Your checklists (
0
)
AI Checklist Generator
From the makers of
Manifestly Checklists
Sign in
Email address
Email me a magic link
Home
> AWS cloud secur0ity review
AWS cloud secur0ity review
Identity and Access Management (IAM)
Review IAM users, groups, and roles to ensure least privilege access.
List all IAM users, groups, and roles.
Assess permissions assigned to each entity.
Remove unnecessary permissions.
Ensure users have only required access.
Document changes made for compliance.
Check for unused IAM users and roles; deactivate or delete as necessary.
Identify IAM users and roles not accessed in the last 90 days.
Evaluate the necessity of each unused entity.
Deactivate users and roles initially.
Delete after a grace period if still unused.
Notify stakeholders before deletion.
Enable multi-factor authentication (MFA) for all privileged accounts.
Identify privileged IAM accounts.
Access the IAM console.
Select each account and enable MFA.
Guide users to configure their MFA devices.
Verify MFA is functioning correctly.
Review IAM policies for overly permissive permissions.
Audit all IAM policies for permission breadth.
Identify policies granting access beyond necessity.
Modify or restrict permissions as needed.
Implement policy conditions for tighter control.
Regularly review policies for compliance.
Implement IAM roles for applications running on AWS services instead of using access keys.
Identify applications requiring AWS service access.
Create IAM roles with necessary permissions.
Assign roles to applications via instance profiles.
Eliminate hard-coded access keys from applications.
Monitor role usage and adjust as needed.
Data Protection
Ensure data is encrypted in transit using TLS/SSL.
Use HTTPS for all web applications.
Configure load balancers to enforce TLS.
Regularly review and update TLS certificates.
Test for vulnerabilities using tools like SSL Labs.
Ensure secure cipher suites are enabled.
Check if data at rest is encrypted using AWS KMS or S3 server-side encryption.
Verify encryption settings on S3 buckets.
Use AWS KMS for managing encryption keys.
Check IAM policies for KMS access permissions.
Enable default encryption on new S3 buckets.
Review encryption status of existing data.
Review S3 bucket policies and permissions to ensure data is not publicly accessible.
Audit bucket policies for public access settings.
Use AWS Trusted Advisor to identify risks.
Restrict access to specific IAM roles/users.
Enable Block Public Access settings on buckets.
Regularly monitor bucket access logs.
Enable versioning and logging for S3 buckets that contain sensitive data.
Turn on versioning for each sensitive S3 bucket.
Configure server access logging for tracking access.
Store logs in a separate, secure bucket.
Regularly review logs for unusual access patterns.
Implement lifecycle policies for old versions.
Implement proper backup solutions for critical data.
Use AWS Backup to automate backups.
Schedule regular backups for RDS and EBS volumes.
Store backups in a different AWS region.
Test backup restoration processes periodically.
Ensure backups are encrypted and compliant.
Network Security
Review security groups and network ACLs for overly permissive rules.
List all security groups and network ACLs.
Identify rules allowing unrestricted access (0.0.0.0/0).
Check for unnecessary inbound and outbound rules.
Remove or restrict overly permissive rules.
Document changes and review regularly.
Ensure that VPCs and subnets are configured correctly for isolated environments.
Verify VPC cidr blocks to avoid overlaps.
Ensure subnets are private or public as required.
Check route tables for appropriate traffic flow.
Confirm network segregation between environments.
Implement proper NAT gateways for private subnets.
Check for the use of AWS Shield and AWS WAF to protect against DDoS attacks.
Verify AWS Shield is enabled for critical resources.
Review AWS WAF rules for web application protection.
Check for rate limiting and IP blocking rules.
Ensure logging is enabled for WAF metrics.
Regularly update WAF rules based on threat intelligence.
Review VPN and Direct Connect configurations for secure connections to on-premises.
Check VPN configurations for strong encryption protocols.
Review Direct Connect settings for proper access control.
Verify redundancy and failover settings.
Ensure logging is enabled for connection monitoring.
Regularly test the connections for reliability.
Implement flow logs for VPCs to monitor network traffic.
Enable flow logs for each VPC.
Choose appropriate log format (e.g., Apache or JSON).
Set up S3 bucket or CloudWatch Logs for storage.
Define retention policies for log data.
