

AWS Audit Manager 不再開放給新客戶。現有客戶可以繼續正常使用該服務。如需詳細資訊，請參閱[AWS Audit Manager 可用性變更](https://docs.aws.amazon.com/audit-manager/latest/userguide/audit-manager-availability-change.html)。

本文為英文版的機器翻譯版本，如內容有任何歧義或不一致之處，概以英文版為準。

# AWS Security Hub CSPM 支援的控制項 AWS Audit Manager
<a name="control-data-sources-ash"></a>



您可以使用 Audit Manager 來擷取 Security Hub CSPM 調查結果，做為稽核的證據。當您建立或編輯自訂控制項時，您可以將一或多個 Security Hub CSPM 控制項指定為證據收集的資料來源映射。Security Hub CSPM 會根據這些控制項執行合規檢查，而 Audit Manager 會將結果報告為合規檢查證據。

**Contents**
+ [重點](#using-security-hub-controls)
+ [支援的 Security Hub CSPM 控制項](#security-hub-controls-for-custom-control-data-sources)
+ [其他資源](#using-security-hub-controls-additional-resources)

## 重點
<a name="using-security-hub-controls"></a>
+ Audit Manager 不會從 [Security Hub CSPM 建立的服務連結 AWS Config 規則](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards-awsconfigrules.html)收集證據。
+ 2022 年 11 月 9 日，Security Hub CSPM 啟動了符合網際網路安全中心 (CIS) AWS 基準 1.4.0 版要求的自動化安全檢查，第 1 級和第 2 級 (CIS 1.4.0 版）。在 Security Hub CSPM 中，除了 [CIS v1.2.0 標準之外，還支援 CIS v1.4](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cis-controls-1.4.0.html)[.0 標準。](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cis-controls.html)
+ 如果尚未開啟，建議您在 Security Hub CSPM 中開啟[合併控制調查結果](https://docs.aws.amazon.com/securityhub/latest/userguide/controls-findings-create-update.html#consolidated-control-findings)設定。如果您在 2023 年 2 月 23 日或之後啟用 Security Hub CSPM，則此設定預設為*開啟*。

  啟用合併調查結果時，Security Hub CSPM 會為每個安全檢查產生單一調查結果 （即使相同的檢查適用於多個標準）。每個 Security Hub CSPM 調查結果會在 Audit Manager 中收集為一個唯一的資源評估。因此，合併調查結果會導致 Audit Manager 為 Security Hub CSPM 調查結果執行的唯一資源評估總數減少。因此，使用合併的調查結果可以降低 Audit Manager 的使用成本，而不會犧牲證據品質和可用性。如需定價的詳細資訊，請參閱[AWS Audit Manager 定價](https://aws.amazon.com/audit-manager/pricing/)。

 

### 開啟或關閉合併調查結果時的證據範例
<a name="collapsible-section-1"></a>

下列範例顯示 Audit Manager 如何根據您的 Security Hub CSPM 設定收集和呈現證據的比較。

------
#### [ When consolidated findings is turned on  ]

假設您已在 Security Hub CSPM： AWS FSBP、PCI DSS 和 CIS Benchmark v1.2.0 中啟用下列三個安全標準。
+ 這三個標準都使用相同的控制項 ([IAM.4](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-4)) 搭配相同的基礎 AWS Config 規則 ([iam-root-access-key-check](https://docs.aws.amazon.com/config/latest/developerguide/iam-root-access-key-check.html))。
+ 由於**已開啟**合併調查結果設定，Security Hub CSPM 會為此控制項產生單一調查結果。
+ Security Hub CSPM 會將此控制項的合併調查結果傳送至 Audit Manager。
+ 合併的調查結果會被視為 Audit Manager 中的一項獨立資源評估。因此，您的評估中會新增一份證據。

