What's new?
- Added the following new controls to the AWS Foundational Security Best Practices benchmark: (#468)(#457)
- AutoScaling.3
- AutoScaling.4
- CloudFormation.1
- CloudFront.10
- EC2.23
- EC2.24
- EC2.27
- ECR.1
- ECR.2
- ECS.3
- ECS.4
- ECS.5
- ECS.8
- ECS.10
- ECS.12
- EFS.3
- EFS.4
- EKS.2
- ELB.12
- ELB.13
- ELB.14
- Kinesis.1
- NetworkFirewall.3
- NetworkFirewall.4
- NetworkFirewall.5
- OpenSearch.7
- Redshift.9
- S3.13
- SNS.2
- WAF.6
- WAF.7
- WAF.8
Enhancements
- Updated the
kms_cmk_rotation_enabled
query to skip KMS keys which are either inPendingDeletion
orDisabled
state since we cannot set rotation for such keys. (#466) (Thanks to @yorinasub17 for the contribution!)
Breaking changes
- Renamed the control and the query
dynamodb_table_encrypted_with_kms_cmk
todynamodb_table_encrypted_with_kms
to maintain consistency with AWS documentation. (#467) (Thanks to @pdecat for the contribution!)
Dependencies
- AWS plugin
v0.71.0
or higher is now required. (#470)
What's new?
- Added CISA Cyber Essentials benchmark (
steampipe check benchmark.cisa_cyber_essentials
). (#454)
Bug fixes
- Added the missing
resource
column in thevpc_flow_logs_enabled
query so that all the controls using this query will get executed correctly instead of returning an error. (#463) (Thanks to @yorinasub17 for the contribution!)
What's new?
- Added NIST 800-171 Revision 2 benchmark (
steampipe check benchmark.nist_800_171_rev_2
). (#453)
Enhancements
- Updated
guardduty_enabled
,iam_access_analyzer_enabled
andsecurityhub_enabled
queries to skip the regions which have been disabled. (#451)
Dependencies
- AWS plugin
v0.68.0
or higher is now required (#446)
What's new?
- Added GxP 21 CFR Part 11 benchmark (
steampipe check benchmark.gxp_21_cfr_part_11
). (#436) - Added Other Compliance Checks benchmark (
steampipe check benchmark.other
). (#431)
Enhancements
- Updated the
config_enabled_all_regions
query to skip the regions which have been disabled. (#437) (Thanks to @yorinasub17 for the contribution!)
Bug fixes
- Fixed the
vpc_flow_logs_enabled
query to skip VPCs which are shared with the owner account, since flow logs cannot be enabled for shared VPCs. (#444)
What's new?
- Added Federal Financial Institutions Examination Council (FFIEC) benchmark (
steampipe check benchmark.ffiec
). (#420)
Bug fixes
- Fixed the
backup_plan_min_retention_35_days
query to check if the backup plan retention period is more than35
days instead of37
days. (#424) - Fixed the
lambda_function_restrict_public_access
query to correctly evaluate if a lambda function is restricting public access or not. (#422)
Enhancements
- Updated the
NIST 800-53
link in the docs/index.md file to reference the latestNIST 800-53 Revision 5
document. (#407)
Bug fixes
- Fixed the typo in the query name to use
ebs_volume_unused
instead ofebs_volume_unsued
. (#412) - Fixed the typo
Prinipal
inlambda_function_restrict_public_access
query. (#413)
What's new?
- Added NIST 800-53 Revision 5 benchmark (
steampipe check benchmark.nist_800_53_rev_5
). (#399)
Bug fixes
- Fixed the
rds_db_instance_deletion_protection_enabled
query to skip Amazon RDS Aurora, DocumentDB and Neptune DB instances, since deletion protection can only be enabled at the cluster level for such instances. (#401) - Fixed the
foundational_security_s3_9
control to correctly references3_bucket_logging_enabled
query instead ofs3_bucket_public_access_blocked
query. (#403)
What's new?
