Operational Best Practices for PCI DSS 3.2.1 - Amazon Config
AWS 文档中描述的 AWS 服务或功能可能因区域而异。要查看适用于中国区域的差异,请参阅中国的 AWS 服务入门

本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。

Operational Best Practices for PCI DSS 3.2.1

Conformance packs provide a general-purpose compliance framework designed to enable you to create security, operational or cost-optimization governance checks using managed or custom Amazon Config rules and Amazon Config remediation actions. Conformance Packs, as sample templates, are not designed to fully ensure compliance with a specific governance or compliance standard. You are responsible for making your own assessment of whether your use of the Services meets applicable legal and regulatory requirements.

The following provides a sample mapping between the Payment Card Data Security Standard (PCI DSS) 3.2.1 and Amazon Config managed rules. Each Amazon Config rule applies to a specific Amazon resource, and relates to one or more PCI DSS controls. A PCI DSS control can be related to multiple Config rules. Refer to the table below for more detail and guidance related to these mappings.

This Conformance Pack was validated by Amazon Security Assurance Services LLC (Amazon SAS), which is a team of Payment Card Industry Qualified Security Assessors (QSAs), HITRUST Certified Common Security Framework Practitioners (CCSFPs), and compliance professionals certified to provide guidance and assessments for various industry frameworks. Amazon SAS professionals designed this Conformance Pack to enable a customer to align to a subset of the PCI DSS.

Amazon Web Services 区域: All supported Amazon Web Services 区域 except Asia Pacific (Hong Kong), Europe (Stockholm), and Middle East (Bahrain)

控制 ID Control Description Amazon Config 规则 Guidance
1.2 Build firewall and router configurations that restrict connections between untrusted networks and any system components in the cardholder data environment.

vpc-default-security-group-closed

Amazon Elastic Compute Cloud (Amazon EC2) security groups can help in the management of network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Restricting all the traffic on the default security group helps in restricting remote access to your Amazon resources.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

dms-replication-not-public

Manage access to the Amazon Web Services 云 by ensuring DMS replication instances cannot be publicly accessed. DMS replication instances can contain sensitive information and access control is required for such accounts.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

elasticsearch-in-vpc-only

Manage access to the Amazon Web Services 云 by ensuring Amazon Elasticsearch Service (Amazon ES) Domains are within an Amazon Virtual Private Cloud (Amazon VPC). An Amazon ES domain within an Amazon VPC enables secure communication between Amazon ES and other services within the Amazon VPC without the need for an internet gateway, NAT device, or VPN connection.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

emr-master-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon EMR cluster master nodes cannot be publicly accessed. Amazon EMR cluster master nodes can contain sensitive information and access control is required for such accounts.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

restricted-ssh

Amazon Elastic Compute Cloud (Amazon EC2) Security Groups can help manage network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Not allowing ingress (or remote) traffic from 0.0.0.0/0 to port 22 on your resources help you restricting remote access.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

Manage access to resources in the Amazon Web Services 云 by ensuring Amazon Lambda functions cannot be publicly accessed. Public access can potentially lead to degradation of availability of resources.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

Deploy Amazon Lambda functions within an Amazon Virtual Private Cloud (Amazon VPC) for a secure communication between a function and other services within the Amazon VPC. With this configuration, there is no requirement for an internet gateway, NAT device, or VPN connection. All the traffic remains securely within the Amazon Web Services 云. Because of their logical isolation, domains that reside within an Amazon VPC have an extra layer of security when compared to domains that use public endpoints. To properly manage access, Amazon Lambda functions should be assigned to a VPC.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

rds-instance-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information, and principles and access control is required for such accounts.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

rds-snapshots-public-prohibited

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information and principles and access control is required for such accounts.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

redshift-cluster-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Redshift clusters are not public. Amazon Redshift clusters can contain sensitive information and principles and access control is required for such accounts.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

restricted-common-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) security groups. Not restricting access to ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. This rule allows you to optionally set blockedPort1 - blockedPort5 parameters (Config Defaults: 20,21,3389,3306,4333). The actual values should reflect your organization's policies.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

s3-bucket-public-read-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

s3-bucket-public-write-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon SageMaker notebooks do not allow direct internet access. By preventing direct internet access, you can keep sensitive data from being accessed by unauthorized users.
1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

vpc-sg-open-only-to-authorized-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) Security Groups. Not restricting access on ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. By restricting access to resources within a security group from the internet (0.0.0.0/0) remote access can be controlled to internal systems.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

dms-replication-not-public

Manage access to the Amazon Web Services 云 by ensuring DMS replication instances cannot be publicly accessed. DMS replication instances can contain sensitive information and access control is required for such accounts.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

