AWS Security Hub CSPM controls supported by AWS Audit Manager
You can use Audit Manager to capture Security Hub CSPM findings as evidence for audits. When you create or edit a custom control, you can specify one or more Security Hub CSPM controls as a data source mapping for evidence collection. Security Hub CSPM performs compliance checks based on these controls, and Audit Manager reports the results as compliance check evidence.
Key points
-
Audit Manager doesn’t collect evidence from service-linked AWS Config rules that are created by Security Hub CSPM.
-
On November 9, 2022, Security Hub CSPM launched automated security checks aligned to the Center for Internet Security’s (CIS) AWS Foundations Benchmark version 1.4.0 requirements, Level 1 and 2 (CIS v1.4.0). In Security Hub CSPM, the CIS v1.4.0 standard is supported in addition to the CIS v1.2.0 standard.
-
We recommend that you turn on the consolidated control findings setting in Security Hub CSPM if it's not turned on already. If you enable Security Hub CSPM on or after February 23, 2023, this setting is turned on by default.
When consolidated findings is enabled, Security Hub CSPM produces a single finding for each security check (even when the same check applies to multiple standards). Each Security Hub CSPM finding is collected as one unique resource assessment in Audit Manager. As a result, consolidated findings results in a decrease of the total unique resource assessments that Audit Manager performs for Security Hub CSPM findings. For this reason, using consolidated findings can often result in a reduction in your Audit Manager usages costs, without sacrificing evidence quality and availability. For more information about pricing, see AWS Audit Manager Pricing
.
The following examples show a comparison of how Audit Manager collects and presents evidence depending on your Security Hub CSPM settings.
Supported Security Hub CSPM controls
The following Security Hub CSPM controls are currently supported by Audit Manager. You can use any of the following standard-specific control ID keywords when you set up a data source for a custom control.
| Security standard | Supported keyword in Audit Manager (standard control ID in Security Hub CSPM) |
Related control documentation (corresponding security control ID in Security Hub CSPM) |
|---|---|---|
| CIS v1.2.0 | 1.2 | |
| CIS v1.2.0 | 1.3 | |
| CIS v1.2.0 | 1.4 | |
| CIS v1.2.0 | 1.5 | |
| CIS v1.2.0 | 1.6 | |
| CIS v1.2.0 | 1.7 | |
| CIS v1.2.0 | 1.8 | |
| CIS v1.2.0 | 1.9 | |
| CIS v1.2.0 | 1.10 | |
| CIS v1.2.0 | 1.11 | |
| CIS v1.2.0 | 1.12 | |
| CIS v1.2.0 |
1.13 |
|
| CIS v1.2.0 |
1.14 |
|
| CIS v1.2.0 |
1.16 |
|
| CIS v1.2.0 |
1.20 |
|
| CIS v1.2.0 |
1.22 |
|
| CIS v1.2.0 |
2.1 |
|
| CIS v1.2.0 |
2.2 |
|
| CIS v1.2.0 |
2.3 |
|
| CIS v1.2.0 |
2.4 |
|
| CIS v1.2.0 |
2.5 |
|
| CIS v1.2.0 |
2.6 |
|
| CIS v1.2.0 |
2.7 |
|
| CIS v1.2.0 |
2.8 |
|
| CIS v1.2.0 |
2.9 |
|
| CIS v1.2.0 |
3.1 |
|
| CIS v1.2.0 |
3.2 |
|
| CIS v1.2.0 |
3.3 |
|
| CIS v1.2.0 |
3.4 |
|
| CIS v1.2.0 |
3.5 |
|
| CIS v1.2.0 |
3.6 |
|
| CIS v1.2.0 |
3.7 |
|
| CIS v1.2.0 |
3.8 |
|
| CIS v1.2.0 |
3.9 |
|
| CIS v1.2.0 |
3.10 |
|
| CIS v1.2.0 |
3.11 |
|
| CIS v1.2.0 |
3.12 |
|
| CIS v1.2.0 |
3.13 |
|
| CIS v1.2.0 |
3.14 |
|
| CIS v1.2.0 |
4.1 |
|
| CIS v1.2.0 |
4.2 |
|
| CIS v1.2.0 |
4.3 |
|
| PCI DSS |
PCI.AutoScaling.1 |