此處提供範例說明該證據的範例：

```
{
    "SchemaVersion": "2018-10-08",
    "Id": "arn:aws:securityhub:us-west-2:111122223333:security-control/IAM.4/finding/09876543-p0o9-i8u7-y6t5-098765432109",
    "ProductArn": "arn:aws:securityhub:us-west-2::product/aws/securityhub",
    "ProductName": "Security Hub",
    "CompanyName": "AWS",
    "Region": "us-west-2",
    "GeneratorId": "security-control/IAM.4",
    "AwsAccountId": "111122223333",
    "Types": [
        "Software and Configuration Checks/Industry and Regulatory Standards"
    ],
    "FirstObservedAt": "2023-10-25T11:32:24.861Z",
    "LastObservedAt": "2023-11-02T11:59:19.546Z",
    "CreatedAt": "2023-10-25T11:32:24.861Z",
    "UpdatedAt": "2023-11-02T11:59:15.127Z",
    "Severity": {
        "Label": "INFORMATIONAL",
        "Normalized": 0,
        "Original": "INFORMATIONAL"
    },
    "Title": "IAM root user access key should not exist",
    "Description": "This AWS control checks whether the root user access key is available.",
    "Remediation": {
        "Recommendation": {
            "Text": "For information on how to correct this issue, consult the AWS Security Hub controls documentation.",
            "Url": "https://docs.aws.amazon.com/console/securityhub/IAM.4/remediation"
        }
    },
    "ProductFields": {
        "RelatedAWSResources:0/name": "securityhub-iam-root-access-key-check-000270f5",
        "RelatedAWSResources:0/type": "AWS::Config::ConfigRule",
        "aws/securityhub/ProductName": "Security Hub",
        "aws/securityhub/CompanyName": "AWS",
        "Resources:0/Id": "arn:aws:iam::111122223333:root",
        "aws/securityhub/FindingId": "arn:aws:securityhub:us-west-2::product/aws/securityhub/arn:aws:securityhub:us-west-2:111122223333:security-control/IAM.4/finding/09876543-p0o9-i8u7-y6t5-098765432109"
    },
    "Resources": [{
        "Type": "AwsAccount",
        "Id": "AWS::::Account:111122223333",
        "Partition": "aws",
        "Region": "us-west-2"
    }],
    "Compliance": {
        "Status": "PASSED",
        "RelatedRequirements": [
            "CIS AWS Foundations Benchmark v1.2.0/1.12"
        ],
        "SecurityControlId": "IAM.4",
        "AssociatedStandards": [{
                "StandardsId": "ruleset/cis-aws-foundations-benchmark/v/1.2.0"
            },
            {
                "StandardsId": "standards/aws-foundational-security-best-practices/v/1.0.0"
            }
        ]
    },
    "WorkflowState": "NEW",
    "Workflow": {
        "Status": "RESOLVED"
    },
    "RecordState": "ACTIVE",
    "FindingProviderFields": {
        "Severity": {
            "Label": "INFORMATIONAL",
            "Original": "INFORMATIONAL"
        },
        "Types": [
            "Software and Configuration Checks/Industry and Regulatory Standards"
        ]
    },
    "ProcessedAt": "2023-11-02T11:59:20.980Z"
}
```

------
#### [ When consolidated findings is turned off ]

假設您已在 Security Hub CSPM： AWS FSBP、PCI DSS 和 CIS Benchmark v1.2.0 中啟用下列三個安全標準。
+ 這三個標準都使用相同的控制項 ([IAM.4](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-4)) 搭配相同的基礎 AWS Config 規則 ([iam-root-access-key-check](https://docs.aws.amazon.com/config/latest/developerguide/iam-root-access-key-check.html))。
+ 由於合併調查結果設定**已關閉**，Security Hub CSPM 會針對每個啟用的標準，為每個安全檢查產生個別調查結果 （在此案例中為三個調查結果）。
+ Security Hub CSPM 會將三個不同的標準特定調查結果傳送至 Audit Manager 以進行此控制。
+ 這三個調查結果計數為 Audit Manager 中的三個獨特資源評估 因此，三項獨立的證據新增至您的評估中。