ebs-snapshot-public-restorable-check

Manage access to the Amazon Web Services 云 by ensuring EBS snapshots are not publicly restorable. EBS volume snapshots can contain sensitive information and access control is required for such accounts.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

ec2-instance-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon Elastic Compute Cloud (Amazon EC2) instances cannot be publicly accessed. Amazon EC2 instances can contain sensitive information and access control is required for such accounts.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

elasticsearch-in-vpc-only

Manage access to the Amazon Web Services 云 by ensuring Amazon Elasticsearch Service (Amazon ES) Domains are within an Amazon Virtual Private Cloud (Amazon VPC). An Amazon ES domain within an Amazon VPC enables secure communication between Amazon ES and other services within the Amazon VPC without the need for an internet gateway, NAT device, or VPN connection.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

emr-master-no-public-ip

Manage access to the Amazon Web Services 云 by ensuring Amazon EMR cluster master nodes cannot be publicly accessed. Amazon EMR cluster master nodes can contain sensitive information and access control is required for such accounts.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

restricted-ssh

Amazon Elastic Compute Cloud (Amazon EC2) Security Groups can help manage network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Not allowing ingress (or remote) traffic from 0.0.0.0/0 to port 22 on your resources help you restricting remote access.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

internet-gateway-authorized-vpc-only

Manage access to resources in the Amazon Web Services 云 by ensuring that internet gateways are only attached to authorized Amazon Virtual Private Cloud (Amazon VPC). Internet gateways allow bi-directional internet access to and from the Amazon VPC that can potentially lead to unauthorized access to Amazon VPC resources.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Manage access to resources in the Amazon Web Services 云 by ensuring Amazon Lambda functions cannot be publicly accessed. Public access can potentially lead to degradation of availability of resources.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Deploy Amazon Lambda functions within an Amazon Virtual Private Cloud (Amazon VPC) for a secure communication between a function and other services within the Amazon VPC. With this configuration, there is no requirement for an internet gateway, NAT device, or VPN connection. All the traffic remains securely within the Amazon Web Services 云. Because of their logical isolation, domains that reside within an Amazon VPC have an extra layer of security when compared to domains that use public endpoints. To properly manage access, Amazon Lambda functions should be assigned to a VPC.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

rds-instance-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information, and principles and access control is required for such accounts.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

rds-snapshots-public-prohibited

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information and principles and access control is required for such accounts.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

redshift-cluster-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Redshift clusters are not public. Amazon Redshift clusters can contain sensitive information and principles and access control is required for such accounts.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

restricted-common-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) security groups. Not restricting access to ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. This rule allows you to optionally set blockedPort1 - blockedPort5 parameters (Config Defaults: 20,21,3389,3306,4333). The actual values should reflect your organization's policies.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

s3-account-level-public-access-blocks

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Simple Storage Service (Amazon S3) buckets cannot be publicly accessed. This rule helps keeping sensitive data safe from unauthorized remote users by preventing public access. This rule allows you to optionally set the ignorePublicAcls (Config Default: True), blockPublicPolicy (Config Default: True), blockPublicAcls (Config Default: True), and restrictPublicBuckets parameters (Config Default: True). The actual values should reflect your organization's policies.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

s3-bucket-public-read-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

s3-bucket-public-write-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon SageMaker notebooks do not allow direct internet access. By preventing direct internet access, you can keep sensitive data from being accessed by unauthorized users.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

vpc-default-security-group-closed

Amazon Elastic Compute Cloud (Amazon EC2) security groups can help in the management of network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Restricting all the traffic on the default security group helps in restricting remote access to your Amazon resources.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

vpc-sg-open-only-to-authorized-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) Security Groups. Not restricting access on ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. By restricting access to resources within a security group from the internet (0.0.0.0/0) remote access can be controlled to internal systems.
2.1 Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the network.

vpc-default-security-group-closed

Amazon Elastic Compute Cloud (Amazon EC2) security groups can help in the management of network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Restricting all the traffic on the default security group helps in restricting remote access to your Amazon resources.
2.2 Develop configuration standards for all system components.

eip-attached

This rule ensures Elastic IPs allocated to a Amazon Virtual Private Cloud (Amazon VPC) are attached to Amazon Elastic Compute Cloud (Amazon EC2) instances or in-use Elastic Network Interfaces. This rule helps monitor unused EIPs in your environment.
2.2 Develop configuration standards for all system components.

s3-account-level-public-access-blocks

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Simple Storage Service (Amazon S3) buckets cannot be publicly accessed. This rule helps keeping sensitive data safe from unauthorized remote users by preventing public access. This rule allows you to optionally set the ignorePublicAcls (Config Default: True), blockPublicPolicy (Config Default: True), blockPublicAcls (Config Default: True), and restrictPublicBuckets parameters (Config Default: True). The actual values should reflect your organization's policies.
2.2.2 Enable only necessary services, protocols, daemons, etc., as required for the function of the system.

