This composite monitors iam and reports best practice violations, standards body policy violations, and inventory
This composite monitors iam against best practices and reports violations and inventory
None
- description: Would you like to receive empty reports? Options - true / false. Default is false.
- default: false
- description: Send reports always or only when there is a change? Options - always / change. Default is change.
- default: change
- description: Number of days for which password has not been used
- default: 30
- description: This is a list of group permissions that signify an admin on the system. Used specifically for 3.1.1
- default: iam:PutGroupPolicy, iam:PutRolePolicy, iam:PutUserPolicy, iam:CreatePolicy, iam:CreatePolicyVersion, iam:AttachGroupPolicy, iam:AttachRolePolicy, iam:AttachUserPolicy
- description: Which rules would you like to run? Possible values are iam-inventory-users iam-inventory-roles iam-inventory-policies iam-inventory-groups iam-unusediamgroup iam-multiple-keys iam-root-multiple-keys iam-inactive-key-no-rotation iam-active-key-no-rotation iam-missing-password-policy iam-passwordreuseprevention iam-expirepasswords iam-no-mfa iam-root-active-password iam-user-attached-policies iam-password-policy-uppercase iam-password-policy-lowercase iam-password-policy-symbol iam-password-policy-number iam-password-policy-min-length iam-root-access-key-1 iam-root-access-key-2 iam-cloudbleed-passwords-not-rotated iam-support-role iam-user-password-not-used iam-unused-access iam-no-hardware-mfa-root iam-active-root-user iam-mfa-password-holders manual-ensure-security-questions manual-detailed-billing iam-root-key-access iam-root-no-mfa manual-strategic-iam-roles iam-initialization-access-key manual-contact-details manual-security-contact manual-resource-instance-access manual-full-privilege-user manual-appropriate-sns-subscribers manual-least-access-routing-tables iam-user-is-admin
- default: iam-unusediamgroup, iam-multiple-keys, iam-root-multiple-keys, iam-inactive-key-no-rotation, iam-active-key-no-rotation, iam-missing-password-policy, iam-passwordreuseprevention, iam-expirepasswords, iam-no-mfa, iam-root-active-password, iam-user-attached-policies, iam-password-policy-uppercase, iam-password-policy-lowercase, iam-password-policy-symbol, iam-password-policy-number, iam-password-policy-min-length, iam-cloudbleed-passwords-not-rotated, iam-support-role, iam-omnipotent-policy, iam-user-password-not-used, iam-unused-access, iam-no-hardware-mfa-root, iam-active-root-user, iam-mfa-password-holders, manual-ensure-security-questions, manual-detailed-billing, iam-root-key-access, iam-root-no-mfa, manual-strategic-iam-roles, iam-initialization-access-key, manual-contact-details, manual-security-contact, manual-resource-instance-access, manual-full-privilege-user, manual-appropriate-sns-subscribers, manual-least-access-routing-tables, manual-obscure-auth-info, manual-least-access-routing-tables, manual-maintenance-records, manual-approved-monitored-maintenance, manual-component-removal-approval
- description: Enter a custom report subject name.
- description: Enter the email address(es) that will receive notifications. If more than one, separate each with a comma.
- description: The AWS account number. Required for a full CIS audit. This can be found by the root user at https://console.aws.amazon.com/billing/home?#/account
- description: JSON object of string or regex of aws objects to include or exclude and tag in audit
- description: Enter S3 bucket name to upload reports. (Optional)
- Audit
- Best Practices
- Inventory
- iam
- AWS Services Audit