此處提供範例說明該證據的範例。請注意，在此範例中，下列三個承載中的每一項都具有相同的安全控制 ID ({{`SecurityControlId":"IAM.4"`}})。因此，當下列調查結果來自 Security Hub CSPM 時，在 Audit Manager (IAM.4) 中收集此證據的評估控制項會收到三個單獨的證據。

**IAM.4 的證據 (FSBP)**

```
{
  "version":"0",
  "id":"12345678-1q2w-3e4r-5t6y-123456789012",
  "detail-type":"Security Hub Findings - Imported",
  "source":"aws.securityhub",
  "account":"111122223333",
  "time":"2023-10-27T18:55:59Z",
  "region":"us-west-2",
  "resources":[
     "arn:aws:securityhub:us-west-2::product/aws/securityhub/arn:aws:securityhub:us-west-2:111122223333:subscription/aws-foundational-security-best-practices/v/1.0.0/Lambda.1/finding/b5e68d5d-43c3-46c8-902d-51cb0d4da568"
  ],
  "detail":{
     "findings":[
        {
           "SchemaVersion":"2018-10-08",
           "Id":"arn:aws:securityhub:us-west-2:111122223333:subscription/aws-foundational-security-best-practices/v/1.0.0/IAM.4/finding/8e2e05a2-4d50-4c2e-a78f-3cbe9402d17d",
           "ProductArn":"arn:aws:securityhub:us-west-2::product/aws/securityhub",
           "ProductName":"Security Hub",
           "CompanyName":"AWS",
           "Region":"us-west-2",
           "GeneratorId":"aws-foundational-security-best-practices/v/1.0.0/IAM.4",
           "AwsAccountId":"111122223333",
           "Types":[
              "Software and Configuration Checks/Industry and Regulatory Standards/AWS-Foundational-Security-Best-Practices"
           ],
           "FirstObservedAt":"2020-10-05T19:18:47.848Z",
           "LastObservedAt":"2023-11-01T14:12:04.106Z",
           "CreatedAt":"2020-10-05T19:18:47.848Z",
           "UpdatedAt":"2023-11-01T14:11:53.720Z",
           "Severity":{
              "Product":0,
              "Label":"INFORMATIONAL",
              "Normalized":0,
              "Original":"INFORMATIONAL"
           },
           "Title":"IAM.4 IAM root user access key should not exist",
           "Description":"This AWS control checks whether the root user access key is available.",
           "Remediation":{
              "Recommendation":{
                 "Text":"For information on how to correct this issue, consult the AWS Security Hub controls documentation.",
                 "Url":"https://docs.aws.amazon.com/console/securityhub/IAM.4/remediation"
              }
           },
           "ProductFields":{
              "StandardsArn":"arn:aws:securityhub:::standards/aws-foundational-security-best-practices/v/1.0.0",
              "StandardsSubscriptionArn":"arn:aws:securityhub:us-west-2:111122223333:subscription/aws-foundational-security-best-practices/v/1.0.0",
              "ControlId":"IAM.4",
              "RecommendationUrl":"https://docs.aws.amazon.com/console/securityhub/IAM.4/remediation",
              "RelatedAWSResources:0/name":"securityhub-iam-root-access-key-check-67cbb1c4",
              "RelatedAWSResources:0/type":"AWS::Config::ConfigRule",
              "StandardsControlArn":"arn:aws:securityhub:us-west-2:111122223333:control/aws-foundational-security-best-practices/v/1.0.0/IAM.4",
              "aws/securityhub/ProductName":"Security Hub",
              "aws/securityhub/CompanyName":"AWS",
              "Resources:0/Id":"arn:aws:iam::111122223333:root",
              "aws/securityhub/FindingId":"arn:aws:securityhub:us-west-2::product/aws/securityhub/arn:aws:securityhub:us-west-2:111122223333:subscription/aws-foundational-security-best-practices/v/1.0.0/IAM.4/finding/8e2e05a2-4d50-4c2e-a78f-3cbe9402d17d"
           },
           "Resources":[
              {
                 "Type":"AwsAccount",
                 "Id":"AWS::::Account:111122223333",
                 "Partition":"aws",
                 "Region":"us-west-2"
              }
           ],
           "Compliance":{
              "Status":"PASSED",
              {{"SecurityControlId":"IAM.4"}},
              "AssociatedStandards":[
                 {
                    "StandardsId":"standards/aws-foundational-security-best-practices/v/1.0.0"
                 }
              ]
           },
           "WorkflowState":"NEW",
           "Workflow":{
              "Status":"RESOLVED"
           },
           "RecordState":"ACTIVE",
           "FindingProviderFields":{
              "Severity":{
                 "Label":"INFORMATIONAL",
                 "Original":"INFORMATIONAL"
              },
              "Types":[
                 "Software and Configuration Checks/Industry and Regulatory Standards/AWS-Foundational-Security-Best-Practices"
              ]
           },
           "ProcessedAt":"2023-11-01T14:12:07.395Z"
        }
     ]
  }
}
```