restricted-ssh

Amazon Elastic Compute Cloud (Amazon EC2) Security Groups can help manage network access by providing stateful filtering of ingress and egress network traffic to Amazon resources. Not allowing ingress (or remote) traffic from 0.0.0.0/0 to port 22 on your resources help you restricting remote access.
2.2.2 Enable only necessary services, protocols, daemons, etc., as required for the function of the system.

vpc-sg-open-only-to-authorized-ports

Manage access to resources in the Amazon Web Services 云 by ensuring common ports are restricted on Amazon Elastic Compute Cloud (Amazon EC2) Security Groups. Not restricting access on ports to trusted sources can lead to attacks against the availability, integrity and confidentiality of systems. By restricting access to resources within a security group from the internet (0.0.0.0/0) remote access can be controlled to internal systems.
2.4 Maintain an inventory of system components that are in scope for PCI DSS.

ec2-instance-managed-by-systems-manager

An inventory of the software platforms and applications within the organization is possible by managing Amazon Elastic Compute Cloud (Amazon EC2) instances with Amazon Secrets Manager. Use Amazon Secrets Manager to provide detailed system configurations, operating system patch levels, services name and type, software installations, application name, publisher and version, and other details about your environment.
2.4 Maintain an inventory of system components that are in scope for PCI DSS.

ec2-security-group-attached-to-eni

This rule ensures the security groups are attached to an Amazon Elastic Compute Cloud (Amazon EC2) instance or to an ENI. This rule helps monitoring unused security groups in the inventory and the management of your environment.
3.4 Render PAN unreadable anywhere it is stored.

api-gw-cache-enabled-and-encrypted

To help protect data at rest, ensure encryption is enabled for your API Gateway stage’s cache. Because sensitive data can be captured for the API method, enable encryption at rest to help protect that data.
3.4 Render PAN unreadable anywhere it is stored.

Ensure that encryption is enabled for your Amazon DynamoDB tables. Because sensitive data can exist at rest in these tables, enable encryption at rest to help protect that data. By default, DynamoDB tables are encrypted with an Amazon owned customer master key (CMK).
3.4 Render PAN unreadable anywhere it is stored.

efs-encrypted-check

Because sensitive data can exist and to help protect data at rest, ensure encryption is enabled for your Amazon Elastic File System (EFS).
3.4 Render PAN unreadable anywhere it is stored.

Because sensitive data can exist and to help protect data at rest, ensure encryption is enabled for your Amazon Elasticsearch Service (Amazon ES) domains.
3.4 Render PAN unreadable anywhere it is stored.

encrypted-volumes

Because sensitive data can exist and to help protect data at rest, ensure encryption is enabled for your Amazon Elastic Block Store (Amazon EBS) volumes.
3.4 Render PAN unreadable anywhere it is stored.

rds-storage-encrypted

To help protect data at rest, ensure that encryption is enabled for your Amazon Relational Database Service (Amazon RDS) instances. Because sensitive data can exist at rest in Amazon RDS instances, enable encryption at rest to help protect that data.
3.4 Render PAN unreadable anywhere it is stored.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
3.4 Render PAN unreadable anywhere it is stored.

s3-bucket-server-side-encryption-enabled

To help protect data at rest, ensure encryption is enabled for your Amazon Simple Storage Service (Amazon S3) buckets. Because sensitive data can exist at rest in Amazon S3 buckets, enable encryption to help protect that data.
3.4 Render PAN unreadable anywhere it is stored.

To help protect data at rest, ensure encryption with Amazon Key Management Service (Amazon KMS) is enabled for your SageMaker endpoint. Because sensitive data can exist at rest in SageMaker endpoint, enable encryption at rest to help protect that data.
3.4 Render PAN unreadable anywhere it is stored.

To help protect data at rest, ensure encryption with Amazon Key Management Service (Amazon KMS) is enabled for your SageMaker notebook. Because sensitive data can exist at rest in SageMaker notebook, enable encryption at rest to help protect that data.
3.6.4 Cryptographic key changes for keys that have reached the end of their cryptoperiod. 

Ensure network integrity is protected by ensuring X509 certificates are issued by Amazon ACM. These certificates must be valid and unexpired. This rule requires a value for daysToExpiration (Amazon Foundational Security Best Practices value: 90). The actual value should reflect your organization's policies.
3.6.4 Cryptographic key changes for keys that have reached the end of their cryptoperiod. 

cmk-backing-key-rotation-enabled

Enable key rotation to ensure that keys are rotated once they have reached the end of their crypto period.
4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks. 

alb-http-to-https-redirection-check

To help protect data in transit, ensure that your Application Load Balancer automatically redirects unencrypted HTTP requests to HTTPS. Because sensitive data can exist, enable encryption in transit to help protect that data.
4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks. 