Review logs regularly for suspicious activity.
Monitoring and Logging
Enable CloudTrail for logging API calls across all AWS services.
Navigate to the CloudTrail console.
Select 'Create trail' and provide a name.
Choose 'All Regions' for coverage.
Configure S3 bucket for log storage.
Enable CloudWatch Logs if desired.
Review and complete the trail setup.
Review CloudWatch logs and metrics for suspicious activities.
Access the CloudWatch console.
Go to 'Logs' and select relevant log groups.
Set filters for specific error codes or anomalies.
Review metrics for unexpected spikes or changes.
Establish a routine for regular log reviews.
Implement AWS Config to monitor configuration changes and compliance.
Open the AWS Config console.
Select 'Get started' and configure resource types.
Set up rules for compliance checks.
Enable recording of configuration changes.
Review resource history and compliance status regularly.
Set up alerts for critical changes or potential security incidents.
Use CloudWatch Alarms for monitoring thresholds.
Create SNS topics for alert notifications.
Set up rules in AWS Config for non-compliance.
Integrate with Lambda for automated responses.
Test alerts to ensure proper functioning.
Ensure log data is retained for an appropriate period for forensic analysis.
Determine retention period based on compliance needs.
Configure S3 bucket lifecycle policies for logs.
Regularly review retention settings for updates.
Ensure logs are securely stored and encrypted.
Establish a process for log retrieval during incidents.
Incident Response
Develop and maintain an incident response plan tailored for AWS environments.
Identify critical assets and data in AWS.
Define roles and responsibilities for incident response team.
Establish procedures for detection, reporting, and escalation.
Document response workflows for various incident types.
Regularly test and refine the plan based on new threats.
Conduct regular tabletop exercises to test the incident response plan.
Schedule exercises quarterly with all relevant team members.
Simulate various incident scenarios relevant to AWS.
Evaluate team responses and decision-making processes.
Gather feedback and identify areas for improvement.
Update the incident response plan based on exercise outcomes.
Ensure that all team members are aware of their roles in the event of a security incident.
Create a clear role assignment document.
Distribute the document to all team members.
Conduct training sessions on incident response roles.
Reinforce role awareness during regular meetings.
Encourage questions to clarify responsibilities.
Regularly review and update incident response tools and procedures.
Assess current tools for effectiveness and compatibility.
Stay informed about new security tools and technologies.
Update procedures based on recent incidents and findings.
Incorporate feedback from incident response exercises.
Document all changes and communicate updates to the team.
Maintain a communication plan for notifying stakeholders during an incident.
Identify key stakeholders and their contact information.
Define communication protocols and channels for incidents.
Develop templates for incident notifications.
Test communication plan during tabletop exercises.
Ensure timely updates and follow-ups during real incidents.
Compliance and Governance
Review compliance with relevant regulations (e.g., GDPR, HIPAA, PCI-DSS).
Identify applicable regulations for your industry.
Assess current AWS configurations against compliance requirements.
Document compliance status for each regulation.
Engage legal and compliance teams for insights.
Implement necessary changes to meet compliance.
Ensure that AWS accounts are organized and managed under an AWS Organizations framework.
Create an AWS Organization if not already set up.
Organize accounts into appropriate Organizational Units (OUs).
Apply Service Control Policies (SCPs) to enforce governance.
Regularly review account structure for efficiency.
Train staff on using AWS Organizations effectively.
Conduct regular security assessments and audits.
Schedule assessments at regular intervals (quarterly or bi-annually).
Use AWS Tools like Inspector and Config for automation.
Review findings and prioritize vulnerabilities.
Engage third-party auditors if necessary.
Document all findings and remediation actions.
Maintain documentation of security policies and procedures.
Draft clear, concise security policies relevant to your AWS usage.
Update documentation regularly to reflect changes.
Ensure accessibility of documentation for all stakeholders.
Conduct training sessions on policies for staff.
Store documentation securely in a version-controlled environment.
Implement a continuous improvement process based on audit findings and security incidents.
Establish a feedback loop from audits and incidents.
Review and analyze findings to identify trends.
Update policies and procedures based on insights.
Communicate changes to all relevant stakeholders.
Monitor implementation of improvements for effectiveness.
Download CSV
Download JSON
Download Markdown
Use in Manifestly