**IAM.4 的證據 (CIS 1.2)**

```
{
  "version":"0",
  "id":"12345678-1q2w-3e4r-5t6y-123456789012",
  "detail-type":"Security Hub Findings - Imported",
  "source":"aws.securityhub",
  "account":"111122223333",
  "time":"2023-10-27T18:55:59Z",
  "region":"us-west-2",
  "resources":[
     "arn:aws:securityhub:us-west-2::product/aws/securityhub/arn:aws:securityhub:us-west-2:111122223333:subscription/aws-foundational-security-best-practices/v/1.0.0/Lambda.1/finding/1dd8f2f8-cf1b-47c9-a875-8d7387fc9c23"
  ],
  "detail":{
     "findings":[
        {
           "SchemaVersion":"2018-10-08",
           "Id":"arn:aws:securityhub:us-west-2:111122223333:subscription/cis-aws-foundations-benchmark/v/1.2.0/1.12/finding/1dd8f2f8-cf1b-47c9-a875-8d7387fc9c23",
           "ProductArn":"arn:aws:securityhub:us-west-2::product/aws/securityhub",
           "ProductName":"Security Hub",
           "CompanyName":"AWS",
           "Region":"us-west-2",
           "GeneratorId":"arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule/1.12",
           "AwsAccountId":"111122223333",
           "Types":[
              "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark"
           ],
           "FirstObservedAt":"2020-10-05T19:18:47.775Z",
           "LastObservedAt":"2023-11-01T14:12:07.989Z",
           "CreatedAt":"2020-10-05T19:18:47.775Z",
           "UpdatedAt":"2023-11-01T14:11:53.720Z",
           "Severity":{
              "Product":0,
              "Label":"INFORMATIONAL",
              "Normalized":0,
              "Original":"INFORMATIONAL"
           },
           "Title":"1.12 Ensure no root user access key exists",
           "Description":"The root user is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the root user be removed.",
           "Remediation":{
              "Recommendation":{
                 "Text":"For information on how to correct this issue, consult the AWS Security Hub controls documentation.",
                 "Url":"https://docs.aws.amazon.com/console/securityhub/IAM.4/remediation"
              }
           },
           "ProductFields":{
              "StandardsGuideArn":"arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
              "StandardsGuideSubscriptionArn":"arn:aws:securityhub:us-west-2:111122223333:subscription/cis-aws-foundations-benchmark/v/1.2.0",
              "RuleId":"1.12",
              "RecommendationUrl":"https://docs.aws.amazon.com/console/securityhub/IAM.4/remediation",
              "RelatedAWSResources:0/name":"securityhub-iam-root-access-key-check-67cbb1c4",
              "RelatedAWSResources:0/type":"AWS::Config::ConfigRule",
              "StandardsControlArn":"arn:aws:securityhub:us-west-2:111122223333:control/cis-aws-foundations-benchmark/v/1.2.0/1.12",
              "aws/securityhub/ProductName":"Security Hub",
              "aws/securityhub/CompanyName":"AWS",
              "Resources:0/Id":"arn:aws:iam::111122223333:root",
              "aws/securityhub/FindingId":"arn:aws:securityhub:us-west-2::product/aws/securityhub/arn:aws:securityhub:us-west-2:111122223333:subscription/cis-aws-foundations-benchmark/v/1.2.0/1.12/finding/1dd8f2f8-cf1b-47c9-a875-8d7387fc9c23"
           },
           "Resources":[
              {
                 "Type":"AwsAccount",
                 "Id":"AWS::::Account:111122223333",
                 "Partition":"aws",
                 "Region":"us-west-2"
              }
           ],
           "Compliance":{
              "Status":"PASSED",
              {{"SecurityControlId":"IAM.4"}},
              "AssociatedStandards":[
                 {
                    "StandardsId":"ruleset/cis-aws-foundations-benchmark/v/1.2.0"
                 }
              ]
           },
           "WorkflowState":"NEW",
           "Workflow":{
              "Status":"RESOLVED"
           },
           "RecordState":"ACTIVE",
           "FindingProviderFields":{
              "Severity":{
                 "Label":"INFORMATIONAL",
                 "Original":"INFORMATIONAL"
              },
              "Types":[
                 "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark"
              ]
           },
           "ProcessedAt":"2023-11-01T14:12:13.436Z"
        }
     ]
  }
}
```