Because sensitive data can exist and to help protect data at transit, ensure encryption is enabled for your Elastic Load Balancing. Use Amazon Certificate Manager to manage, provision and deploy public and private SSL/TLS certificates with Amazon services and internal resources.
4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks.

redshift-require-tls-ssl

Ensure that your Amazon Redshift clusters require TLS/SSL encryption to connect to SQL clients. Because sensitive data can exist, enable encryption in transit to help protect that data.
4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks. 

s3-bucket-ssl-requests-only

To help protect data in transit, ensure that your Amazon Simple Storage Service (Amazon S3) buckets require requests to use Secure Socket Layer (SSL). Because sensitive data can exist, enable encryption in transit to help protect that data.
6.1 Establish a process to identify security vulnerabilities. 

ec2-managedinstance-association-compliance-status-check

Use Amazon Secrets Manager Associations to help with inventory of software platforms and applications within an organization. Amazon Secrets Manager assigns a configuration state to your managed instances and allows you to set baselines of operating system patch levels, software installations, application configurations, and other details about your environment.
6.2 Ensure that all system components and software are protected from known vulnerabilities. 

ec2-managedinstance-patch-compliance-status-check

Enable this rule to help with identification and documentation of Amazon Elastic Compute Cloud (Amazon EC2) vulnerabilities. The rule checks if Amazon EC2 instance patch compliance in Amazon Secrets Manager as required by your organization’s policies and procedures.
7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access.

s3-bucket-policy-grantee-check

Manage access to the Amazon Web Services 云 by enabling s3_ bucket_policy_grantee_check. This rule checks that the access granted by the Amazon S3 bucket is restricted by any of the Amazon principals, federated users, service principals, IP addresses, or Amazon Virtual Private Cloud (Amazon VPC) IDs that you provide.
7.1.2 Restrict access to privileged user IDs to least privileges necessary to perform job responsibilities.

iam-user-no-policies-check

This rule ensures Amazon Identity and Access Management (IAM) policies are attached only to groups or roles to control access to systems and assets. Assigning privileges at the group or the role level helps to reduce opportunity for an identity to receive or retain excessive privileges.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

iam-policy-no-statements-with-admin-access

Amazon Identity and Access Management (IAM) can help you incorporate the principles of least privilege and separation of duties with access permissions and authorizations, restricting policies from containing "Effect": "Allow" with "Action": "*" over "Resource": "*". Allowing users to have more privileges than needed to complete a task may violate the principle of least privilege and separation of duties.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

iam-root-access-key-check

Access to systems and assets can be controlled by checking that the root user does not have access keys attached to their Amazon Identity and Access Management (IAM) role. Ensure that the root access keys are deleted. Instead, create and use role-based Amazon Web Services 账户 to help to incorporate the principle of least functionality.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

iam-user-no-policies-check

This rule ensures Amazon Identity and Access Management (IAM) policies are attached only to groups or roles to control access to systems and assets. Assigning privileges at the group or the role level helps to reduce opportunity for an identity to receive or retain excessive privileges.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

Manage access to resources in the Amazon Web Services 云 by ensuring Amazon Lambda functions cannot be publicly accessed. Public access can potentially lead to degradation of availability of resources.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

rds-instance-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information, and principles and access control is required for such accounts.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

rds-snapshots-public-prohibited

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public. Amazon RDS database instances can contain sensitive information and principles and access control is required for such accounts.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

redshift-cluster-public-access-check

Manage access to resources in the Amazon Web Services 云 by ensuring that Amazon Redshift clusters are not public. Amazon Redshift clusters can contain sensitive information and principles and access control is required for such accounts.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

s3-bucket-policy-grantee-check

Manage access to the Amazon Web Services 云 by enabling s3_ bucket_policy_grantee_check. This rule checks that the access granted by the Amazon S3 bucket is restricted by any of the Amazon principals, federated users, service principals, IP addresses, or Amazon Virtual Private Cloud (Amazon VPC) IDs that you provide.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

s3-bucket-public-read-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
7.2 Establish an access control system(s) for systems components that restricts access based on a user’s need to know, and is set to “deny all” unless specifically allowed.

s3-bucket-public-write-prohibited

Manage access to resources in the Amazon Web Services 云 by only allowing authorized users, processes, and devices access to Amazon Simple Storage Service (Amazon S3) buckets. The management of access should be consistent with the classification of the data.
8.1.4 Remove/disable inactive user accounts within 90 days.

iam-user-unused-credentials-check

Amazon Identity and Access Management (IAM) can help you with access permissions and authorizations by checking for IAM passwords and access keys that are not used for a specified time period. If these unused credentials are identified, you should disable and/or remove the credentials, as this may violate the principle of least privilege. This rule requires you to set a value to the maxCredentialUsageAge (PCI DSS Default: 90). The actual value should reflect your organization's policies.
8.2.1 Using strong cryptography, render all authentication credentials (such as passwords/phrases) unreadable during transmission and storage on all system components.