- Added FedRAMP Low Revision 4 benchmark (
steampipe check benchmark.fedramp_low_rev_4
). - Added FedRAMP Moderate Revision 4 benchmark (
steampipe check benchmark.fedramp_moderate_rev_4
).
Bug fixes
- Fixed
lambda_function_multiple_az_configured
query to correctly check if Lambda functions have more than one availability zone. (#392) - Fixed
lambda_function_use_latest_runtime
query to correctly returnskip
instead ofalarm
if the deployment package type iszip
. (#392)
Dependencies
- AWS plugin
v0.59.0
or higher is now required. (#390)
What's new?
- New PCI v3.2.1 benchmark added: (#385)
- OpenSearch (
steampipe check benchmark.pci_v321_opensearch
)
- OpenSearch (
- New PCI v3.2.1 controls added: (#385)
- OpenSearch.1 (
steampipe check control.pci_v321_opensearch_1
) - OpenSearch.2 (
steampipe check control.pci_v321_opensearch_2
)
- OpenSearch.1 (
Enhancements
- Updated docs/index.md and README with new dashboard screenshots and latest format. (#379)
Bug fixes
- Fixed incorrect doc link for
pci_v321_s3_5
control. (#381)
Bug fixes
- Fixed
resource
column inguardduty_enabled
query to be the AWS region ARN instead of the GuardDuty detector ARN. - Fixed
resource
column insecurityhub_enabled
query to be the AWS region ARN instead of the Security Hub hub ARN. - Renamed
soc2
directory and filenames to usesoc_2
(no impact on benchmarks or controls).
Enhancements
- Added
category
,service
, andtype
tags to benchmarks and controls. (#375) - Improved reason in
iam_root_user_hardware_mfa_enabled
query when a virtual MFA device is enabled.
Bug fixes
- Fixed
resource
iniam_access_analyzer_enabled
query to be the region ARN.
Enhancements
- Renamed several IAM policy and account password policy query names to be more consistent with other query names. (#367)
Bug fixes
- The
cis_v130_1_16
andcis_v140_1_16
controls now only show results for attached IAM policies. (#367) - The
iam_all_policy_no_service_wild_card
control now only checks customer managed IAM policies for full service access statements. (#367) - Fixed
iam_all_policy_no_service_wild_card
andfoundational_security_iam_21
controls not alarming if any policy statements grant*:*
, as these statements also grant full access to at least 1 AWS service. (#367) - Removed
iam_all_policy_no_service_wild_card.sql
andiam_policy_in_use.sql
queries as these were unused by any controls. (#367)
What's new?
- New AWS Foundational Security Best Practices controls added:
- CloudFront.9
- ECR.3
- ELB.10
- S3.11
Bug fixes
- Fixed the
guardduty_enabled
query to only check if GuardDuty is enabled and no longer check if S3 logging is enabled. (#360)
Bug fixes
- The
foundational_security_networkfirewall
benchmark is now a child of thefoundational_security
benchmark.
What's new?
- New AWS Foundational Security Best Practices controls added:
- AutoScaling.2
- AutoScaling.5
- CloudFront.7
- CloudFront.8
- CodeBuild.4
- CodeBuild.5
- EC2.21
- EC2.22
- Lambda.5
- NetworkFirewall.5
- RDS.24
- RDS.25
- Redshift.8
- S3.10
- S3.9
Bug fixes
- Fixed the
dynamodb_table_auto_scaling_enabled
query to correctly check if the tables have on-demand capacity mode enabled or not (#350)
Enhancements
- Updated the following queries to use
cidr_ipv4
column instead of the deprecatedcidr_ip
column (#342)- vpc_security_group_allows_ingress_authorized_ports
- vpc_security_group_remote_administration
- vpc_security_group_restrict_ingress_common_ports_all
- vpc_security_group_restrict_ingress_ssh_all
- vpc_security_group_restrict_ingress_tcp_udp_all
- vpc_security_group_restricted_common_ports
What's new?
