Skip to main content

Production-ready AWS CIS Controls compliance assessment framework with 145 comprehensive rules

Project description

AWS CIS Controls Compliance Assessment Framework

A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. 100% CIS Controls coverage achieved with 133 implemented rules plus 5 bonus security enhancements.

Production Status: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend AWS Config for ongoing continuous compliance monitoring and automated remediation.

🎯 Key Features

  • ✅ Complete Coverage: 137/137 CIS Controls rules implemented (100% coverage)
  • ✅ Dual Scoring System: Both weighted and AWS Config-style scoring methodologies
  • ✅ Enterprise Ready: Production-tested with enterprise-grade architecture
  • ✅ Performance Optimized: Handles large-scale assessments efficiently
  • ✅ Multi-Format Reports: JSON, HTML, and CSV with detailed remediation guidance
  • ✅ No AWS Config Required: Direct AWS API calls based on Config rule specifications
  • ✅ Bonus Security Rules: 5 additional security enhancements beyond CIS requirements
  • ✅ AWS Backup Controls: 6 comprehensive backup infrastructure controls (3 IG1 + 3 IG2)

🚀 Quick Start

Installation

# Install from PyPI (production-ready)
pip install aws-cis-controls-assessment

# Or install from source for development
git clone <repository-url>
cd aws-cis-controls-assessment
pip install -e .

Basic Usage

# Run complete assessment (all 142 rules) - defaults to us-east-1
aws-cis-assess assess --aws-profile my-aws-profile

# Assess multiple regions
aws-cis-assess assess --aws-profile my-aws-profile --regions us-east-1,us-west-2

# Assess specific Implementation Group using short flag (defaults to us-east-1)
aws-cis-assess assess -p my-aws-profile --implementation-groups IG1 --output-format json

# Generate comprehensive HTML report (defaults to us-east-1)
aws-cis-assess assess --aws-profile production --output-format html --output-file compliance-report.html

# Enterprise multi-region assessment with multiple formats
aws-cis-assess assess -p security-audit --implementation-groups IG1,IG2,IG3 --regions all --output-format html,json --output-dir ./reports/

# Quick assessment with default profile and default region (us-east-1)
aws-cis-assess assess --output-format json

📊 Implementation Groups Coverage

IG1 - Essential Cyber Hygiene (96 Rules) ✅

100% Coverage Achieved

  • Asset Inventory and Management (6 rules)
  • Identity and Access Management (15 rules)
  • Data Protection and Encryption (8 rules)
  • Network Security Controls (20 rules)
  • Logging and Monitoring (13 rules)
  • Backup and Recovery (17 rules) - NEW: 6 AWS Backup service controls added (3 IG1 + 3 IG2)
  • Security Services Integration (5 rules)
  • Configuration Management (9 rules)
  • Vulnerability Management (5 rules)

IG2 - Enhanced Security (+40 Rules) ✅

100% Coverage Achieved

  • Advanced Encryption at Rest (6 rules)
  • Certificate Management (2 rules)
  • Network High Availability (7 rules)
  • Enhanced Monitoring (3 rules)
  • CodeBuild Security (4 rules)
  • Vulnerability Scanning (1 rule)
  • Network Segmentation (5 rules)
  • Auto-scaling Security (1 rule)
  • Enhanced Access Controls (8 rules)
  • AWS Backup Advanced Controls (3 rules) - NEW: Vault lock, reporting, restore testing

IG3 - Advanced Security (+1 Rule) ✅

100% Coverage Achieved

  • API Gateway WAF Integration (1 rule)
  • Critical for preventing application-layer attacks
  • Required for high-security environments

Bonus Security Rules (+5 Rules) ✅

Additional Value Beyond CIS Requirements

  • Enhanced logging security (cloudwatch-log-group-encrypted)
  • Network security enhancement (incoming-ssh-disabled)
  • Data streaming encryption (kinesis-stream-encrypted)
  • Network access control (restricted-incoming-traffic)
  • Message queue encryption (sqs-queue-encrypted-kms)

🏗️ Production Architecture

Core Components

  • Assessment Engine: Orchestrates compliance evaluations across all AWS regions
  • Control Assessments: 138 individual rule implementations with robust error handling
  • Scoring Engine: Calculates compliance scores and generates executive metrics
  • Reporting System: Multi-format output with detailed remediation guidance
  • Resource Management: Optimized for enterprise-scale deployments with memory management

Enterprise Features

  • Multi-threading: Parallel execution for improved performance
  • Error Recovery: Comprehensive error handling and retry mechanisms
  • Audit Trail: Complete compliance audit and logging capabilities
  • Resource Monitoring: Real-time performance and resource usage tracking
  • Scalable Architecture: Handles assessments across hundreds of AWS accounts

📋 Requirements

  • Python: 3.8+ (production tested on 3.8, 3.9, 3.10, 3.11)
  • AWS Credentials: Configured via AWS CLI, environment variables, or IAM roles
  • Permissions: Read-only access to AWS services being assessed
  • Memory: Minimum 2GB RAM for large-scale assessments
  • Network: Internet access for AWS API calls
  • Default Region: Assessments default to us-east-1 unless --regions is specified

📈 Business Value

Immediate Benefits

  • Compliance Readiness: Instant CIS Controls compliance assessment
  • Risk Reduction: Identify and prioritize security vulnerabilities
  • Audit Support: Generate comprehensive compliance reports
  • Cost Optimization: Identify misconfigured and unused resources
  • Operational Efficiency: Automate manual compliance checking