codebuild-project-envvar-awscred-check

Ensure authentication credentials AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY do not exist within Amazon CodeBuild project environments. Do not store these variables in clear text. Storing these variables in clear text leads to unintended data exposure and unauthorized access.
8.2.1 Using strong cryptography, render all authentication credentials (such as passwords/phrases) unreadable during transmission and storage on all system components.

codebuild-project-source-repo-url-check

Ensure the GitHub or Bitbucket source repository URL does not contain personal access tokens, user name and password within Amazon CodeBuild project environments. Use OAuth instead of personal access tokens or a user name and password to grant authorization for accessing GitHub or Bitbucket repositories.
8.2.1 Using strong cryptography, render all authentication credentials unreadable during transmission and storage on all system components. 

emr-kerberos-enabled

The access permissions and authorizations can be managed and incorporated with the principles of least privilege and separation of duties, by enabling Kerberos for Amazon EMR clusters. In Kerberos, the services and the users that need to authenticate are known as principals. The principals exist within a Kerberos realm. Within the realm, a Kerberos server is known as the key distribution center (KDC). It provides a means for the principals to authenticate. The KDC authenticates by issuing tickets for authentication. KDC 维护一个包含其领域中的委托人、它们的密码及其他有关每个委托人的管理信息的数据库。
8.2.3 Passwords/passphrases must meet the following: • Require a minimum length of at least seven characters. • Contain both numeric and alphabetic characters.

iam-password-policy

The identities and the credentials are issued, managed, and verified based on an organizational IAM password policy. They meet or exceed requirements as stated by NIST SP 800-63 and the Centers for Internet Security (CIS) Amazon Foundations Benchmark for password strength. This rule allows you to optionally set RequireUppercaseCharacters (PCI DSS Default: false), RequireLowercaseCharacters (PCI DSS Default: true), RequireSymbols (PCI DSS Default: false), RequireNumbers (PCI DSS Default: true), MinimumPasswordLength (PCI DSS Default: 7), PasswordReusePrevention (PCI DSS Default: 4), and MaxPasswordAge (PCI DSS Default: 90) for your IAM Password Policy. The actual values should reflect your organization's policies.
8.2.4 Change user passwords/passphrases at least once every 90 days.

access-keys-rotated

The credentials are audited for authorized devices, users, and processes by ensuring IAM access keys are rotated as per organizational policy. Changing the access keys on a regular schedule is a security best practice. It shortens the period an access key is active and reduces the business impact if the keys are compromised. This rule requires an access key rotation value (PCI DSS Default: 90). The actual value should reflect your organization's policies.
8.2.4 Change user passwords/passphrases at least once every 90 days.

iam-password-policy

The identities and the credentials are issued, managed, and verified based on an organizational IAM password policy. They meet or exceed requirements as stated by NIST SP 800-63 and the Centers for Internet Security (CIS) Amazon Foundations Benchmark for password strength. This rule allows you to optionally set RequireUppercaseCharacters (PCI DSS Default: false), RequireLowercaseCharacters (PCI DSS Default: true), RequireSymbols (PCI DSS Default: false), RequireNumbers (PCI DSS Default: true), MinimumPasswordLength (PCI DSS Default: 7), PasswordReusePrevention (PCI DSS Default: 4), and MaxPasswordAge (PCI DSS Default: 90) for your IAM Password Policy. The actual values should reflect your organization's policies.
8.2.4 Change user passwords/passphrases at least every 90 days.

secretsmanager-rotation-enabled-check

This rule ensures Amazon Secrets Manager secrets have rotation enabled. Rotating secrets on a regular schedule can shorten the period a secret is active, and potentially reduce the business impact if the secret is compromised.
8.2.5 Do not allow an individual to submit a new password/passphrase that is the same as any of the last four passwords/passphrases he or she has used.

iam-password-policy

The identities and the credentials are issued, managed, and verified based on an organizational IAM password policy. They meet or exceed requirements as stated by NIST SP 800-63 and the Centers for Internet Security (CIS) Amazon Foundations Benchmark for password strength. This rule allows you to optionally set RequireUppercaseCharacters (PCI DSS Default: false), RequireLowercaseCharacters (PCI DSS Default: true), RequireSymbols (PCI DSS Default: false), RequireNumbers (PCI DSS Default: true), MinimumPasswordLength (PCI DSS Default: 7), PasswordReusePrevention (PCI DSS Default: 4), and MaxPasswordAge (PCI DSS Default: 90) for your IAM Password Policy. The actual values should reflect your organization's policies.
8.3 Incorporate multi-factor authentication for all non-console access into the CDE for personnel with administrative access.

