Operational Best Practices for NERC CIP - Amazon Config
AWS 文档中描述的 AWS 服务或功能可能因区域而异。要查看适用于中国区域的差异,请参阅中国的 AWS 服务入门

本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。

Operational Best Practices for NERC CIP

Conformance packs provide a general-purpose compliance framework designed to enable you to create security, operational or cost-optimization governance checks using managed or custom Amazon Config rules and Amazon Config remediation actions. Conformance Packs, as sample templates, are not designed to fully ensure compliance with a specific governance or compliance standard. You are responsible for making your own assessment of whether your use of the Services meets applicable legal and regulatory requirements.

The following provides a sample mapping between the North American Electric Reliability Corporation Critical Infrastructure Protection Standards (NERC CIP) Amazon Config managed rules. Each Amazon Config rule applies to a specific Amazon resource, and relates to one or more NERC CIP controls. A NERC CIP control can be related to multiple Config rules. Refer to the table below for more detail and guidance related to these mappings.

Amazon Web Services 区域: All supported Amazon Web Services 区域 except Middle East (Bahrain)

控制 ID Control Description Amazon Config 规则 Guidance
CIP-003-7-R2-Part 4 Cyber Security Incident Response: Each Responsible Entity shall have one or more Cyber Security Incident response plan(s), either by asset or group of assets, which shall include: 4.1 Identification, classification, and response to Cyber Security Incidents; 4.2 Determination of whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and subsequent notification to the Electricity Information Sharing and Analysis Center (E-ISAC), unless prohibited by law; 4.3 Identification of the roles and responsibilities for Cyber Security Incident response by groups or individuals; 4.4 Incident handling for Cyber Security Incidents; 4.5 Testing the Cyber Security Incident response plan(s) at least once every 36 calendar months by: (1) responding to an actual Reportable Cyber Security

Amazon Security Hub helps to monitor unauthorized personnel, connections, devices, and software. Amazon Security Hub aggregates, organizes, and prioritizes the security alerts, or findings, from multiple Amazon services. Some such services are Amazon Security Hub, Amazon Inspector, Amazon Macie, Amazon Identity and Access Management (IAM) Access Analyzer, and Amazon Firewall Manager, and Amazon Partner solutions.
CIP-003-7-R2-Part 4 Cyber Security Incident Response: Each Responsible Entity shall have one or more Cyber Security Incident response plan(s), either by asset or group of assets, which shall include: 4.1 Identification, classification, and response to Cyber Security Incidents; 4.2 Determination of whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and subsequent notification to the Electricity Information Sharing and Analysis Center (E-ISAC), unless prohibited by law; 4.3 Identification of the roles and responsibilities for Cyber Security Incident response by groups or individuals; 4.4 Incident handling for Cyber Security Incidents; 4.5 Testing the Cyber Security Incident response plan(s) at least once every 36 calendar months by: (1) responding to an actual Reportable Cyber Security

Amazon GuardDuty can help to monitor and detect potential cybersecurity events by using threat intelligence feeds. These include lists of malicious IPs and machine learning to identify unexpected, unauthorized, and malicious activity within your Amazon Web Services 云 environment.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

dms-replication-not-public

Manage access to the Amazon Web Services 云 by ensuring DMS replication instances cannot be publicly accessed. DMS replication instances can contain sensitive information and access control is required for such accounts.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

ebs-snapshot-public-restorable-check

Manage access to the Amazon Web Services 云 by ensuring EBS snapshots are not publicly restorable. EBS volume snapshots can contain sensitive information and access control is required for such accounts.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

ec2-instance-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon Elastic Compute Cloud (Amazon EC2) instances cannot be publicly accessed. Amazon EC2 instances can contain sensitive information and access control is required for such accounts.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

elasticsearch-in-vpc-only

Manage access to the Amazon Web Services 云 by ensuring Amazon Elasticsearch Service (Amazon ES) Domains are within an Amazon Virtual Private Cloud (Amazon VPC). An Amazon ES domain within an Amazon VPC enables secure communication between Amazon ES and other services within the Amazon VPC without the need for an internet gateway, NAT device, or VPN connection.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

emr-master-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon EMR cluster master nodes cannot be publicly accessed. Amazon EMR cluster master nodes can contain sensitive information and access control is required for such accounts.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

restricted-ssh

Amazon Elastic Compute Cloud (Amazon EC2) Security Groups can help manage network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Not allowing ingress (or remote) traffic from 0.0.0.0/0 to port 22 on your resources help you restricting remote access.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

ec2-instances-in-vpc

Deploy Amazon Elastic Compute Cloud (Amazon EC2) instances within an Amazon Virtual Private Cloud (Amazon VPC) to enable secure communication between an instance and other services within the amazon VPC, without requiring an internet gateway, NAT device, or VPN connection. All traffic remains securely within the Amazon Web Services 云. Because of their logical isolation, domains that reside within anAmazon VPC have an extra layer of security when compared to domains that use public endpoints. Assign Amazon EC2 instances to an Amazon VPC to properly manage access.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

internet-gateway-authorized-vpc-only

Manage access to resources in the Amazon Web Services 云 by ensuring that internet gateways are only attached to authorized Amazon Virtual Private Cloud (Amazon VPC). Internet gateways allow bi-directional internet access to and from the Amazon VPC that can potentially lead to unauthorized access to Amazon VPC resources.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

Manage access to resources in the Amazon Web Services 云 by ensuring Amazon Lambda functions cannot be publicly accessed. Public access can potentially lead to degradation of availability of resources.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