|
| PCI DSS |
PCI.CloudTrail.1 |
|
| PCI DSS |
PCI.CloudTrail.2 |
|
| PCI DSS |
PCI.CloudTrail.3 |
|
| PCI DSS |
PCI.CloudTrail.4 |
|
| PCI DSS |
PCI.CodeBuild.1 |
|
| PCI DSS |
PCI.CodeBuild.2 |
|
| PCI DSS |
PCI.Config.1 |
|
| PCI DSS |
PCI.CW.1 |
|
| PCI DSS |
PCI.DMS.1 |
|
| PCI DSS |
PCI.EC2.1 |
|
| PCI DSS |
PCI.EC2.2 |
|
| PCI DSS |
PCI.EC2.3 |
|
| PCI DSS |
PCI.EC2.4 |
|
| PCI DSS |
PCI.EC2.5 |
|
| PCI DSS |
PCI.EC2.6 |
|
| PCI DSS |
PCI.ELBv2.1 |
|
| PCI DSS |
PCI.ES.1 |
|
| PCI DSS |
PCI.ES.2 |
|
| PCI DSS |
PCI.GuardDuty.1 |
|
| PCI DSS |
PCI.IAM.1 |
|
| PCI DSS |
PCI.IAM.2 |
|
| PCI DSS |
PCI.IAM.3 |
|
| PCI DSS |
PCI.IAM.4 |
|
| PCI DSS |
PCI.IAM.5 |
|
| PCI DSS |
PCI.IAM.6 |
|
| PCI DSS |
PCI.IAM.7 |
|
| PCI DSS |
PCI.IAM.8 |
|
| PCI DSS |
PCI.KMS.1 |
|
| PCI DSS |
PCI.Lambda.1 |
|
| PCI DSS |
PCI.Lambda.2 |
|
| PCI DSS |
PCI.Opensearch.1 |
|
| PCI DSS |
PCI.Opensearch.2 |
|
| PCI DSS |
PCI.RDS.1 |
|
| PCI DSS |
PCI.RDS.2 |
|
| PCI DSS |
PCI.Redshift.1 |
|
| PCI DSS |
PCI.S3.1 |
|
| PCI DSS |
PCI.S3.2 |
|
| PCI DSS |
PCI.S3.3 |
|
| PCI DSS |
PCI.S3.4 |
|
| PCI DSS |
PCI.S3.5 |
|
| PCI DSS |
PCI.S3.6 |
|
| PCI DSS |
PCI.SageMaker.1 |
|
| PCI DSS |
PCI.SSM.1 |
|
| PCI DSS |
PCI.SSM.2 |
|
| PCI DSS |
PCI.SSM.3 |
|
| AWS Foundational Security Best Practices |
Account.1 |
|
| AWS Foundational Security Best Practices |
Account.2 |
Account.2 |
| AWS Foundational Security Best Practices |
ACM.1 |
|
| AWS Foundational Security Best Practices |
ACM.2 |
|
| AWS Foundational Security Best Practices |
APIGateway.1 |
|
| AWS Foundational Security Best Practices |
APIGateway.2 |
|
| AWS Foundational Security Best Practices |
APIGateway.3 |
|
| AWS Foundational Security Best Practices |
APIGateway.4 |
|
| AWS Foundational Security Best Practices |
APIGateway.5 |
|
| AWS Foundational Security Best Practices |
APIGateway.8 |
|
| AWS Foundational Security Best Practices |
APIGateway.9 |
|
| AWS Foundational Security Best Practices |
AppSync.2 |
|
| AWS Foundational Security Best Practices |
AppSync.5 |
AppSync.5 |
| AWS Foundational Security Best Practices |
Athena.1 |
Athena.1 |
| AWS Foundational Security Best Practices |
AutoScaling.1 |
|
| AWS Foundational Security Best Practices |
AutoScaling.2 |
|
| AWS Foundational Security Best Practices |
AutoScaling.3 |
|
| AWS Foundational Security Best Practices |
AutoScaling.4 |
|
| AWS Foundational Security Best Practices |
Autoscaling.5 |
|
| AWS Foundational Security Best Practices |
AutoScaling.6 |
|
| AWS Foundational Security Best Practices |
AutoScaling.9 |
|
| AWS Foundational Security Best Practices |
Backup.1 |
|
| AWS Foundational Security Best Practices |
CloudFormation.1 |
|
| AWS Foundational Security Best Practices |
CloudFront.1 |
|
| AWS Foundational Security Best Practices |
CloudFront.2 |
|
| AWS Foundational Security Best Practices |
CloudFront.3 |
|
| AWS Foundational Security Best Practices |
CloudFront.4 |
|
| AWS Foundational Security Best Practices |
CloudFront.5 |
|
| AWS Foundational Security Best Practices |
CloudFront.6 |
|
| AWS Foundational Security Best Practices |
CloudFront.7 |
|
| AWS Foundational Security Best Practices |
CloudFront.8 |
|
| AWS Foundational Security Best Practices |
CloudFront.9 |
|
| AWS Foundational Security Best Practices |
CloudFront.10 |
|
| AWS Foundational Security Best Practices |