iam-user-mfa-enabled

Enable this rule to restrict access to resources in the Amazon Web Services 云. This rule ensures multi-factor authentication (MFA) is enabled for all IAM users. MFA 在用户名和密码之上增加了一层额外的防护。Reduce the incidents of compromised accounts by requiring MFA for IAM users.
8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication. 

mfa-enabled-for-iam-console-access

Manage access to resources in the Amazon Web Services 云 by ensuring that MFA is enabled for all Amazon Identity and Access Management (IAM) users that have a console password. MFA 在用户名和密码之上增加了一层额外的防护。By requiring MFA for IAM users, you can reduce incidents of compromised accounts and keep sensitive data from being accessed by unauthorized users.
8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication.

Manage access to resources in the Amazon Web Services 云 by ensuring hardware MFA is enabled for the root user. The root user is the most privileged user in an Amazon Web Services 账户. The MFA adds an extra layer of protection for a user name and password. By requiring MFA for the root user, you can reduce the incidents of compromised Amazon Web Services 账户.
8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication..

Manage access to resources in the Amazon Web Services 云 by ensuring MFA is enabled for the root user. The root user is the most privileged user in an Amazon Web Services 账户. The MFA adds an extra layer of protection for a user name and password. By requiring MFA for the root user, you can reduce the incidents of compromised Amazon Web Services 账户.
10.1 Implement audit trails to link all access to system components to each individual user.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.1 Implement audit trails to link all access to system components to each individual user.

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.2 Implement automated audit trails for all system components. 

zapi-gw-execution-logging-enabled

API Gateway logging displays detailed views of users who accessed the API and the way they accessed the API. This insight enables visibility of user activities.
10.2 Implement automated audit trails for all system components. 

cloud-trail-cloud-watch-logs-enabled

Use Amazon CloudWatch to centrally collect and manage log event activity. Inclusion of Amazon CloudTrail data provides details of API call activity within your Amazon Web Services 账户.
10.2 Implement automated audit trails for all system components. 

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.2.1 Implement automated audit trails for all system components to reconstruct the all individual user accesses to cardholder data. 

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.2.1 Implement automated audit trails for all system components to reconstruct the all individual user accesses to cardholder data. 

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.2.1 Implement automated audit trails for all system components to reconstruct the all individual user accesses to cardholder data. 

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.2.2 Implement automated audit trails for all system components to reconstruct the all actions taken by any individual with root or administrative privileges. 

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.2.2 Implement automated audit trails for all system components to reconstruct the all actions taken by any individual with root or administrative privileges. 

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.2.2 Implement automated audit trails for all system components to reconstruct the all actions taken by any individual with root or administrative privileges. 

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.2.3 Implement automated audit trails for all system components to reconstruct the access to all audit trails.

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.2.3 Implement automated audit trails for all system components to reconstruct the access to all audit trails. 

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.2.4 Implement automated audit trails for all system components to reconstruct the invalid logical access attempts. 

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.2.4 Implement automated audit trails for all system components to reconstruct the invalid logical access attempts. 

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.2.4 Implement automated audit trails for all system components to reconstruct the invalid logical access attempts. 

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.2.5 Implement automated audit trails for all system components to reconstruct the use of and changes to identification and authentication mechanisms.

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.2.5 Implement automated audit trails for all system components to reconstruct the use of and changes to identification and authentication mechanisms.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.2.6 Implement automated audit trails for all system components to reconstruct the initialization, stopping, or pausing of the audit logs. 

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.2.7 Implement automated audit trails for all system components to reconstruct the creation and deletion of system-level objects. 

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.2.7 Implement automated audit trails for all system components to reconstruct the creation and deletion of system-level objects. 

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.3.1 Record within audit entries for all system components the user identification.

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.3.1 Record within audit entries for all system components the user identification.

cloudtrail-s3-dataevents-enabled

The collection of Amazon S3 data events helps in detecting any anomalous activity. The details include Amazon account information that accessed an Amazon S3 bucket, IP address, and time of event.
10.3.1 Record within audit entries for all system components the user identification.

elb-logging-enabled

Elastic Load Balancing activity is a central point of communication within an environment. Ensure ELB logging is enabled. The collected data provides detailed information about requests sent to the ELB. 每个日志都包含信息 (例如,收到请求的时间、客户端的 IP 地址、延迟、请求路径和服务器响应)。
10.3.1 Record within audit entries for all system components the user identification.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.3.1 Record within audit entries for all system components the user identification.

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.3.2 Record within audit entries for all system components the type of event.

