Skip to main content

Production-ready AWS CIS Controls compliance assessment framework with 224 comprehensive rules across 40 CIS Controls v8.1 safeguards

Project description

AWS CIS Controls Compliance Assessment Framework

A production-ready, enterprise-grade framework for evaluating AWS account configurations against CIS Controls Implementation Groups (IG1, IG2, IG3) using AWS Config rule specifications. 224 rules across 40 CIS Controls v8.1 safeguards.

Production Status: This framework is production-ready and actively deployed in enterprise environments. It provides comprehensive point-in-time compliance assessments while we recommend AWS Config for ongoing continuous compliance monitoring and automated remediation.

🎯 Key Features

  • ✅ 224 Assessment Rules: 129 IG1 + 82 IG2 + 13 IG3 rules across 40 CIS Controls
  • ✅ Cumulative Coverage: IG1 24/56 (42.9%), IG2 27/74 (36.5%), IG3 30/153 (19.6%) safeguards
  • ✅ Dual Scoring System: Both weighted and AWS Config-style scoring methodologies
  • ✅ Enhanced HTML Reports: Sorted controls, hover tooltips, working search, improved remediation display
  • ✅ Enterprise Ready: Production-tested with enterprise-grade architecture
  • ✅ Performance Optimized: Handles large-scale assessments efficiently
  • ✅ Multi-Format Reports: JSON, HTML, and CSV with detailed remediation guidance
  • ✅ No AWS Config Required: Direct AWS API calls based on Config rule specifications
  • ✅ Comprehensive Remediation: Every rule includes CLI commands, console steps, best practices, and AWS documentation links

🚀 Quick Start

Installation

# Install from PyPI (production-ready)
pip install aws-cis-controls-assessment

# Or install from source for development
git clone <repository-url>
cd aws-cis-controls-assessment
pip install -e .

Basic Usage

# Run complete assessment (all 224 rules) - defaults to us-east-1
aws-cis-assess assess --aws-profile my-aws-profile

# Assess multiple regions
aws-cis-assess assess --aws-profile my-aws-profile --regions us-east-1,us-west-2

# Assess specific Implementation Group using short flag (defaults to us-east-1)
aws-cis-assess assess -p my-aws-profile --implementation-groups IG1 --output-format json

# Generate comprehensive HTML report (defaults to us-east-1)
aws-cis-assess assess --aws-profile production --output-format html --output-file compliance-report.html

# Enterprise multi-region assessment with multiple formats
aws-cis-assess assess -p security-audit --implementation-groups IG1,IG2,IG3 --regions all --output-format html,json --output-dir ./reports/

# Quick assessment with default profile and default region (us-east-1)
aws-cis-assess assess --output-format json

📊 Implementation Groups Coverage

Coverage Summary (Cumulative)

IG Safeguards Covered Total Safeguards Coverage Rules
IG1 24 56 42.9% 129
IG2 27 74 36.5% 82
IG3 30 153 19.6% 13
Total 224

Coverage is cumulative: IG2 includes all IG1 safeguards, IG3 includes all IG1+IG2 safeguards.

IG1 - Essential Cyber Hygiene (129 Rules, 24 Controls)

Control ID Safeguard Name Rules
1.1 Establish and Maintain Detailed Enterprise Asset Inventory 12
1.5 Account Inventory 1
2.2 Ensure Authorized Software is Currently Supported 5
2.2.1 Software Inventory Process 1
3.3 Configure Data Access Control Lists 4
3.4 Enforce Data Retention 2
3.11 Encrypt Sensitive Data at Rest 8
4.1 Establish and Maintain a Secure Configuration Process 14
4.6 Securely Manage Enterprise Assets and Software 3
5.3 Disable Dormant Accounts 6
6.2 Establish an Access Revoking Process 1
6.5 Require MFA for Administrative Access 3
8.2 Collect Audit Logs 7
8.5 Collect Detailed Audit Logs 1
8.8 Audit Log Reviews 1
9.1 Ensure Only Fully Supported Browsers and Email Clients are Allowed 3
10.1 Deploy and Maintain Anti-Malware Software 2
11.1 Establish and Maintain a Data Recovery Process 6
11.2 Automated Backups 8
12.2 Network Infrastructure Management 5
13.1 Centralize Security Event Alerting 5
14.6 Train Workforce Members on Recognizing and Reporting Security Incidents 5
15.3 Classify Service Providers 3
16.11 Leverage Vetted Modules or Services for Application Security Components 23