CloudFront.12 |
|
| AWS Foundational Security Best Practices |
CloudFront.13 |
|
| AWS Foundational Security Best Practices |
CloudTrail.1 |
|
| AWS Foundational Security Best Practices |
CloudTrail.2 |
|
| AWS Foundational Security Best Practices |
CloudTrail.3 |
|
| AWS Foundational Security Best Practices |
CloudTrail.4 |
|
| AWS Foundational Security Best Practices |
CloudTrail.5 |
|
| AWS Foundational Security Best Practices |
CloudTrail.6 |
|
| AWS Foundational Security Best Practices |
CloudTrail.7 |
|
| AWS Foundational Security Best Practices |
CloudWatch.1 |
|
| AWS Foundational Security Best Practices |
CloudWatch.2 |
|
| AWS Foundational Security Best Practices |
CloudWatch.3 |
|
| AWS Foundational Security Best Practices |
CloudWatch.4 |
|
| AWS Foundational Security Best Practices |
CloudWatch.5 |
|
| AWS Foundational Security Best Practices |
CloudWatch.6 |
|
| AWS Foundational Security Best Practices |
CloudWatch.7 |
|
| AWS Foundational Security Best Practices |
CloudWatch.8 |
|
| AWS Foundational Security Best Practices |
CloudWatch.9 |
|
| AWS Foundational Security Best Practices |
CloudWatch.10 |
|
| AWS Foundational Security Best Practices |
CloudWatch.11 |
|
| AWS Foundational Security Best Practices |
CloudWatch.12 |
|
| AWS Foundational Security Best Practices |
CloudWatch.13 |
|
| AWS Foundational Security Best Practices |
CloudWatch.14 |
|
| AWS Foundational Security Best Practices |
CloudWatch.15 |
|
| AWS Foundational Security Best Practices |
CloudWatch.16 |
|
| AWS Foundational Security Best Practices |
CloudWatch.17 |
|
| AWS Foundational Security Best Practices |
CodeBuild.1 |
|
| AWS Foundational Security Best Practices |
CodeBuild.2 |
|
| AWS Foundational Security Best Practices |
CodeBuild.3 |
|
| AWS Foundational Security Best Practices |
CodeBuild.4 |
|
| AWS Foundational Security Best Practices |
CodeBuild.5 |
|
| AWS Foundational Security Best Practices |
Config.1 |
|
| AWS Foundational Security Best Practices |
DMS.1 |
|
| AWS Foundational Security Best Practices |
DMS.6 |
|
| AWS Foundational Security Best Practices |
DMS.7 |
|
| AWS Foundational Security Best Practices |
DMS.8 |
|
| AWS Foundational Security Best Practices |
DMS.9 |
|
| AWS Foundational Security Best Practices |
DocumentDB.1 |
|
| AWS Foundational Security Best Practices |
DocumentDB.2 |
|
| AWS Foundational Security Best Practices |
DocumentDB.3 |
|
| AWS Foundational Security Best Practices |
DocumentDB.4 |
|
| AWS Foundational Security Best Practices |
DocumentDB.5 |
|
| AWS Foundational Security Best Practices |
DynamoDB.1 |
|
| AWS Foundational Security Best Practices |
DynamoDB.2 |
|
| AWS Foundational Security Best Practices |
DynamoDB.3 |
|
| AWS Foundational Security Best Practices |
DynamoDB.4 |
DynamoDB.4 |
| AWS Foundational Security Best Practices |
DynamoDB.6 |
|
| AWS Foundational Security Best Practices |
EC2.1 |
|
| AWS Foundational Security Best Practices |
EC2.2 |
|
| AWS Foundational Security Best Practices |
EC2.3 |
|
| AWS Foundational Security Best Practices |
EC2.4 |
|
| AWS Foundational Security Best Practices |
EC2.6 |
|
| AWS Foundational Security Best Practices |
EC2.7 |
|
| AWS Foundational Security Best Practices |
EC2.8 |
|
| AWS Foundational Security Best Practices |
EC2.9 |
|
| AWS Foundational Security Best Practices | EC2.10 |
|