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.3.2 Record within audit entries for all system components the type of event.

cloudtrail-s3-dataevents-enabled

The collection of Amazon S3 data events helps in detecting any anomalous activity. The details include Amazon account information that accessed an Amazon S3 bucket, IP address, and time of event.
10.3.2 Record within audit entries for all system components the type of event.

elb-logging-enabled

Elastic Load Balancing activity is a central point of communication within an environment. Ensure ELB logging is enabled. The collected data provides detailed information about requests sent to the ELB. 每个日志都包含信息 (例如,收到请求的时间、客户端的 IP 地址、延迟、请求路径和服务器响应)。
10.3.2 Record within audit entries for all system components the type of event.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.3.2 Record within audit entries for all system components the type of event.

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.3.3 Record within audit entries for all system components the date and time.

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.3.3 Record within audit entries for all system components the date and time.

cloudtrail-s3-dataevents-enabled

The collection of Amazon S3 data events helps in detecting any anomalous activity. The details include Amazon account information that accessed an Amazon S3 bucket, IP address, and time of event.
10.3.3 Record within audit entries for all system components the date and time.

elb-logging-enabled

Elastic Load Balancing activity is a central point of communication within an environment. Ensure ELB logging is enabled. The collected data provides detailed information about requests sent to the ELB. 每个日志都包含信息 (例如,收到请求的时间、客户端的 IP 地址、延迟、请求路径和服务器响应)。
10.3.3 Record within audit entries for all system components the date and time.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.3.3 Record within audit entries for all system components the date and time.

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.3.3 Record within audit entries for all system components the date and time.

vpc-flow-logs-enabled

The VPC flow logs provide detailed records for information about the IP traffic going to and from network interfaces in your Amazon Virtual Private Cloud (Amazon VPC). By default, the flow log record includes values for the different components of the IP flow, including the source, destination, and protocol.
10.3.4 Record within audit entries for all system components the success or failure indication. 

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.3.4 Record within audit entries for all system components the success or failure indication. 

cloudtrail-s3-dataevents-enabled

The collection of Amazon S3 data events helps in detecting any anomalous activity. The details include Amazon account information that accessed an Amazon S3 bucket, IP address, and time of event.
10.3.4 Record within audit entries for all system components the success or failure indication. 

elb-logging-enabled

Elastic Load Balancing activity is a central point of communication within an environment. Ensure ELB logging is enabled. The collected data provides detailed information about requests sent to the ELB. 每个日志都包含信息 (例如,收到请求的时间、客户端的 IP 地址、延迟、请求路径和服务器响应)。
10.3.4 Record within audit entries for all system components the success or failure indication. 

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.3.4 Record within audit entries for all system components the success or failure indication. 

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.3.4 Record within audit entries for all system components the success or failure indication. 

vpc-flow-logs-enabled

The VPC flow logs provide detailed records for information about the IP traffic going to and from network interfaces in your Amazon Virtual Private Cloud (Amazon VPC). By default, the flow log record includes values for the different components of the IP flow, including the source, destination, and protocol.
10.3.5 Record within audit entries for all system components the origination of event.

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.3.5 Record within audit entries for all system components the origination of event.

cloudtrail-s3-dataevents-enabled

The collection of Amazon S3 data events helps in detecting any anomalous activity. The details include Amazon account information that accessed an Amazon S3 bucket, IP address, and time of event.
10.3.5 Record within audit entries for all system components the origination of event.

elb-logging-enabled

Elastic Load Balancing activity is a central point of communication within an environment. Ensure ELB logging is enabled. The collected data provides detailed information about requests sent to the ELB. 每个日志都包含信息 (例如,收到请求的时间、客户端的 IP 地址、延迟、请求路径和服务器响应)。
10.3.5 Record within audit entries for all system components the origination of event.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.3.5 Record within audit entries for all system components the origination of event.

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.3.5 Record within audit entries for all system components the origination of event.

vpc-flow-logs-enabled

The VPC flow logs provide detailed records for information about the IP traffic going to and from network interfaces in your Amazon Virtual Private Cloud (Amazon VPC). By default, the flow log record includes values for the different components of the IP flow, including the source, destination, and protocol.
10.3.6 Record within audit entries for all system components the identity or name of affected data, system component, or resource.

cloudtrail-enabled

Amazon CloudTrail can help in non-repudiation by recording Amazon Web Services Management Console actions and API calls. You can identify the users and Amazon Web Services 账户 that called an Amazon service, the source IP address where the calls generated, and the timings of the calls. Details of captured data are seen within Amazon CloudTrail Record Contents.
10.3.6 Record within audit entries for all system components the identity or name of affected data, system component, or resource.

cloudtrail-s3-dataevents-enabled

The collection of Amazon S3 data events helps in detecting any anomalous activity. The details include Amazon account information that accessed an Amazon S3 bucket, IP address, and time of event.
10.3.6 Record within audit entries for all system components the identity or name of affected data, system component, or resource.