Deploy Amazon Lambda functions within an Amazon Virtual Private Cloud (Amazon VPC) for a secure communication between a function and other services within the Amazon VPC. With this configuration, there is no requirement for an internet gateway, NAT device, or VPN connection. All the traffic remains securely within the Amazon Web Services 云. Because of their logical isolation, domains that reside within an Amazon VPC have an extra layer of security when compared to domains that use public endpoints. To properly manage access, Amazon Lambda functions should be assigned to a VPC.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

rds-instance-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information, and principles and access control is required for such accounts.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

rds-snapshots-public-prohibited

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information and principles and access control is required for such accounts.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

redshift-cluster-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Redshift clusters are not public. Amazon Redshift clusters can contain sensitive information and principles and access control is required for such accounts.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

restricted-common-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) security groups. Not restricting access to ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. This rule allows you to optionally set blockedPort1 - blockedPort5 parameters (Config Defaults: 20,21,3389,3306,4333). The actual values should reflect your organization's policies.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

s3-account-level-public-access-blocks

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Simple Storage Service (Amazon S3) buckets cannot be publicly accessed. This rule helps keeping sensitive data safe from unauthorized remote users by preventing public access. This rule allows you to optionally set the ignorePublicAcls (Config Default: True), blockPublicPolicy (Config Default: True), blockPublicAcls (Config Default: True), and restrictPublicBuckets parameters (Config Default: True). The actual values should reflect your organization's policies.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

s3-bucket-public-read-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

s3-bucket-public-write-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon SageMaker notebooks do not allow direct internet access. By preventing direct internet access, you can keep sensitive data from being accessed by unauthorized users.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

vpc-default-security-group-closed

Amazon Elastic Compute Cloud (Amazon EC2) security groups can help in the management of network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Restricting all the traffic on the default security group helps in restricting remote access to your Amazon resources.
CIP-003-8-Attachment 1-Section 3.1 Electronic Access Controls: For each asset containing low impact BES Cyber System(s) identified pursuant to CIP-002, the Responsible Entity shall implement electronic access controls to: 3.1 Permit only necessary inbound and outbound electronic access as determined by the Responsible Entity for any communications that are: ii. using a routable protocol when entering or leaving the asset containing the low impact BES Cyber System(s).

vpc-sg-open-only-to-authorized-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) Security Groups. Not restricting access on ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. By restricting access to resources within a security group from the internet (0.0.0.0/0) remote access can be controlled to internal systems.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

emr-kerberos-enabled

The access permissions and authorizations can be managed and incorporated with the principles of least privilege and separation of duties, by enabling Kerberos for Amazon EMR clusters. In Kerberos, the services and the users that need to authenticate are known as principals. The principals exist within a Kerberos realm. Within the realm, a Kerberos server is known as the key distribution center (KDC). It provides a means for the principals to authenticate. The KDC authenticates by issuing tickets for authentication. KDC 维护一个包含其领域中的委托人、它们的密码及其他有关每个委托人的管理信息的数据库。
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

iam-group-has-users-check

Amazon Identity and Access Management (IAM) can help you incorporate the principles of least privilege and separation of duties with access permissions and authorizations, by ensuring that IAM groups have at least one IAM user. Placing IAM users in groups based on their associated permissions or job function is one way to incorporate least privilege.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

iam-policy-no-statements-with-admin-access

Amazon Identity and Access Management (IAM) can help you incorporate the principles of least privilege and separation of duties with access permissions and authorizations, restricting policies from containing "Effect": "Allow" with "Action": "*" over "Resource": "*". Allowing users to have more privileges than needed to complete a task may violate the principle of least privilege and separation of duties.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

iam-root-access-key-check

Access to systems and assets can be controlled by checking that the root user does not have access keys attached to their Amazon Identity and Access Management (IAM) role. Ensure that the root access keys are deleted. Instead, create and use role-based Amazon Web Services 账户 to help to incorporate the principle of least functionality.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

iam-user-group-membership-check

Amazon Identity and Access Management (IAM) can help you restrict access permissions and authorizations, by ensuring IAM users are members of at least one group. Allowing users more privileges than needed to complete a task may violate the principle of least privilege and separation of duties.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

iam-user-no-policies-check

This rule ensures Amazon Identity and Access Management (IAM) policies are attached only to groups or roles to control access to systems and assets. Assigning privileges at the group or the role level helps to reduce opportunity for an identity to receive or retain excessive privileges.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

iam-user-unused-credentials-check

Amazon Identity and Access Management (IAM) can help you with access permissions and authorizations by checking for IAM passwords and access keys that are not used for a specified time period. If these unused credentials are identified, you should disable and/or remove the credentials, as this may violate the principle of least privilege. This rule requires you to set a value to the maxCredentialUsageAge (Config Default: 90). The actual value should reflect your organization's policies.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

dms-replication-not-public

Manage access to the Amazon Web Services 云 by ensuring DMS replication instances cannot be publicly accessed. DMS replication instances can contain sensitive information and access control is required for such accounts.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

ebs-snapshot-public-restorable-check

Manage access to the Amazon Web Services 云 by ensuring EBS snapshots are not publicly restorable. EBS volume snapshots can contain sensitive information and access control is required for such accounts.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

Manage access to resources in the Amazon Web Services 云 by ensuring Amazon Lambda functions cannot be publicly accessed. Public access can potentially lead to degradation of availability of resources.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

rds-instance-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information, and principles and access control is required for such accounts.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

rds-snapshots-public-prohibited

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information and principles and access control is required for such accounts.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

redshift-cluster-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Redshift clusters are not public. Amazon Redshift clusters can contain sensitive information and principles and access control is required for such accounts.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

s3-account-level-public-access-blocks

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Simple Storage Service (Amazon S3) buckets cannot be publicly accessed. This rule helps keeping sensitive data safe from unauthorized remote users by preventing public access. This rule allows you to optionally set the ignorePublicAcls (Config Default: True), blockPublicPolicy (Config Default: True), blockPublicAcls (Config Default: True), and restrictPublicBuckets parameters (Config Default: True). The actual values should reflect your organization's policies.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

s3-bucket-public-read-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

s3-bucket-public-write-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-004-6-R4-Part 4.1.1 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.1. Electronic access.