**PCI DSS 的證據**

```
{
  "version":"0",
  "id":"12345678-1q2w-3e4r-5t6y-123456789012",
  "detail-type":"Security Hub Findings - Imported",
  "source":"aws.securityhub",
  "account":"111122223333",
  "time":"2023-10-27T18:55:59Z",
  "region":"us-west-2",
  "resources":[
     "arn:aws:securityhub:us-west-2::product/aws/securityhub/arn:aws:securityhub:us-west-2:111122223333:subscription/aws-foundational-security-best-practices/v/1.0.0/Lambda.1/finding/1dd8f2f8-cf1b-47c9-a875-8d7387fc9c23"
  ],
  "detail":{
     "findings":[
        {
           "SchemaVersion":"2018-10-08",
           "Id":"arn:aws:securityhub:us-west-2:111122223333:subscription/pci-dss/v/3.2.1/PCI.IAM.1/finding/3c75f651-6e2e-44f4-8e22-297d5c2d0c8b",
           "ProductArn":"arn:aws:securityhub:us-west-2::product/aws/securityhub",
           "ProductName":"Security Hub",
           "CompanyName":"AWS",
           "Region":"us-west-2",
           "GeneratorId":"pci-dss/v/3.2.1/PCI.IAM.1",
           "AwsAccountId":"111122223333",
           "Types":[
              "Software and Configuration Checks/Industry and Regulatory Standards/PCI-DSS"
           ],
           "FirstObservedAt":"2020-10-05T19:18:47.788Z",
           "LastObservedAt":"2023-11-01T14:12:02.413Z",
           "CreatedAt":"2020-10-05T19:18:47.788Z",
           "UpdatedAt":"2023-11-01T14:11:53.720Z",
           "Severity":{
              "Product":0,
              "Label":"INFORMATIONAL",
              "Normalized":0,
              "Original":"INFORMATIONAL"
           },
           "Title":"PCI.IAM.1 IAM root user access key should not exist",
           "Description":"This AWS control checks whether the root user access key is available.",
           "Remediation":{
              "Recommendation":{
                 "Text":"For information on how to correct this issue, consult the AWS Security Hub controls documentation.",
                 "Url":"https://docs.aws.amazon.com/console/securityhub/IAM.4/remediation"
              }
           },
           "ProductFields":{
              "StandardsArn":"arn:aws:securityhub:::standards/pci-dss/v/3.2.1",
              "StandardsSubscriptionArn":"arn:aws:securityhub:us-west-2:111122223333:subscription/pci-dss/v/3.2.1",
              "ControlId":"PCI.IAM.1",
              "RecommendationUrl":"https://docs.aws.amazon.com/console/securityhub/IAM.4/remediation",
              "RelatedAWSResources:0/name":"securityhub-iam-root-access-key-check-67cbb1c4",
              "RelatedAWSResources:0/type":"AWS::Config::ConfigRule",
              "StandardsControlArn":"arn:aws:securityhub:us-west-2:111122223333:control/pci-dss/v/3.2.1/PCI.IAM.1",
              "aws/securityhub/ProductName":"Security Hub",
              "aws/securityhub/CompanyName":"AWS",
              "Resources:0/Id":"arn:aws:iam::111122223333:root",
              "aws/securityhub/FindingId":"arn:aws:securityhub:us-west-2::product/aws/securityhub/arn:aws:securityhub:us-west-2:111122223333:subscription/pci-dss/v/3.2.1/PCI.IAM.1/finding/3c75f651-6e2e-44f4-8e22-297d5c2d0c8b"
           },
           "Resources":[
              {
                 "Type":"AwsAccount",
                 "Id":"AWS::::Account:111122223333",
                 "Partition":"aws",
                 "Region":"us-west-2"
              }
           ],
           "Compliance":{
              "Status":"PASSED",
              "RelatedRequirements":[
                 "PCI DSS 2.1",
                 "PCI DSS 2.2",
                 "PCI DSS 7.2.1"
              ],
              {{"SecurityControlId":"IAM.4"}},
              "AssociatedStandards":[
                 {
                    "StandardsId":"standards/pci-dss/v/3.2.1"
                 }
              ]
           },
           "WorkflowState":"NEW",
           "Workflow":{
              "Status":"RESOLVED"
           },
           "RecordState":"ACTIVE",
           "FindingProviderFields":{
              "Severity":{
                 "Label":"INFORMATIONAL",
                 "Original":"INFORMATIONAL"
              },
              "Types":[
                 "Software and Configuration Checks/Industry and Regulatory Standards/PCI-DSS"
              ]
           },
           "ProcessedAt":"2023-11-01T14:12:05.950Z"
        }
     ]
  }
}
```