- RBI Cyber Security Framework benchmark (
steampipe check benchmark.rbi_cyber_security
) now includes 17 new controls and 7 new queries (331)
Bug fixes
- Fixed the
config_enabled_all_regions
query to correctly evaluate if AWS Config is enabled in the account for the local Region and is recording all resources (325)
What's new?
- New NIST CSF benchmarks added:
- DE.CM-2
- DE.CM-5
- ID.AM-1
- ID.AM-5
- ID.RA-5
- ID.SC-4
- PR.DS-7
- PR.DS-8
- PR.IP-2
- PR.IP-8
- PR.IP-9
- PR.IP-12
- RC.RP-1
- RS.MI-3
- RS.RP-1
Bug fixes
- Fixed the
dynamodb_table_auto_scaling_enabled
query to correctly evaluate if auto scaling is enabled for a DynamoDB table instead of throwing a validation error (319)
What's new?
- Added: AWS Audit Manager Control Tower Guardrails benchmark (
steampipe check aws_compliance.benchmark.audit_manager_control_tower
)
Bug fixes
- Fixed the
backup_plan_min_retention_35_days
query to correctly evaluate backup plan rules where the lifecycle is set toNever Expire
(314)
What's new?
- Additional benchmarks (
hipaa_164_308
andhipaa_164.312
) have been added to thehipaa
benchmark to improve its structure and readability - New HIPAA benchmarks added:
- 164.308(a)(1)(ii)(A) Risk analysis
- 164.308(a)(4)(ii)(A) Isolating health care clearinghouse functions
- 164.308(a)(5)(ii)(B) Protection from malicious software
- 164.308(a)(5)(ii)(C) Log-in monitoring
- 164.308(a)(5)(ii)(D) Password management
- 164.308(a)(7)(ii)(B) Disaster recovery plan
- 164.308(a)(7)(ii)(C) Emergency mode operation plan
- 164.308(a)(8) Evaluation
What's new?
- Added: System and Organization Controls (SOC 2) benchmark (
steampipe check aws_compliance.benchmark.soc_2
)
What's new?
- New AWS Foundational Security Best Practices controls added:
- ES.4
- ES.5
Bug fixes
- Fixed the metric filter pattern in the
log_metric_filter_unauthorized_api
query as per the CIS documentation (#294) - Fixed the
rds_db_instance_logging_enabled
query to correctly evaluate if logging is enabled forSQL Server Express Edition
DB engine type (296)
Bug fixes
- Fixed the metric filter pattern in the
log_metric_filter_organization
query as per the CIS documentation (#271) cis_v140_1_16
control now refers toiam_all_policy_no_star_star
query which evaluates all the attached IAM policies(both AWS and customer managed) instead of only IAM customer managed policies (#281)foundational_security_iam_1
control now refers toiam_custom_policy_no_star_star
query which only evaluates IAM customer managed policies instead of evaluating both customer and AWS managed IAM policies (#281)foundational_security_iam_21
control now refers toiam_custom_policy_no_service_wild_card
query which correctly checks if there are any IAM customer managed policies that allow wildcard access for services (#281)
What's new?
- Added: AWS General Data Protection Regulation(GDPR) benchmarks and controls (
steampipe check benchmark.gdpr
)
Enhancements
vpc_security_group_associated
control name has been renamed tovpc_security_group_associated_to_eni
which now refersvpc_security_group_associated_to_eni
query
Bug fixes
vpc_security_group_associated
query will no longer return duplicate security groups (#283)- Fixed the missing filter patterns in
log_metric_filter_root_login
andlog_metric_filter_unauthorized_api
queries (#285) (#278) cis_v130_1_12
andcis_v140_1_12
controls will now render<root_account>
user status asinfo
(#286)
Bug fixes
foundational_security_elasticbeanstalk_1
control will now correctly reference theelastic_beanstalk_enhanced_health_reporting_enabled
query instead of theapigateway_stage_logging_enabled
query
What's new?