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon SageMaker notebooks do not allow direct internet access. By preventing direct internet access, you can keep sensitive data from being accessed by unauthorized users.
CIP-004-6-R4-Part 4.1.3 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.3. Access to designated storage locations, whether physical or electronic, for BES Cyber System Information.

s3-bucket-policy-grantee-check

Manage access to the Amazon Web Services 云 by enabling s3_ bucket_policy_grantee_check. This rule checks that the access granted by the Amazon S3 bucket is restricted by any of the Amazon principals, federated users, service principals, IP addresses, or Amazon Virtual Private Cloud (Amazon VPC) IDs that you provide.
CIP-004-6-R4-Part 4.1.3 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.3. Access to designated storage locations, whether physical or electronic, for BES Cyber System Information.

s3-bucket-public-read-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-004-6-R4-Part 4.1.3 Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the applicable requirement parts in CIP‐004‐6 Table R4 – Access Management Program. 4.1.3. Access to designated storage locations, whether physical or electronic, for BES Cyber System Information.

s3-bucket-public-write-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

dms-replication-not-public

Manage access to the Amazon Web Services 云 by ensuring DMS replication instances cannot be publicly accessed. DMS replication instances can contain sensitive information and access control is required for such accounts.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

ebs-snapshot-public-restorable-check

Manage access to the Amazon Web Services 云 by ensuring EBS snapshots are not publicly restorable. EBS volume snapshots can contain sensitive information and access control is required for such accounts.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

ec2-instance-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon Elastic Compute Cloud (Amazon EC2) instances cannot be publicly accessed. Amazon EC2 instances can contain sensitive information and access control is required for such accounts.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

elasticsearch-in-vpc-only

Manage access to the Amazon Web Services 云 by ensuring Amazon Elasticsearch Service (Amazon ES) Domains are within an Amazon Virtual Private Cloud (Amazon VPC). An Amazon ES domain within an Amazon VPC enables secure communication between Amazon ES and other services within the Amazon VPC without the need for an internet gateway, NAT device, or VPN connection.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

emr-master-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon EMR cluster master nodes cannot be publicly accessed. Amazon EMR cluster master nodes can contain sensitive information and access control is required for such accounts.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

ec2-instances-in-vpc

Deploy Amazon Elastic Compute Cloud (Amazon EC2) instances within an Amazon Virtual Private Cloud (Amazon VPC) to enable secure communication between an instance and other services within the amazon VPC, without requiring an internet gateway, NAT device, or VPN connection. All traffic remains securely within the Amazon Web Services 云. Because of their logical isolation, domains that reside within anAmazon VPC have an extra layer of security when compared to domains that use public endpoints. Assign Amazon EC2 instances to an Amazon VPC to properly manage access.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

internet-gateway-authorized-vpc-only

Manage access to resources in the Amazon Web Services 云 by ensuring that internet gateways are only attached to authorized Amazon Virtual Private Cloud (Amazon VPC). Internet gateways allow bi-directional internet access to and from the Amazon VPC that can potentially lead to unauthorized access to Amazon VPC resources.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

Manage access to resources in the Amazon Web Services 云 by ensuring Amazon Lambda functions cannot be publicly accessed. Public access can potentially lead to degradation of availability of resources.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

Deploy Amazon Lambda functions within an Amazon Virtual Private Cloud (Amazon VPC) for a secure communication between a function and other services within the Amazon VPC. With this configuration, there is no requirement for an internet gateway, NAT device, or VPN connection. All the traffic remains securely within the Amazon Web Services 云. Because of their logical isolation, domains that reside within an Amazon VPC have an extra layer of security when compared to domains that use public endpoints. To properly manage access, Amazon Lambda functions should be assigned to a VPC.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

rds-instance-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information, and principles and access control is required for such accounts.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

rds-snapshots-public-prohibited

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information and principles and access control is required for such accounts.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

redshift-cluster-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Redshift clusters are not public. Amazon Redshift clusters can contain sensitive information and principles and access control is required for such accounts.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

s3-account-level-public-access-blocks

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Simple Storage Service (Amazon S3) buckets cannot be publicly accessed. This rule helps keeping sensitive data safe from unauthorized remote users by preventing public access. This rule allows you to optionally set the ignorePublicAcls (Config Default: True), blockPublicPolicy (Config Default: True), blockPublicAcls (Config Default: True), and restrictPublicBuckets parameters (Config Default: True). The actual values should reflect your organization's policies.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

s3-bucket-public-read-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

s3-bucket-public-write-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-005-5-R1-Part 1.1 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.1: All applicable Cyber Assets connected to a network via a routable protocol shall reside within a defined ESP.

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon SageMaker notebooks do not allow direct internet access. By preventing direct internet access, you can keep sensitive data from being accessed by unauthorized users.
CIP-005-5-R1-Part 1.2 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.2: All External Routable Connectivity must be through an identified Electronic Access Point (EAP).

Ensure Amazon WAF is enabled on Elastic Load Balancers (ELB) to help protect web applications. A WAF helps to protect your web applications or APIs against common web exploits. These web exploits may affect availability, compromise security, or consume excessive resources within your environment.
CIP-005-5-R1-Part 1.2 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.2: All External Routable Connectivity must be through an identified Electronic Access Point (EAP).

internet-gateway-authorized-vpc-only

Manage access to resources in the Amazon Web Services 云 by ensuring that internet gateways are only attached to authorized Amazon Virtual Private Cloud (Amazon VPC). Internet gateways allow bi-directional internet access to and from the Amazon VPC that can potentially lead to unauthorized access to Amazon VPC resources.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