| AWS Foundational Security Best Practices | EC2.12 |
|
| AWS Foundational Security Best Practices | EC2.13 |
|
| AWS Foundational Security Best Practices | EC2.14 |
|
| AWS Foundational Security Best Practices | EC2.15 |
|
| AWS Foundational Security Best Practices |
EC2.16 |
|
| AWS Foundational Security Best Practices |
EC2.17 |
|
| AWS Foundational Security Best Practices |
EC2.18 |
|
| AWS Foundational Security Best Practices |
EC2.19 |
|
| AWS Foundational Security Best Practices |
EC2.20 |
|
| AWS Foundational Security Best Practices |
EC2.21 |
|
| AWS Foundational Security Best Practices |
EC2.22 |
|
| AWS Foundational Security Best Practices |
EC2.23 |
|
| AWS Foundational Security Best Practices |
EC2.24 |
|
| AWS Foundational Security Best Practices |
EC2.25 |
|
| AWS Foundational Security Best Practices |
EC2.28 |
|
| AWS Foundational Security Best Practices |
EC2.51 |
|
| AWS Foundational Security Best Practices |
ECR.1 |
|
| AWS Foundational Security Best Practices |
ECR.2 |
|
| AWS Foundational Security Best Practices |
ECR.3 |
|
| AWS Foundational Security Best Practices |
ECS.1 |
|
| AWS Foundational Security Best Practices |
ECS.2 |
|
| AWS Foundational Security Best Practices |
ECS.3 |
|
| AWS Foundational Security Best Practices |
ECS.4 |
|
| AWS Foundational Security Best Practices |
ECS.5 |
|
| AWS Foundational Security Best Practices |
ECS.8 |
|
| AWS Foundational Security Best Practices |
ECS.9 |
ECS.9 |
| AWS Foundational Security Best Practices |
ECS.10 |
|
| AWS Foundational Security Best Practices |
ECS.12 |
|
| AWS Foundational Security Best Practices |
EFS.1 |
|
| AWS Foundational Security Best Practices |
EFS.2 |
|
| AWS Foundational Security Best Practices |
EFS.3 |
|
| AWS Foundational Security Best Practices |
EFS.4 |
|
| AWS Foundational Security Best Practices |
EKS.1 |
|
| AWS Foundational Security Best Practices |
EKS.2 |
|
| AWS Foundational Security Best Practices |
EKS.8 |
EKS.8 |
| AWS Foundational Security Best Practices |
ElastiCache.1 |
ElastiCache.1 |
| AWS Foundational Security Best Practices |
ElastiCache.2 |
ElastiCache.2 |
| AWS Foundational Security Best Practices |
ElastiCache.3 |
ElastiCache.3 |
| AWS Foundational Security Best Practices |
ElastiCache.4 |
ElastiCache.4 |
| AWS Foundational Security Best Practices |
ElastiCache.5 |
ElastiCache.5 |
| AWS Foundational Security Best Practices |
ElastiCache.6 |
ElastiCache.6 |
| AWS Foundational Security Best Practices |
ElastiCache.7 |
ElastiCache.7 |
| AWS Foundational Security Best Practices |
ElasticBeanstalk.1 |
|
| AWS Foundational Security Best Practices |
ElasticBeanstalk.2 |
|
| AWS Foundational Security Best Practices |
ElasticBeanstalk.3 |
|
| AWS Foundational Security Best Practices |
ELB.1 |
ELB.1 |
| AWS Foundational Security Best Practices |
ELB.2 |
|
| AWS Foundational Security Best Practices |
ELB.3 |
|
| AWS Foundational Security Best Practices |
ELB.4 |
|
| AWS Foundational Security Best Practices |
ELB.5 |
|
| AWS Foundational Security Best Practices |
ELB.6 |
|
| AWS Foundational Security Best Practices |
ELB.7 |
|
| AWS Foundational Security Best Practices |
ELB.8 |
|
| AWS Foundational Security Best Practices |
ELB.9 |
|
| AWS Foundational Security Best Practices |
ELB.10 |
|
| AWS Foundational Security Best Practices |
ELB.12 |
|
| AWS Foundational Security Best Practices |
ELB.13 |
|