Long-term Value

  • Continuous Improvement: Track compliance posture over time
  • Regulatory Compliance: Support for multiple compliance frameworks
  • Security Automation: Foundation for automated remediation
  • Enterprise Integration: Integrate with existing security tools
  • Future-Proof: Extensible architecture for evolving requirements

🛡️ Security & Compliance

Security Features

  • Read-Only Access: Framework requires only read permissions
  • No Data Storage: No sensitive data stored or transmitted
  • Audit Logging: Complete audit trail of all assessments
  • Error Handling: Secure error handling without data leakage

Compliance Support

  • CIS Controls: 100% coverage of Implementation Groups 1, 2, and 3
  • AWS Well-Architected: Aligned with security pillar best practices
  • Industry Standards: Supports SOC 2, NIST, ISO 27001 mapping
  • Regulatory Requirements: HIPAA, PCI DSS, FedRAMP compatible
  • Custom Frameworks: Extensible for organization-specific requirements

📚 Documentation

Core Documentation

Technical Documentation

🤝 Support & Community

Getting Help

  • Documentation: Comprehensive guides and API documentation
  • GitHub Issues: Bug reports and feature requests
  • Enterprise Support: Commercial support available for enterprise deployments

Contributing

  • Code Contributions: Pull requests welcome with comprehensive tests
  • Documentation: Help improve documentation and examples
  • Bug Reports: Detailed bug reports with reproduction steps
  • Feature Requests: Enhancement suggestions with business justification

📄 License

MIT License - see LICENSE file for details.

🏆 Project Status

✅ Production Ready: Complete implementation with 100% CIS Controls coverage
✅ Enterprise Deployed: Actively used in production environments
✅ Continuously Maintained: Regular updates and security patches
✅ Community Supported: Active development and community contributions
✅ Future-Proof: Extensible architecture for evolving requirements


Framework Version: 1.0.10 (in development)
CIS Controls Coverage: 137/137 rules (100%) + 5 bonus rules
Production Status: ✅ Ready for immediate enterprise deployment
Last Updated: January 2026

🆕 What's New in Version 1.0.10

AWS Backup Service Controls

Six new controls added to assess AWS Backup infrastructure:

IG1 Controls (3):

  1. backup-plan-min-frequency-and-min-retention-check - Validates backup plans have appropriate frequency and retention policies

    • Ensures backup plans have at least one rule defined
    • Validates schedule expressions (cron or rate)
    • Checks retention periods meet minimum requirements (default: 7 days)
    • Validates lifecycle policies for cold storage transitions
  2. backup-vault-access-policy-check - Ensures backup vaults have secure access policies

    • Detects publicly accessible backup vaults
    • Identifies overly permissive access policies
    • Warns about dangerous permissions (DeleteBackupVault, DeleteRecoveryPoint)
    • Validates principle of least privilege
  3. backup-selection-resource-coverage-check - Validates backup plans cover critical resources

    • Ensures backup plans have at least one selection
    • Validates selections target specific resources or use tags
    • Checks that selections are not empty

IG2 Controls (3): 4. backup-vault-lock-check - Verifies vault lock for ransomware protection

  • Ensures critical vaults have Vault Lock enabled
  • Validates immutable backup configuration (WORM)
  • Checks minimum and maximum retention periods
  1. backup-report-plan-exists-check - Validates backup compliance reporting

    • Ensures at least one report plan exists
    • Validates report delivery configuration
    • Checks for active report generation
  2. backup-restore-testing-plan-exists-check - Ensures backups are recoverable

    • Validates restore testing plans exist
    • Checks testing schedules are configured
    • Ensures backups are actually tested for recoverability

These controls complement the existing 12 resource-specific backup controls by assessing the centralized AWS Backup service infrastructure itself. Total backup controls: 17 (12 resource-specific + 5 service-level). See AWS Backup Controls Guide for detailed documentation.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

aws_cis_controls_assessment-1.0.10.tar.gz (272.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

aws_cis_controls_assessment-1.0.10-py3-none-any.whl (325.5 kB view details)

Uploaded Python 3

File details

Details for the file aws_cis_controls_assessment-1.0.10.tar.gz.

File metadata

File hashes

Hashes for aws_cis_controls_assessment-1.0.10.tar.gz
Algorithm Hash digest
SHA256 8eb1def3c6fdb2912509bc2dfc392d1f265265c1df74007581c2d3820d93bf07
MD5 f60c9ed40f5bcd7d23f65cfd28abf873
BLAKE2b-256 eb916d24ab818d9ad317e467830135a31a91b64c6bee88b9b1bb071189b7b5b9

See more details on using hashes here.

File details

Details for the file aws_cis_controls_assessment-1.0.10-py3-none-any.whl.

File metadata

File hashes

Hashes for aws_cis_controls_assessment-1.0.10-py3-none-any.whl
Algorithm Hash digest
SHA256 793f23418d526379faba4da29ff423b97a8d13e52f979bb3e8d4e0d0162097ed
MD5 8af33c9ce58a4471c4deeb209f221e72
BLAKE2b-256 e540123eb90ff87d7989b29b27fc04a5635ab3a66f8ae3e4e1084424cdf0f756

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page