Manage access to resources in the Amazon Web Services 云 by ensuring Amazon Lambda functions cannot be publicly accessed. Public access can potentially lead to degradation of availability of resources.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

rds-instance-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information, and principles and access control is required for such accounts.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

rds-snapshots-public-prohibited

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information and principles and access control is required for such accounts.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

redshift-cluster-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Redshift clusters are not public. Amazon Redshift clusters can contain sensitive information and principles and access control is required for such accounts.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

restricted-common-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) security groups. Not restricting access to ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. This rule allows you to optionally set blockedPort1 - blockedPort5 parameters (Config Defaults: 20,21,3389,3306,4333). The actual values should reflect your organization's policies.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

s3-account-level-public-access-blocks

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Simple Storage Service (Amazon S3) buckets cannot be publicly accessed. This rule helps keeping sensitive data safe from unauthorized remote users by preventing public access. This rule allows you to optionally set the ignorePublicAcls (Config Default: True), blockPublicPolicy (Config Default: True), blockPublicAcls (Config Default: True), and restrictPublicBuckets parameters (Config Default: True). The actual values should reflect your organization's policies.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

s3-bucket-public-read-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

s3-bucket-public-write-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon SageMaker notebooks do not allow direct internet access. By preventing direct internet access, you can keep sensitive data from being accessed by unauthorized users.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

vpc-default-security-group-closed

Amazon Elastic Compute Cloud (Amazon EC2) security groups can help in the management of network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Restricting all the traffic on the default security group helps in restricting remote access to your Amazon resources.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

vpc-sg-open-only-to-authorized-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) Security Groups. Not restricting access on ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. By restricting access to resources within a security group from the internet (0.0.0.0/0) remote access can be controlled to internal systems.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

emr-master-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon EMR cluster master nodes cannot be publicly accessed. Amazon EMR cluster master nodes can contain sensitive information and access control is required for such accounts.
CIP-005-5-R1-Part 1.3 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.3: Require inbound and outbound access permissions, including the reason for granting access, and deny all other access by default.

restricted-ssh

Amazon Elastic Compute Cloud (Amazon EC2) Security Groups can help manage network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Not allowing ingress (or remote) traffic from 0.0.0.0/0 to port 22 on your resources help you restricting remote access.
CIP-005-5-R1-Part 1.5 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.5:Have one or more methods for detecting known or suspected malicious communications for both inbound and outbound communications.

Amazon GuardDuty can help to monitor and detect potential cybersecurity events by using threat intelligence feeds. These include lists of malicious IPs and machine learning to identify unexpected, unauthorized, and malicious activity within your Amazon Web Services 云 environment.
CIP-005-5-R1-Part 1.5 Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP‐005‐5 Table R1 – Electronic Security Perimeter. Part 1.5:Have one or more methods for detecting known or suspected malicious communications for both inbound and outbound communications.

Ensure Amazon WAF is enabled on Elastic Load Balancers (ELB) to help protect web applications. A WAF helps to protect your web applications or APIs against common web exploits. These web exploits may affect availability, compromise security, or consume excessive resources within your environment.
CIP-005-5-R2-Part 2.2 Each Responsible Entity allowing Interactive Remote Access to BES Cyber Systems shall implement one or more documented processes that collectively include the applicable requirement parts, where technically feasible, in CIP-005-5 Table R2 – Interactive Remote Access Management. Part 2.2: For all Interactive Remote Access sessions, utilize encryption that terminates at an Intermediate System.

启用了 alb-http 丢弃标题

Ensure that your Elastic Load Balancers (ELB) are configured to drop http headers. Because sensitive data can exist, enable encryption in transit to help protect that data.
CIP-005-5-R2-Part 2.2 Each Responsible Entity allowing Interactive Remote Access to BES Cyber Systems shall implement one or more documented processes that collectively include the applicable requirement parts, where technically feasible, in CIP-005-5 Table R2 – Interactive Remote Access Management. Part 2.2: For all Interactive Remote Access sessions, utilize encryption that terminates at an Intermediate System.

ELB-TLS-https-仅侦听器

Ensure that your Elastic Load Balancers (ELBs) are configured with SSL or HTTPS listeners. Because sensitive data can exist, enable encryption in transit to help protect that data.
CIP-005-5-R2-Part 2.2 Each Responsible Entity allowing Interactive Remote Access to BES Cyber Systems shall implement one or more documented processes that collectively include the applicable requirement parts, where technically feasible, in CIP-005-5 Table R2 – Interactive Remote Access Management. Part 2.2: For all Interactive Remote Access sessions, utilize encryption that terminates at an Intermediate System.

Ensure node-to-node encryption for Amazon Elasticsearch Service is enabled. Node-to-node encryption enables TLS 1.2 encryption for all communications within the Amazon Virtual Private Cloud (Amazon VPC). Because sensitive data can exist, enable encryption in transit to help protect that data.
CIP-005-5-R2-Part 2.3 Each Responsible Entity allowing Interactive Remote Access to BES Cyber Systems shall implement one or more documented processes that collectively include the applicable requirement parts, where technically feasible, in CIP-005-5 Table R2 – Interactive Remote Access Management. Part 2.3: Require multi-factor authentication for all Interactive Remote Access sessions.

iam-user-mfa-enabled

Enable this rule to restrict access to resources in the Amazon Web Services 云. This rule ensures multi-factor authentication (MFA) is enabled for all IAM users. MFA 在用户名和密码之上增加了一层额外的防护。Reduce the incidents of compromised accounts by requiring MFA for IAM users.
CIP-005-5-R2-Part 2.3 Each Responsible Entity allowing Interactive Remote Access to BES Cyber Systems shall implement one or more documented processes that collectively include the applicable requirement parts, where technically feasible, in CIP-005-5 Table R2 – Interactive Remote Access Management. Part 2.3: Require multi-factor authentication for all Interactive Remote Access sessions.

mfa-enabled-for-iam-console-access

Manage access to resources in the Amazon Web Services 云 by ensuring that MFA is enabled for all Amazon Identity and Access Management (IAM) users that have a console password. MFA 在用户名和密码之上增加了一层额外的防护。By requiring MFA for IAM users, you can reduce incidents of compromised accounts and keep sensitive data from being accessed by unauthorized users.
CIP-007-6-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R1 – Ports and Services. Part 1.1: Where technically feasible, enable only logical network accessible ports that have been determined to be needed by the Responsible Entity, including port ranges or services where needed to handle dynamic ports. If a device has no provision for disabling or restricting logical ports on the device then those ports that are open are deemed needed.