| AWS Foundational Security Best Practices |
ELB.14 |
|
| AWS Foundational Security Best Practices |
ELB.16 |
ELB.16 |
| AWS Foundational Security Best Practices |
ELBv2.1 |
|
| AWS Foundational Security Best Practices |
EMR.1 |
|
| AWS Foundational Security Best Practices |
EMR.2 |
EMR.2 |
| AWS Foundational Security Best Practices |
ES.1 |
|
| AWS Foundational Security Best Practices |
ES.2 |
|
| AWS Foundational Security Best Practices |
ES.3 |
|
| AWS Foundational Security Best Practices |
ES.4 |
|
| AWS Foundational Security Best Practices |
ES.5 |
|
| AWS Foundational Security Best Practices |
ES.6 |
|
| AWS Foundational Security Best Practices |
ES.7 |
|
| AWS Foundational Security Best Practices |
ES.8 |
|
| AWS Foundational Security Best Practices |
EventBridge.3 |
EventBridge3. |
| AWS Foundational Security Best Practices |
EventBridge.4 |
EventBridge.4 |
| AWS Foundational Security Best Practices |
FSx.1 |
FSx.1 |
| AWS Foundational Security Best Practices |
GuardDuty.1 |
|
| AWS Foundational Security Best Practices |
IAM.1 |
|
| AWS Foundational Security Best Practices |
IAM.2 |
|
| AWS Foundational Security Best Practices |
IAM.3 |
|
| AWS Foundational Security Best Practices |
IAM.4 |
|
| AWS Foundational Security Best Practices |
IAM.5 |
|
| AWS Foundational Security Best Practices |
IAM.6 |
|
| AWS Foundational Security Best Practices |
IAM.7 |
|
| AWS Foundational Security Best Practices |
IAM.8 |
|
| AWS Foundational Security Best Practices |
IAM.9 |
IAM.9 |
| AWS Foundational Security Best Practices |
IAM.10 |
IAM.10 |
| AWS Foundational Security Best Practices |
IAM.11 |
IAM.11 |
| AWS Foundational Security Best Practices |
IAM.12 |
IAM.12 |
| AWS Foundational Security Best Practices |
IAM.13 |
IAM.13 |
| AWS Foundational Security Best Practices |
IAM.14 |
IAM.14 |
| AWS Foundational Security Best Practices |
IAM.15 |
IAM.15 |
| AWS Foundational Security Best Practices |
IAM.16 |
IAM.16 |
| AWS Foundational Security Best Practices |
IAM.17 |
IAM.17 |
| AWS Foundational Security Best Practices |
IAM.18 |
IAM.18 |
| AWS Foundational Security Best Practices |
IAM.19 |
IAM.19 |
| AWS Foundational Security Best Practices |
IAM.21 |
|
| AWS Foundational Security Best Practices |
IAM.22 |
IAM.22 |
| AWS Foundational Security Best Practices |
Kinesis.1 |
|
| AWS Foundational Security Best Practices |
KMS.1 |
|
| AWS Foundational Security Best Practices |
KMS.2 |
|
| AWS Foundational Security Best Practices |
KMS.3 |
|
| AWS Foundational Security Best Practices |
KMS.4 |
KMS.4 |
| AWS Foundational Security Best Practices |
Lambda.1 |
|
| AWS Foundational Security Best Practices |
Lambda.2 |
|
| AWS Foundational Security Best Practices |
Lambda.3 |
Lambda.3 |
| AWS Foundational Security Best Practices |
Lambda.5 |
|
| AWS Foundational Security Best Practices |
Macie.1 |
Macie.1 |
| AWS Foundational Security Best Practices |
MQ.5 |
MQ.5 |
| AWS Foundational Security Best Practices |
MQ.6 |
MQ.6 |
| AWS Foundational Security Best Practices |
MSK.1 |
MSK.1 |
| AWS Foundational Security Best Practices |
MSK.2 |
MSK.2 |
| AWS Foundational Security Best Practices |
Neptune.1 |
Neptune.1 |
| AWS Foundational Security Best Practices |
Neptune.2 |
Neptune.2 |
| AWS Foundational Security Best Practices |
Neptune.3 |
Neptune.3 |
| AWS Foundational Security Best Practices |
Neptune.4 |
Neptune.4 |
