defaults:
8-
auto-assign: null
9-
enabled: false
10-
tracks-drift-events: false
11-
tags: {}
6+
defaults:
7+
auto-assign: null
8+
enabled: false
9+
tracks-drift-events: false
1210
control-group:
1311
- id: aws_acsc_essential_eight_ml_1_2
1412
- id: aws_acsc_essential_eight_ml_1_5

compliance/frameworks/aws/aws_acsc_essential_eight/aws_acsc_essential_eight_ml_1_2.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,9 @@ control-group:
33
title: "ACSC-EE-ML1-2: Patch applications ML1"
44
description: A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.
55
section-code: "2"
6-
metadata:
7-
defaults:
8-
auto-assign: null
9-
enabled: false
10-
tracks-drift-events: false
11-
tags: {}
6+
defaults:
7+
auto-assign: null
8+
enabled: false
9+
tracks-drift-events: false
1210
control-group:
1311
- id: aws_acsc_essential_eight_ml_1_2_5

compliance/frameworks/aws/aws_acsc_essential_eight/aws_acsc_essential_eight_ml_1_2_5.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,10 @@ control-group:
33
title: "ACSC-EE-ML1-2.5: Patch applications ML1"
44
description: Patches, updates or vendor mitigations for security vulnerabilities in internet-facing services are applied within two weeks of release, or within 48 hours if an exploit exists.
55
section-code: "5"
6-
metadata:
7-
defaults:
8-
auto-assign: null
9-
enabled: false
10-
tracks-drift-events: false
11-
tags: {}
6+
defaults:
7+
auto-assign: null
8+
enabled: false
9+
tracks-drift-events: false
1210
controls:
1311
- aws_ecs_service_fargate_using_latest_platform_version
1412
- aws_eks_cluster_with_latest_kubernetes_version

compliance/frameworks/aws/aws_acsc_essential_eight/aws_acsc_essential_eight_ml_1_5.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,10 @@ control-group:
33
title: "ACSC-EE-ML1-5: Restrict administrative privileges ML1"
44
description: The restriction of administrative privileges is the practice of limiting the number of privileged accounts and the extent of their access to systems and data.
55
section-code: "5"
6-
metadata:
7-
defaults:
8-
auto-assign: null
9-
enabled: false
10-
tracks-drift-events: false
11-
tags: {}
6+
defaults:
7+
auto-assign: null
8+
enabled: false
9+
tracks-drift-events: false
1210
control-group:
1311
- id: aws_acsc_essential_eight_ml_1_5_2
1412
- id: aws_acsc_essential_eight_ml_1_5_3

compliance/frameworks/aws/aws_acsc_essential_eight/aws_acsc_essential_eight_ml_1_5_2.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,10 @@ control-group:
33
title: "ACSC-EE-ML1-5.2: Restrict administrative privileges ML1"
44
description: Privileged accounts (excluding privileged service accounts) are prevented from accessing the internet, email and web services.
55
section-code: "2"
6-
metadata:
7-
defaults:
8-
auto-assign: null
9-
enabled: false
10-
tracks-drift-events: false
11-
tags: {}
6+
defaults:
7+
auto-assign: null
8+
enabled: false
9+
tracks-drift-events: false
1210
controls:
1311
- aws_codebuild_project_environment_privileged_mode_disabled
1412
- aws_ecs_task_definition_container_non_privileged

compliance/frameworks/aws/aws_acsc_essential_eight/aws_acsc_essential_eight_ml_1_5_3.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,10 @@ control-group:
33
title: "ACSC-EE-ML1-5.3: Restrict administrative privileges ML1"
44
description: Privileged users use separate privileged and unprivileged operating environments.
55
section-code: "3"
6-
metadata:
7-
defaults:
8-
auto-assign: null
9-
enabled: false
10-
tracks-drift-events: false
11-
tags: {}
6+
defaults:
7+
auto-assign: null
8+
enabled: false
9+
tracks-drift-events: false
1210
controls:
1311
- aws_codebuild_project_environment_privileged_mode_disabled
1412
- aws_codebuild_project_source_repo_oauth_configured

compliance/frameworks/aws/aws_acsc_essential_eight/aws_acsc_essential_eight_ml_1_5_4.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,10 @@ control-group:
33
title: "ACSC-EE-ML1-5.4: Restrict administrative privileges ML1"
44
description: Unprivileged accounts cannot logon to privileged operating environments.
55
section-code: "4"
6-
metadata:
7-
defaults:
8-
auto-assign: null
9-
enabled: false
10-
tracks-drift-events: false
11-
tags: {}
6+
defaults:
7+
auto-assign: null
8+
enabled: false
9+
tracks-drift-events: false
1210
controls:
1311
- aws_codebuild_project_source_repo_oauth_configured
1412
- aws_ec2_instance_iam_profile_attached

compliance/frameworks/aws/aws_acsc_essential_eight/aws_acsc_essential_eight_ml_1_5_5.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,10 @@ control-group:
33
title: "ACSC-EE-ML1-5.5: Restrict administrative privileges ML1"
44
description: Privileged accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments.
55
section-code: "5"
6-
metadata:
7-
defaults:
8-
auto-assign: null
9-
enabled: false
10-
tracks-drift-events: false
11-
tags: {}
6+
defaults:
7+
auto-assign: null
8+
enabled: false
9+
tracks-drift-events: false
1210
controls:
1311
- aws_codebuild_project_environment_privileged_mode_disabled
1412
- aws_codebuild_project_source_repo_oauth_configured

0 commit comments

Comments
 (0)