ec2-instance-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon Elastic Compute Cloud (Amazon EC2) instances cannot be publicly accessed. Amazon EC2 instances can contain sensitive information and access control is required for such accounts.
CIP-007-6-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R1 – Ports and Services. Part 1.1: Where technically feasible, enable only logical network accessible ports that have been determined to be needed by the Responsible Entity, including port ranges or services where needed to handle dynamic ports. If a device has no provision for disabling or restricting logical ports on the device then those ports that are open are deemed needed.

emr-master-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon EMR cluster master nodes cannot be publicly accessed. Amazon EMR cluster master nodes can contain sensitive information and access control is required for such accounts.
CIP-007-6-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R1 – Ports and Services. Part 1.1: Where technically feasible, enable only logical network accessible ports that have been determined to be needed by the Responsible Entity, including port ranges or services where needed to handle dynamic ports. If a device has no provision for disabling or restricting logical ports on the device then those ports that are open are deemed needed.

restricted-ssh

Amazon Elastic Compute Cloud (Amazon EC2) Security Groups can help manage network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Not allowing ingress (or remote) traffic from 0.0.0.0/0 to port 22 on your resources help you restricting remote access.
CIP-007-6-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R1 – Ports and Services. Part 1.1: Where technically feasible, enable only logical network accessible ports that have been determined to be needed by the Responsible Entity, including port ranges or services where needed to handle dynamic ports. If a device has no provision for disabling or restricting logical ports on the device then those ports that are open are deemed needed.

restricted-common-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) security groups. Not restricting access to ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. This rule allows you to optionally set blockedPort1 - blockedPort5 parameters (Config Defaults: 20,21,3389,3306,4333). The actual values should reflect your organization's policies.
CIP-007-6-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R1 – Ports and Services. Part 1.1: Where technically feasible, enable only logical network accessible ports that have been determined to be needed by the Responsible Entity, including port ranges or services where needed to handle dynamic ports. If a device has no provision for disabling or restricting logical ports on the device then those ports that are open are deemed needed.

vpc-default-security-group-closed

Amazon Elastic Compute Cloud (Amazon EC2) security groups can help in the management of network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Restricting all the traffic on the default security group helps in restricting remote access to your Amazon resources.
CIP-007-6-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R1 – Ports and Services. Part 1.1: Where technically feasible, enable only logical network accessible ports that have been determined to be needed by the Responsible Entity, including port ranges or services where needed to handle dynamic ports. If a device has no provision for disabling or restricting logical ports on the device then those ports that are open are deemed needed.

vpc-sg-open-only-to-authorized-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) Security Groups. Not restricting access on ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. By restricting access to resources within a security group from the internet (0.0.0.0/0) remote access can be controlled to internal systems.
CIP-007-6-R2-Part 2.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R2 – Security Patch Management. Part 2.1: A patch management process for tracking, evaluating, and installing cyber security patches for applicable Cyber Assets. The tracking portion shall include the identification of a source or sources that the Responsible Entity tracks for the release of cyber security patches for applicable Cyber Assets that are updateable and for which a patching source exists.

Amazon GuardDuty helps you understand the impact of an incident by classifying findings by severity: low, medium, and high. You can use these classifications for determining remediation strategies and priorities. This rule allows you to optionally set the daysLowSev (Config Default: 30), daysMediumSev (Config Default: 7), and daysHighSev (Config Default: 1) for non-archived findings, as required by your organization's policies.
CIP-007-6-R2-Part 2.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R2 – Security Patch Management. Part 2.1: A patch management process for tracking, evaluating, and installing cyber security patches for applicable Cyber Assets. The tracking portion shall include the identification of a source or sources that the Responsible Entity tracks for the release of cyber security patches for applicable Cyber Assets that are updateable and for which a patching source exists.

ec2-managedinstance-patch-compliance-status-check

Enable this rule to help with identification and documentation of Amazon Elastic Compute Cloud (Amazon EC2) vulnerabilities. The rule checks if Amazon EC2 instance patch compliance in Amazon Secrets Manager as required by your organization’s policies and procedures.
CIP-007-6-R2-Part 2.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R2 – Security Patch Management. Part 2.1: A patch management process for tracking, evaluating, and installing cyber security patches for applicable Cyber Assets. The tracking portion shall include the identification of a source or sources that the Responsible Entity tracks for the release of cyber security patches for applicable Cyber Assets that are updateable and for which a patching source exists.

ec2-managedinstance-association-compliance-status-check

Use Amazon Secrets Manager Associations to help with inventory of software platforms and applications within an organization. Amazon Secrets Manager assigns a configuration state to your managed instances and allows you to set baselines of operating system patch levels, software installations, application configurations, and other details about your environment.
CIP-007-6-R3-Part 3.1-2 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R2 – Security Patch Management. Part 3.1: Deploy method(s) to deter, detect, or prevent malicious code. Part 3.2: Mitigate the threat of detected malicious code.

Amazon GuardDuty can help to monitor and detect potential cybersecurity events by using threat intelligence feeds. These include lists of malicious IPs and machine learning to identify unexpected, unauthorized, and malicious activity within your Amazon Web Services 云 environment.
CIP-007-6-R3-Part 3.1-2 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R2 – Security Patch Management. Part 3.1: Deploy method(s) to deter, detect, or prevent malicious code. Part 3.2: Mitigate the threat of detected malicious code.