| AWS Foundational Security Best Practices |
Neptune.5 |
Neptune.5 |
| AWS Foundational Security Best Practices |
Neptune.6 |
Neptune.6 |
| AWS Foundational Security Best Practices |
Neptune.7 |
Neptune.7 |
| AWS Foundational Security Best Practices |
Neptune.8 |
Neptune.8 |
| AWS Foundational Security Best Practices |
Neptune.9 |
Neptune.9 |
| AWS Foundational Security Best Practices |
NetworkFirewall.1 |
NetworkFirewall.1 |
| AWS Foundational Security Best Practices |
NetworkFirewall.2 |
NetworkFirewall.2 |
| AWS Foundational Security Best Practices |
NetworkFirewall.3 |
|
| AWS Foundational Security Best Practices |
NetworkFirewall.4 |
|
| AWS Foundational Security Best Practices |
NetworkFirewall.5 |
|
| AWS Foundational Security Best Practices |
NetworkFirewall.6 |
|
| AWS Foundational Security Best Practices |
NetworkFirewall.9 |
NetworkFirewall.9 |
| AWS Foundational Security Best Practices |
Opensearch.1 |
|
| AWS Foundational Security Best Practices |
Opensearch.2 |
|
| AWS Foundational Security Best Practices |
Opensearch.3 |
|
| AWS Foundational Security Best Practices |
Opensearch.4 |
|
| AWS Foundational Security Best Practices |
Opensearch.5 |
|
| AWS Foundational Security Best Practices |
Opensearch.6 |
|
| AWS Foundational Security Best Practices |
Opensearch.7 |
|
| AWS Foundational Security Best Practices |
Opensearch.8 |
|
| AWS Foundational Security Best Practices |
Opensearch.10 |
Opensearch.10 |
| AWS Foundational Security Best Practices |
PCA.1 |
PCA.1 |
| AWS Foundational Security Best Practices |
RDS.1 |
|
| AWS Foundational Security Best Practices |
RDS.2 |
|
| AWS Foundational Security Best Practices |
RDS.3 |
|
| AWS Foundational Security Best Practices |
RDS.4 |
|
| AWS Foundational Security Best Practices |
RDS.5 |
|
| AWS Foundational Security Best Practices |
RDS.6 |
|
| AWS Foundational Security Best Practices |
RDS.7 |
|
| AWS Foundational Security Best Practices |
RDS.8 |
|
| AWS Foundational Security Best Practices |
RDS.9 |
|
| AWS Foundational Security Best Practices |
RDS.10 |
|
| AWS Foundational Security Best Practices |
RDS.11 |
|
| AWS Foundational Security Best Practices |
RDS.12 |
|
| AWS Foundational Security Best Practices |
RDS.13 |
|
| AWS Foundational Security Best Practices |
RDS.14 |
|
| AWS Foundational Security Best Practices |
RDS.15 |
|
| AWS Foundational Security Best Practices |
RDS.16 |
|
| AWS Foundational Security Best Practices |
RDS.17 |
|
| AWS Foundational Security Best Practices |
RDS.18 |
|
| AWS Foundational Security Best Practices |
RDS.19 |
|
| AWS Foundational Security Best Practices |
RDS.20 |
|
| AWS Foundational Security Best Practices |
RDS.21 |
|
| AWS Foundational Security Best Practices |
RDS.22 |
|
| AWS Foundational Security Best Practices |
RDS.23 |
|
| AWS Foundational Security Best Practices |
RDS.24 |
|
| AWS Foundational Security Best Practices |
RDS.25 |
|
| AWS Foundational Security Best Practices |
RDS.26 |
RDS.26 |
| AWS Foundational Security Best Practices |
RDS.27 |
RDS.27 |
| AWS Foundational Security Best Practices |
RDS.34 |
RDS.34 |
| AWS Foundational Security Best Practices |
RDS.35 |
RDS.35 |
| AWS Foundational Security Best Practices |
Redshift.1 |
|
| AWS Foundational Security Best Practices |
Redshift.2 |
|
| AWS Foundational Security Best Practices |
Redshift.3 |
|
| AWS Foundational Security Best Practices |