------

## 支援的 Security Hub CSPM 控制項
<a name="security-hub-controls-for-custom-control-data-sources"></a>

Audit Manager 目前支援下列 Security Hub CSPM 控制項。當您為自訂控制項設定資料來源時，您可以使用下列任何一個特定於標準的控制項 ID 關鍵字。


| 安全標準 | Audit Manager 支援的關鍵字 (Security Hub CSPM 中的標準控制 ID) | 相關控制項文件 (Security Hub CSPM 中的對應安全控制 ID) | 
| --- | --- | --- | 
| CIS v1.2.0 | 1.2 | [IAM.5](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-5) | 
| CIS v1.2.0 | 1.3 | [IAM.8](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-8) | 
| CIS v1.2.0 | 1.4 | [IAM.3](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-3) | 
| CIS v1.2.0 | 1.5 | [IAM.11](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-11) | 
| CIS v1.2.0 | 1.6  | [IAM.12](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-12) | 
| CIS v1.2.0 | 1.7  | [IAM.13](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-13) | 
| CIS v1.2.0 | 1.8  | [IAM.14](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-14) | 
| CIS v1.2.0 | 1.9  | [IAM.15](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-15) | 
| CIS v1.2.0 | 1.10 | [IAM.16](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-16) | 
| CIS v1.2.0 | 1.11 | [IAM.17](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-17) | 
| CIS v1.2.0 | 1.12 | [IAM.4](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-4) | 
| CIS v1.2.0 | 1.13 | [IAM.9](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-9) | 
| CIS v1.2.0 | 1.14  | [IAM.6](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-6) | 
| CIS v1.2.0 | 1.16 | [IAM.2](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-2) | 
| CIS v1.2.0 | 1.20 | [IAM.18](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-18) | 
| CIS v1.2.0 | 1.22  | [IAM.1](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-1) | 
| CIS v1.2.0 | 2.1  | [CloudTrail.1](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-1) | 
| CIS v1.2.0 | 2.2  | [CloudTrail.4](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-4) | 
| CIS v1.2.0 | 2.3 | [CloudTrail.6](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-6) | 
| CIS v1.2.0 | 2.4  | [CloudTrail.5](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-5) | 
| CIS v1.2.0 | 2.5  | [Config.1](https://docs.aws.amazon.com/securityhub/latest/userguide/config-controls.html#config-1) | 
| CIS v1.2.0 | 2.6  | [CloudTrail.7](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-7) | 
| CIS v1.2.0 | 2.7  | [CloudTrail.2](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-2) | 
| CIS v1.2.0 | 2.8 | [KMS.4](https://docs.aws.amazon.com/securityhub/latest/userguide/kms-controls.html#kms-4) | 
| CIS v1.2.0 | 2.9 | [EC2.6](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-6) | 
| CIS v1.2.0 | 3.1  | [CloudWatch.2](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-2) | 