Ensure Amazon WAF is enabled on Elastic Load Balancers (ELB) to help protect web applications. A WAF helps to protect your web applications or APIs against common web exploits. These web exploits may affect availability, compromise security, or consume excessive resources within your environment.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

zapi-gw-execution-logging-enabled

API Gateway logging displays detailed views of users who accessed the API and the way they accessed the API. This insight enables visibility of user activities.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

cloud-trail-cloud-watch-logs-enabled

Use Amazon CloudWatch to centrally collect and manage log event activity. Inclusion of Amazon CloudTrail data provides details of API call activity within your Amazon Web Services 账户.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

cloudtrail-s3-dataevents-enabled

The collection of Simple Storage Service (Amazon S3) data events helps in detecting any anomalous activity. The details include Amazon Web Services 账户 information that accessed an Amazon S3 bucket, IP address, and time of event.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

elb-logging-enabled

Elastic Load Balancing activity is a central point of communication within an environment. Ensure ELB logging is enabled. The collected data provides detailed information about requests sent to the ELB. 每个日志都包含信息 (例如,收到请求的时间、客户端的 IP 地址、延迟、请求路径和服务器响应)。
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

启用多区域云跟踪

Amazon CloudTrail records Amazon Web Services Management Console actions and API calls. You can identify which users and accounts called Amazon, the source IP address from where the calls were made, and when the calls occurred. CloudTrail will deliver log files from all Amazon Web Services 区域 to your S3 bucket if MULTI_REGION_CLOUD_TRAIL_ENABLED is enabled. Additionally, when Amazon launches a new Region, CloudTrail will create the same trail in the new Region. As a result, you will receive log files containing API activity for the new Region without taking any action.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (Config Default : TRUE), and loggingEnabled (Config Default: TRUE). The actual values should reflect your organization's policies.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

vpc-flow-logs-enabled

The VPC flow logs provide detailed records for information about the IP traffic going to and from network interfaces in your Amazon Virtual Private Cloud (Amazon VPC). By default, the flow log record includes values for the different components of the IP flow, including the source, destination, and protocol.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

To help with logging and monitoring within your environment, ensure Amazon Relational Database Service (Amazon RDS) logging is enabled. With Amazon RDS logging, you can capture events such as connections, disconnections, queries, or tables queried.
CIP-007-6-R4-Part 4.1 Log events at the BES Cyber System level (per BES Cyber System capability) or at the Cyber Asset level (per Cyber Asset capability) for identification of, and after-the-fact investigations of, Cyber Security Incidents that includes, as a minimum, each of the following types of events: 4.1.1. Detected successful login attempts; 4.1.2. Detected failed access attempts and failed login attempts; 4.1.3. Detected malicious code.

To help with logging and monitoring within your environment, enable Amazon WAF (V2) logging on regional and global web ACLs. Amazon WAF logging provides detailed information about the traffic that is analyzed by your web ACL. The logs record the time that Amazon WAF received the request from your Amazon resource, information about the request, and an action for the rule that each request matched.
CIP-007-6-R4-Part 4.3 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP‐007‐6 Table R4 – Security Event Monitoring. Part 4.3: Where technically feasible, retain applicable event logs identified in Part 4.1 for at least the last 90 consecutive calendar days except under CIP Exceptional Circumstances.

cw-log group reten-check

Ensure a minimum duration of event log data is retained for your log groups to help with troubleshooting and forensics investigations. The lack of available past event log data makes it difficult to reconstruct and identify potentially malicious events.
CIP-007-6-R5-Part 5.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP-007-6 Table R5 – System Access Controls. Part 5.1: Have a method(s) to enforce authentication of interactive user access, where technically feasible.

iam-password-policy

The identities and the credentials are issued, managed, and verified based on an organizational IAM password policy. They meet or exceed requirements as stated by NIST SP 800-63 and the Centers for Internet Security (CIS) Amazon Foundations Benchmark for password strength. This rule allows you to optionally set RequireUppercaseCharacters (Amazon Foundational Security Best Practices value: true), RequireLowercaseCharacters (Amazon Foundational Security Best Practices value: true), RequireSymbols (Amazon Foundational Security Best Practices value: true), RequireNumbers (Amazon Foundational Security Best Practices value: true), MinimumPasswordLength (Amazon Foundational Security Best Practices value: 14), PasswordReusePrevention (Amazon Foundational Security Best Practices value: 24), and MaxPasswordAge (Amazon Foundational Security Best Practices value: 90) for your IAM Password Policy. The actual values should reflect your organization's policies.
CIP-008-5-R1-Part 1.1 Each Responsible Entity shall document one or more Cyber Security Incident response plan(s) that collectively include Part 1.1: One or more processes to identify, classify, and respond to Cyber Security Incidents.

Amazon GuardDuty helps you understand the impact of an incident by classifying findings by severity: low, medium, and high. You can use these classifications for determining remediation strategies and priorities. This rule allows you to optionally set the daysLowSev (Config Default: 30), daysMediumSev (Config Default: 7), and daysHighSev (Config Default: 1) for non-archived findings, as required by your organization's policies.
CIP-008-5-R1-Part 1.1 Each Responsible Entity shall document one or more Cyber Security Incident response plan(s) that collectively include Part 1.1: One or more processes to identify, classify, and respond to Cyber Security Incidents.

Amazon GuardDuty can help to monitor and detect potential cybersecurity events by using threat intelligence feeds. These include lists of malicious IPs and machine learning to identify unexpected, unauthorized, and malicious activity within your Amazon Web Services 云 environment.
CIP-008-5-R1-Part 1.1 Each Responsible Entity shall document one or more Cyber Security Incident response plan(s) that collectively include Part 1.1: One or more processes to identify, classify, and respond to Cyber Security Incidents.

Amazon Security Hub helps to monitor unauthorized personnel, connections, devices, and software. Amazon Security Hub aggregates, organizes, and prioritizes the security alerts, or findings, from multiple Amazon services. Some such services are Amazon Security Hub, Amazon Inspector, Amazon Macie, Amazon Identity and Access Management (IAM) Access Analyzer, and Amazon Firewall Manager, and Amazon Partner solutions.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

db-instance-backup-enabled

The backup feature of Amazon RDS creates backups of your databases and transaction logs. Amazon RDS automatically creates a storage volume snapshot of your DB instance, backing up the entire DB instance. The system allows you to set specific retention periods to meet your resilience requirements.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

备份中的动态计划

To help with data back-up processes, ensure your Amazon DynamoDB tables are a part of an Amazon Backup plan. Amazon Backup is a fully managed backup service with a policy-based backup solution. This solution simplifies your backup management and enables you to meet your business and regulatory backup compliance requirements.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

dynamodb-pitr-enabled

Enable this rule to check that information has been backed up. It also maintains the backups by ensuring that point-in-time recovery is enabled in Amazon DynamoDB. The recovery maintains continuous backups of your table for the last 35 days.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