Redshift.4 |
|
| AWS Foundational Security Best Practices |
Redshift.6 |
|
| AWS Foundational Security Best Practices |
Redshift.7 |
|
| AWS Foundational Security Best Practices |
Redshift.8 |
|
| AWS Foundational Security Best Practices |
Redshift.9 |
|
| AWS Foundational Security Best Practices |
Redshift.10 |
|
| AWS Foundational Security Best Practices |
Route53.2 |
Route53.2 |
| AWS Foundational Security Best Practices |
S3.1 |
|
| AWS Foundational Security Best Practices |
S3.2 |
|
| AWS Foundational Security Best Practices |
S3.3 |
|
| AWS Foundational Security Best Practices |
S3.4 |
|
| AWS Foundational Security Best Practices |
S3.5 |
|
| AWS Foundational Security Best Practices |
S3.6 |
|
| AWS Foundational Security Best Practices |
S3.7 |
S3.7 |
| AWS Foundational Security Best Practices |
S3.8 |
|
| AWS Foundational Security Best Practices |
S3.9 |
|
| AWS Foundational Security Best Practices |
S3.11 |
|
| AWS Foundational Security Best Practices |
S3.12 |
|
| AWS Foundational Security Best Practices |
S3.13 |
|
| AWS Foundational Security Best Practices |
S3.14 |
S3.14 |
| AWS Foundational Security Best Practices |
S3.15 |
S3.15 |
| AWS Foundational Security Best Practices |
S3.17 |
S3.17 |
| AWS Foundational Security Best Practices |
S3.19 |
S3.19 |
| AWS Foundational Security Best Practices |
S3.19 |
S3.20 |
| AWS Foundational Security Best Practices |
SageMaker.1 |
|
| AWS Foundational Security Best Practices |
SageMaker.2 |
|
| AWS Foundational Security Best Practices |
SageMaker.3 |
|
| AWS Foundational Security Best Practices |
SecretsManager.1 |
|
| AWS Foundational Security Best Practices |
SecretsManager.2 |
|
| AWS Foundational Security Best Practices |
SecretsManager.3 |
|
| AWS Foundational Security Best Practices |
SecretsManager.4 |
|
| AWS Foundational Security Best Practices |
SNS.1 |
|
| AWS Foundational Security Best Practices |
SNS.2 |
|
| AWS Foundational Security Best Practices |
SQS.1 |
|
| AWS Foundational Security Best Practices |
SSM.1 |
|
| AWS Foundational Security Best Practices |
SSM.2 |
|
| AWS Foundational Security Best Practices |
SSM.3 |
|
| AWS Foundational Security Best Practices |
SSM.4 |
|
| AWS Foundational Security Best Practices |
StepFunctions.1 |
|
| AWS Foundational Security Best Practices |
WAF.1 |
|
| AWS Foundational Security Best Practices |
WAF.2 |
|
| AWS Foundational Security Best Practices |
WAF.3 |
|
| AWS Foundational Security Best Practices |
WAF.4 |
|
| AWS Foundational Security Best Practices |
WAF.6 |
|
| AWS Foundational Security Best Practices |
WAF.7 |
|
| AWS Foundational Security Best Practices |
WAF.8 |
|
| AWS Foundational Security Best Practices |
WAF.10 |
|
| AWS Foundational Security Best Practices |
WAF.11 |
WAF.11 |
| AWS Foundational Security Best Practices |
WAF.12 |
WAF.12 |
Additional resources
-
To find help with evidence collection issues for this data source type, see My assessment isn’t collecting compliance check evidence from AWS Security Hub CSPM.
-
To create a custom control using this data source type, see Creating a custom control in AWS Audit Manager.
-
To create a custom framework that uses your custom control, see Creating a custom framework in AWS Audit Manager.
-
To add your custom control to an existing custom framework, see Editing a custom framework in AWS Audit Manager.