IG2 - Enhanced Security (82 Rules, 12 Controls)

Control ID Safeguard Name Rules
3.10 Encrypt Sensitive Data in Transit 7
3.11 Encrypt Sensitive Data at Rest 8
4.5 Implement and Manage a Firewall on End-User Devices 5
4.6 Securely Manage Enterprise Assets and Software 5
5.2 Use Unique Passwords 3
6.3 Require MFA for Externally-Exposed Applications 5
6.4 Require MFA for Remote Network Access 5
8.2 Audit Log Management 7
8.5 Collect Detailed Audit Logs 7
11.4 Backup Restoration Testing 6
12.2 Network Infrastructure Management 11
16.11 Leverage Vetted Modules or Services for Application Security Components 13

IG3 - Advanced Security (13 Rules, 4 Controls)

Control ID Safeguard Name Rules
3.10 Encrypt Sensitive Data in Transit 1
10.5 Enable Anti-Exploitation Features 3
13.8 Deploy a Network Intrusion Prevention Solution 3
16.12 Implement Code-Level Security Checks 6

🏗️ Production Architecture

Core Components

  • Assessment Engine: Orchestrates compliance evaluations across all AWS regions
  • Control Assessments: 224 individual rule implementations with robust error handling
  • Scoring Engine: Calculates compliance scores and generates executive metrics
  • Reporting System: Multi-format output with detailed remediation guidance
  • Resource Management: Optimized for enterprise-scale deployments with memory management

Enterprise Features

  • Multi-threading: Parallel execution for improved performance
  • Error Recovery: Comprehensive error handling and retry mechanisms
  • Audit Trail: Complete compliance audit and logging capabilities
  • Resource Monitoring: Real-time performance and resource usage tracking
  • Scalable Architecture: Handles assessments across hundreds of AWS accounts

📋 Requirements

  • Python: 3.8+ (production tested on 3.8, 3.9, 3.10, 3.11)
  • AWS Credentials: Configured via AWS CLI, environment variables, or IAM roles
  • Permissions: Read-only access to AWS services being assessed
  • Memory: Minimum 2GB RAM for large-scale assessments
  • Network: Internet access for AWS API calls
  • Default Region: Assessments default to us-east-1 unless --regions is specified

📈 Business Value

Immediate Benefits

  • Compliance Readiness: Instant CIS Controls compliance assessment
  • Risk Reduction: Identify and prioritize security vulnerabilities
  • Audit Support: Generate comprehensive compliance reports
  • Cost Optimization: Identify misconfigured and unused resources
  • Operational Efficiency: Automate manual compliance checking

Long-term Value

  • Continuous Improvement: Track compliance posture over time
  • Regulatory Compliance: Support for multiple compliance frameworks
  • Security Automation: Foundation for automated remediation
  • Enterprise Integration: Integrate with existing security tools
  • Future-Proof: Extensible architecture for evolving requirements

🛡️ Security & Compliance

Security Features

  • Read-Only Access: Framework requires only read permissions
  • No Data Storage: No sensitive data stored or transmitted
  • Audit Logging: Complete audit trail of all assessments
  • Error Handling: Secure error handling without data leakage