备份计划

To help with data back-up processes, ensure your Amazon Elastic Block Store (Amazon EBS) volumes are a part of an Amazon Backup plan. Amazon Backup is a fully managed backup service with a policy-based backup solution. This solution simplifies your backup management and enables you to meet your business and regulatory backup compliance requirements.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

EFS 进入备份计划

To help with data back-up processes, ensure your Amazon Elastic File System (Amazon EFS) file systems are a part of an Amazon Backup plan. Amazon Backup is a fully managed backup service with a policy-based backup solution. This solution simplifies your backup management and enables you to meet your business and regulatory backup compliance requirements.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

elasticache-redis-cluster-automatic-backup-check

When automatic backups are enabled, Amazon ElastiCache creates a backup of the cluster on a daily basis. The backup can be retained for a number of days as specified by your organization. 自动备份可以帮助防止数据丢失。If a failure occurs, you can create a new cluster, which restores your data from the most recent backup.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

备份计划中的 RDS

To help with data back-up processes, ensure your Amazon Relational Database Service (Amazon RDS) instances are a part of an Amazon Backup plan. Amazon Backup is a fully managed backup service with a policy-based backup solution. This solution simplifies your backup management and enables you to meet your business and regulatory backup compliance requirements.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

s3-bucket-replication-enabled

Amazon Simple Storage Service (Amazon S3) Cross-Region Replication (CRR) supports maintaining adequate capacity and availability. CRR enables automatic, asynchronous copying of objects across Amazon S3 buckets to help ensure that data availability is maintained.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

s3-bucket-versioning-enabled

Amazon Simple Storage Service (Amazon S3) bucket versioning helps keep multiple variants of an object in the same Amazon S3 bucket. Use versioning to preserve, retrieve, and restore every version of every object stored in your Amazon S3 bucket. Versioning helps you to easily recover from unintended user actions and application failures.
CIP-009-6-R1-Part 1.3 Each Responsible Entity shall have one or more documented recovery plans that collectively include each of the applicable requirement parts in CIP‐009‐6 Table R1 – Recovery Plan Specifications. Part 1.3: One or more processes for the backup and storage of information required to recover BES Cyber System functionality.

s3-bucket-default-lock-enabled

Ensure that your Amazon Simple Storage Service (Amazon S3) bucket has lock enabled, by default. Because sensitive data can exist at rest in S3 buckets, enforce object locks at rest to help protect that data.
CIP-010-2-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP‐010‐2 Table R1 – Configuration Change Management. Part 1.1: Develop a baseline configuration, individually or by group, which shall include the following items: 1.1.1. Operating system(s) (including version) or firmware where no independent operating system exists; 1.1.2. Any commercially available or open-source application software (including version) intentionally installed; 1.1.3. Any custom software installed; 1.1.4. Any logical network accessible ports; and 1.1.5. Any security patches applied.

ec2-instance-managed-by-systems-manager

An inventory of the software platforms and applications within the organization is possible by managing Amazon Elastic Compute Cloud (Amazon EC2) instances with Amazon Secrets Manager. Use Amazon Secrets Manager to provide detailed system configurations, operating system patch levels, services name and type, software installations, application name, publisher and version, and other details about your environment.
CIP-010-2-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP‐010‐2 Table R1 – Configuration Change Management. Part 1.1: Develop a baseline configuration, individually or by group, which shall include the following items: 1.1.1. Operating system(s) (including version) or firmware where no independent operating system exists; 1.1.2. Any commercially available or open-source application software (including version) intentionally installed; 1.1.3. Any custom software installed; 1.1.4. Any logical network accessible ports; and 1.1.5. Any security patches applied.

ec2-managedinstance-association-compliance-status-check

Use Amazon Secrets Manager Associations to help with inventory of software platforms and applications within an organization. Amazon Secrets Manager assigns a configuration state to your managed instances and allows you to set baselines of operating system patch levels, software installations, application configurations, and other details about your environment.
CIP-010-2-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP‐010‐2 Table R1 – Configuration Change Management. Part 1.1: Develop a baseline configuration, individually or by group, which shall include the following items: 1.1.1. Operating system(s) (including version) or firmware where no independent operating system exists; 1.1.2. Any commercially available or open-source application software (including version) intentionally installed; 1.1.3. Any custom software installed; 1.1.4. Any logical network accessible ports; and 1.1.5. Any security patches applied.

Amazon Security Hub helps to monitor unauthorized personnel, connections, devices, and software. Amazon Security Hub aggregates, organizes, and prioritizes the security alerts, or findings, from multiple Amazon services. Some such services are Amazon Security Hub, Amazon Inspector, Amazon Macie, Amazon Identity and Access Management (IAM) Access Analyzer, and Amazon Firewall Manager, and Amazon Partner solutions.
CIP-010-2-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP‐010‐2 Table R1 – Configuration Change Management. Part 1.1: Develop a baseline configuration, individually or by group, which shall include the following items: 1.1.1. Operating system(s) (including version) or firmware where no independent operating system exists; 1.1.2. Any commercially available or open-source application software (including version) intentionally installed; 1.1.3. Any custom software installed; 1.1.4. Any logical network accessible ports; and 1.1.5. Any security patches applied.

ec2-stopped-instance

Enable this rule to help with the baseline configuration of Amazon Elastic Compute Cloud (Amazon EC2) instances by checking whether Amazon EC2 instances have been stopped for more than the allowed number of days, according to your organization’s standards.
CIP-010-2-R1-Part 1.1 Each Responsible Entity shall implement one or more documented process(es) that collectively include each of the applicable requirement parts in CIP‐010‐2 Table R1 – Configuration Change Management. Part 1.1: Develop a baseline configuration, individually or by group, which shall include the following items: 1.1.1. Operating system(s) (including version) or firmware where no independent operating system exists; 1.1.2. Any commercially available or open-source application software (including version) intentionally installed; 1.1.3. Any custom software installed; 1.1.4. Any logical network accessible ports; and 1.1.5. Any security patches applied.