- New AWS Foundational Security Best Practices controls added:
- APIGateway.5
- EC2.15
- EC2.19
- ElasticBeanstalk.1
- ELB.7
- Lambda.4
- RDS.18
- RDS.19
- RDS.20
- RDS.21
- RDS.22
- RDS.23
- SQS.1
What's new?
- New AWS Foundational Security Best Practices controls added:
- APIGateway.3
- APIGateway.4
- CloudFront.5
- CloudFront.6
- EC2.16
- EC2.17
- EC2.18
- ECS.1
- ECS.2
- ES.4
- ES.6
- ES.7
- ES.8
- IAM.21
- RDS.15
- RDS.16
- RDS.17
- Redshift.4
- S3.8
Bug fixes
- Fixed: Update multiple CloudTrail, CloudWatch, Config, Lambda, and S3 queries to work properly with multi-account connections (#247)
- Fixed: Cleanup unnecessary quotes in various CloudFront, CloudTrail, GuardDuty and S3 queries (#249)
What's new?
- Added: NIST 800-53 Revision 4 benchmark (
steampipe check benchmark.nist_800_53_rev_4
)
What's new?
- Added: NIST Cybersecurity Framework (CSF) benchmark (
steampipe check benchmark.nist_csf
) - New AWS Foundational Security Best Practices controls added:
- CodeBuild.1
- CodeBuild.2
- New HIPAA controls added:
- codebuild_project_source_repo_oauth_configured
- New PCI v3.2.1 controls added:
- CodeBuild.1
Enhancements
- Updated: AWS Foundational Security Best Practices benchmark title now includes
AWS
for better readability - Updated: Update column reference
table_arn
toarn
indynamodb_table_auto_scaling_enabled
,dynamodb_table_encrypted_with_kms_cmk
,dynamodb_table_in_backup_plan
,dynamodb_table_point_in_time_recovery_enabled
queries - Updated: Update column reference
file_system_arn
toarn
inefs_file_system_automatic_backups_enabled
,efs_file_system_encrypt_data_at_rest
queries
What's new?
- New RBI Cyber Security Framework controls added:
- dynamodb_table_in_backup_plan
- ebs_volume_in_backup_plan
- efs_file_system_in_backup_plan
- rds_db_instance_in_backup_plan
What's new?
- Added: RBI Cyber Security Framework benchmark (
steampipe check benchmark.rbi_cyber_security
) - New Foundational Security controls added:
- CloudTrail.1
- EC2.7
- EFS.2
- SSM.2
- SSM.3
- New HIPAA controls added:
- cloudtrail_trail_enabled
- guardduty_finding_archived
- vpc_vpn_tunnel_up
- New PCI v3.2.1 controls added:
- SSM.1
- SSM.2
Enhancements
- Updated: CIS v1.3.0 and v1.4.0 benchmarks and controls now include the
service
tag - Updated: Replaced
benchmark
tag for all benchmarks and controls with framework specific tags, e.g.,cis = true
,hipaa = true
What's new?
- Added: HIPAA benchmark (
steampipe check benchmark.hipaa
)
What's new?
- Added: CIS v1.4.0 benchmark (
steampipe check benchmark.cis_v140
) - Added: AWS Foundational Security Best Practices benchmark (
steampipe check benchmark.foundational_security
)
Bug fixes
- Minor fixes in the docs
What's new?
- Added: Documentation for various PCI v3.2.1 benchmarks and controls
- New PCI v3.2.1 controls added
- CloudWatch.1
- CodeBuild.2
- EC2.3
- ELBV2.2
- GuardDuty.1
- S3.3
Bug fixes
- Fixed:
autoscaling_group_with_lb_use_healthcheck
query should skip groups that aren't associated with a load balancer (#30)