Compliance Support

  • CIS Controls: Coverage across Implementation Groups 1, 2, and 3 (224 rules, 40 safeguards)
  • AWS Well-Architected: Aligned with security pillar best practices
  • Industry Standards: Supports SOC 2, NIST, ISO 27001 mapping
  • Regulatory Requirements: HIPAA, PCI DSS, FedRAMP compatible
  • Custom Frameworks: Extensible for organization-specific requirements

📚 Documentation

Core Documentation

Technical Documentation

🤝 Support & Community

Getting Help

  • Documentation: Comprehensive guides and API documentation
  • GitHub Issues: Bug reports and feature requests
  • Enterprise Support: Commercial support available for enterprise deployments

Contributing

  • Code Contributions: Pull requests welcome with comprehensive tests
  • Documentation: Help improve documentation and examples
  • Bug Reports: Detailed bug reports with reproduction steps
  • Feature Requests: Enhancement suggestions with business justification

📄 License

MIT License - see LICENSE file for details.

🏆 Project Status

✅ Production Ready: 224 rules across 40 CIS Controls v8.1 safeguards
✅ Enterprise Deployed: Actively used in production environments
✅ Continuously Maintained: Regular updates and security patches
✅ Community Supported: Active development and community contributions
✅ Future-Proof: Extensible architecture for evolving requirements


Framework Version: 1.2.3
CIS Controls v8.1 Coverage: 224 rules across 40 safeguards (IG1: 129, IG2: 82, IG3: 13)
Production Status: ✅ Ready for immediate enterprise deployment
Last Updated: February 2026

🆕 What's New in Version 1.2.3

Accuracy & Quality Fixes

  • Coverage metrics are now truly dynamic — safeguard counts loaded from YAML configs with proper cumulative logic (IG2 = IG1∪IG2, IG3 = IG1∪IG2∪IG3)
  • HTML report controls sort numerically (1.1, 1.5, 2.2…) instead of arbitrary order
  • Hover tooltips on control cards show the full CIS safeguard title
  • 8 generic control titles fixed with proper CIS Controls v8.1 names from the Cloud Companion Guide
  • README updated with accurate rule counts (224 total), full controls table, and removed "Coming Soon" placeholders for IG2/IG3 (they're implemented)

Previous Highlights (1.2.0–1.2.2)

  • 50 new IG1 rules across security services, logging, encryption, inventory, configuration management, and backup
  • 14 IG2 access & configuration controls (CIS Controls 4, 5, 6)
  • 7 IG2 audit logging controls (CIS Control 8)
  • Dual scoring system, enhanced HTML reports, resource deduplication fixes

See CHANGELOG.md for complete version history.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

aws_cis_controls_assessment-1.2.4.tar.gz (379.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

aws_cis_controls_assessment-1.2.4-py3-none-any.whl (459.8 kB view details)

Uploaded Python 3

File details

Details for the file aws_cis_controls_assessment-1.2.4.tar.gz.

File metadata

File hashes

Hashes for aws_cis_controls_assessment-1.2.4.tar.gz
Algorithm Hash digest
SHA256 30ee3799dee905a6e4df7d04beff2f6ffe67a68322ae658804da5d7b73a8417e
MD5 9f6cb5f25cfe7c8d5649dad5f91755a7
BLAKE2b-256 77f467dda5ec5930dcf419f73c7d5677b0dee1494b3dba7a580e11bee3bb25de

See more details on using hashes here.

File details

Details for the file aws_cis_controls_assessment-1.2.4-py3-none-any.whl.

File metadata

File hashes

Hashes for aws_cis_controls_assessment-1.2.4-py3-none-any.whl
Algorithm Hash digest
SHA256 53d68ea40cccb5a5cc079a3344bc9ddb51e20cca2bbbbabc6eff5aa2657a80ef
MD5 414792a111b1f44e1a43efce1f044324
BLAKE2b-256 d4b8a3c8e9366c2371e27a136931fd72ee6126cc6e9e4414f86a4b1bc5497de8

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page