ec2-volume-inuse-check

This rule ensures that Amazon Elastic Block Store volumes that are attached to Amazon Elastic Compute Cloud (Amazon EC2) instances are marked for deletion when an instance is terminated. If an Amazon EBS volume isn’t deleted when the instance that it’s attached to is terminated, it may violate the concept of least functionality.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

Ensure network integrity is protected by ensuring X509 certificates are issued by Amazon ACM. These certificates must be valid and unexpired. This rule requires a value for daysToExpiration (Amazon Foundational Security Best Practices value: 90). The actual value should reflect your organization's policies.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

启用了 alb-http 丢弃标题

Ensure that your Elastic Load Balancers (ELB) are configured to drop http headers. Because sensitive data can exist, enable encryption in transit to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

alb-http-to-https-redirection-check

To help protect data in transit, ensure that your Application Load Balancer automatically redirects unencrypted HTTP requests to HTTPS. Because sensitive data can exist, enable encryption in transit to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

api-gw-cache-enabled-and-encrypted

To help protect data at rest, ensure encryption is enabled for your API Gateway stage’s cache. Because sensitive data can be captured for the API method, enable encryption at rest to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

cloud-trail-encryption-enabled

Because sensitive data may exist and to help protect data at rest, ensure encryption is enabled for your Amazon CloudTrail trails.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

To help protect sensitive data at rest, ensure encryption is enabled for your Amazon CloudWatch Log Groups.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

cmk-backing-key-rotation-enabled

Enable key rotation to ensure that keys are rotated once they have reached the end of their crypto period.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

dynamodb-table-encrypted-kms

Ensure that encryption is enabled for your Amazon DynamoDB tables. Because sensitive data can exist at rest in these tables, enable encryption at rest to help protect that data. By default, DynamoDB tables are encrypted with an Amazon owned customer master key (CMK).
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

ec2-ebs-encryption-by-default

To help protect data at rest, ensure that encryption is enabled for your Amazon Elastic Block Store (Amazon EBS) volumes. Because sensitive data can exist at rest in these volumes, enable encryption at rest to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

efs-encrypted-check

Because sensitive data can exist and to help protect data at rest, ensure encryption is enabled for your Amazon Elastic File System (EFS).
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

Because sensitive data can exist and to help protect data at rest, ensure encryption is enabled for your Amazon Elasticsearch Service (Amazon ES) domains.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

Ensure node-to-node encryption for Amazon Elasticsearch Service is enabled. Node-to-node encryption enables TLS 1.2 encryption for all communications within the Amazon Virtual Private Cloud (Amazon VPC). Because sensitive data can exist, enable encryption in transit to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

Because sensitive data can exist and to help protect data at transit, ensure encryption is enabled for your Elastic Load Balancing. Use Amazon Certificate Manager to manage, provision and deploy public and private SSL/TLS certificates with Amazon services and internal resources.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

ELB-TLS-https-仅侦听器

Ensure that your Elastic Load Balancers (ELBs) are configured with SSL or HTTPS listeners. Because sensitive data can exist, enable encryption in transit to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

encrypted-volumes

Because senstive data can exist and to help protect data at rest, ensure encryption is enabled for your Amazon Elastic Block Store (Amazon EBS) volumes.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

kms-cmk-not-scheduled-for-deletion

To help protect data at rest, ensure necessary customer master keys (CMKs) are not scheduled for deletion in Amazon Key Management Service (Amazon KMS). Because key deletion is necessary at times, this rule can assist in checking for all keys scheduled for deletion, in case a key was scheduled unintentionally.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

rds-snapshot-encrypted

Ensure that encryption is enabled for your Amazon Relational Database Service (Amazon RDS) snapshots. Because sensitive data can exist at rest, enable encryption at rest to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

rds-storage-encrypted

To help protect data at rest, ensure that encryption is enabled for your Amazon Relational Database Service (Amazon RDS) instances. Because sensitive data can exist at rest in Amazon RDS instances, enable encryption at rest to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (Config Default : TRUE), and loggingEnabled (Config Default: TRUE). The actual values should reflect your organization's policies.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

redshift-require-tls-ssl

Ensure that your Amazon Redshift clusters require TLS/SSL encryption to connect to SQL clients. Because sensitive data can exist, enable encryption in transit to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

s3-bucket-server-side-encryption-enabled

To help protect data at rest, ensure encryption is enabled for your Amazon Simple Storage Service (Amazon S3) buckets. Because sensitive data can exist at rest in Amazon S3 buckets, enable encryption to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

s3-bucket-ssl-requests-only

To help protect data in transit, ensure that your Amazon Simple Storage Service (Amazon S3) buckets require requests to use Secure Socket Layer (SSL). Because sensitive data can exist, enable encryption in transit to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

s3-default-encryption-kms

Ensure that encryption is enabled for your Amazon Simple Storage Service (Amazon S3) buckets. Because sensitive data can exist at rest in an Amazon S3 bucket, enable encryption at rest to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

To help protect data at rest, ensure encryption with Amazon Key Management Service (Amazon KMS) is enabled for your SageMaker endpoint. Because sensitive data can exist at rest in SageMaker endpoint, enable encryption at rest to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

To help protect data at rest, ensure encryption with Amazon Key Management Service (Amazon KMS) is enabled for your SageMaker notebook. Because sensitive data can exist at rest in SageMaker notebook, enable encryption at rest to help protect that data.
CIP-011-2-R1-Part 1.2 Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use. Part 1.2: Procedure(s) for protecting and securely handling BES Cyber System Information, including storage, transit, and use.

sns-encrypted-kms

To help protect data at rest, ensure that your Amazon Simple Notification Service (Amazon SNS) topics require encryption using Amazon Key Management Service (Amazon KMS). Because sensitive data can exist at rest in published messages, enable encryption at rest to help protect that data.

Template

The template is available on GitHub: Operational Best Practices for NERC CIP.