elb-logging-enabled

Elastic Load Balancing activity is a central point of communication within an environment. Ensure ELB logging is enabled. The collected data provides detailed information about requests sent to the ELB. 每个日志都包含信息 (例如,收到请求的时间、客户端的 IP 地址、延迟、请求路径和服务器响应)。
10.3.6 Record within audit entries for all system components the identity or name of affected data, system component, or resource.

redshift-cluster-configuration-check

To protect data at rest, ensure that encryption is enabled for your Amazon Redshift clusters. You must also ensure that required configurations are deployed on Amazon Redshift clusters. The audit logging should be enabled to provide information about connections and user activities in the database. This rule requires that a value is set for clusterDbEncrypted (PCI DSS Default : TRUE), and loggingEnabled (PCI DSS Default: TRUE). The actual values should reflect your organization's policies.
10.3.6 Record within audit entries for all system components the identity or name of affected data, system component, or resource.

s3-bucket-logging-enabled

Amazon Simple Storage Service (Amazon S3) server access logging provides a method to monitor the network for potential cybersecurity events. The events are monitored by capturing detailed records for the requests that are made to an Amazon S3 bucket. Each access log record provides details about a single access request. The details include the requester, bucket name, request time, request action, response status, and an error code, if relevant.
10.3.6 Record within audit entries for all system components the identity or name of affected data, system component, or resource.

vpc-flow-logs-enabled

The VPC flow logs provide detailed records for information about the IP traffic going to and from network interfaces in your Amazon Virtual Private Cloud (Amazon VPC). By default, the flow log record includes values for the different components of the IP flow, including the source, destination, and protocol.
10.5.1 Limit viewing of audit trails to those with a job-related need.

cloud-trail-encryption-enabled

Because sensitive data may exist and to help protect data at rest, ensure encryption is enabled for your Amazon CloudTrail trails.
10.5.1 Limit viewing of audit trails to those with a job-related need.

To help protect sensitive data at rest, ensure encryption is enabled for your Amazon CloudWatch Log Groups.
10.5.2 Protect audit trail files from unauthorized modifications.

cloud-trail-log-file-validation-enabled

Utilize Amazon CloudTrail log file validation to check the integrity of CloudTrail logs. Log file validation helps determine if a log file was modified or deleted or unchanged after CloudTrail delivered it. This feature is built using industry standard algorithms: SHA-256 for hashing and SHA-256 with RSA for digital signing. This makes it computationally infeasible to modify, delete or forge CloudTrail log files without detection.
10.5.3 Promptly back up audit trail files to a centralized log server or media that is difficult to alter.

s3-bucket-versioning-enabled

Amazon Simple Storage Service (Amazon S3) bucket versioning helps keep multiple variants of an object in the same Amazon S3 bucket. Use versioning to preserve, retrieve, and restore every version of every object stored in your Amazon S3 bucket. Versioning helps you to easily recover from unintended user actions and application failures.
10.5.5 Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts. 

cloud-trail-log-file-validation-enabled

Utilize Amazon CloudTrail log file validation to check the integrity of CloudTrail logs. Log file validation helps determine if a log file was modified or deleted or unchanged after CloudTrail delivered it. This feature is built using industry standard algorithms: SHA-256 for hashing and SHA-256 with RSA for digital signing. This makes it computationally infeasible to modify, delete or forge CloudTrail log files without detection.
10.6 Review logs and security events for all system components to identify anomalies or suspicious activity.

Amazon Security Hub helps to monitor unauthorized personnel, connections, devices, and software. Amazon Security Hub aggregates, organizes, and prioritizes the security alerts, or findings, from multiple Amazon services. Some such services are Amazon Security Hub, Amazon Inspector, Amazon Macie, Amazon Identity and Access Management (IAM) Access Analyzer, and Amazon Firewall Manager, and Amazon Partner solutions.
11.4 Use intrusion-detection and/or intrusion-prevention techniques to detect and/or prevent intrusions into the network.

Amazon GuardDuty can help to monitor and detect potential cybersecurity events by using threat intelligence feeds. These include lists of malicious IPs and machine learning to identify unexpected, unauthorized, and malicious activity within your Amazon Web Services 云 environment.
12.5.2 Monitor and analyze security alerts and information, and distribute to appropriate personnel.

Amazon Security Hub helps to monitor unauthorized personnel, connections, devices, and software. Amazon Security Hub aggregates, organizes, and prioritizes the security alerts, or findings, from multiple Amazon services. Some such services are Amazon Security Hub, Amazon Inspector, Amazon Macie, Amazon Identity and Access Management (IAM) Access Analyzer, and Amazon Firewall Manager, and Amazon Partner solutions.

Template

The template is available on GitHub: Operational Best Practices for PCI DSS 3.2.1.