| CIS v1.2.0 | 3.2  | [CloudWatch.3](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-3) | 
| CIS v1.2.0 | 3.3 | [CloudWatch.1](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-1) | 
| CIS v1.2.0 | 3.4 | [CloudWatch.4](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-4) | 
| CIS v1.2.0 | 3.5 | [CloudWatch.5](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-5) | 
| CIS v1.2.0 | 3.6 | [CloudWatch.6](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-6) | 
| CIS v1.2.0 | 3.7  | [CloudWatch.7](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-7) | 
| CIS v1.2.0 | 3.8 | [CloudWatch.8](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-8) | 
| CIS v1.2.0 | 3.9 | [CloudWatch.9](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-9) | 
| CIS v1.2.0 | 3.10 | [CloudWatch.10](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-10) | 
| CIS v1.2.0 | 3.11  | [CloudWatch.11](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-11) | 
| CIS v1.2.0 | 3.12 | [CloudWatch.12](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-12) | 
| CIS v1.2.0 | 3.13  | [CloudWatch.13](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-13) | 
| CIS v1.2.0 | 3.14  | [CloudWatch.14](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-14) | 
| CIS v1.2.0 | 4.1 | [EC2.13](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-13) | 
| CIS v1.2.0 | 4.2 | [EC2.14](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-14) | 
| CIS v1.2.0 | 4.3  | [EC2.2](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-2) | 
| PCI DSS | PCI.AutoScaling.1  | [AutoScaling.1](https://docs.aws.amazon.com/securityhub/latest/userguide/autoscaling-controls.html#autoscaling-1) | 
| PCI DSS | PCI.CloudTrail.1  | [CloudTrail.1](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-1) | 
| PCI DSS | PCI.CloudTrail.2  | [CloudTrail.2](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-2) | 
| PCI DSS | PCI.CloudTrail.3  | [CloudTrail.3](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-3) | 
| PCI DSS  | PCI.CloudTrail.4  | [CloudTrail.4](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-4) | 
| PCI DSS | PCI.CodeBuild.1  | [CodeBuild.1](https://docs.aws.amazon.com/securityhub/latest/userguide/codebuild-controls.html#codebuild-1) | 
| PCI DSS | PCI.CodeBuild.2  | [CodeBuild.2](https://docs.aws.amazon.com/securityhub/latest/userguide/codebuild-controls.html#codebuild-2) | 
| PCI DSS | PCI.Config.1  | [Config.1](https://docs.aws.amazon.com/securityhub/latest/userguide/config-controls.html#config-1) | 
| PCI DSS  | PCI.CW.1  | [CloudWatch.1](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-1) | 
| PCI DSS  | PCI.DMS.1 | [DMS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/dms-controls.html#dms-1) | 
| PCI DSS  | PCI.EC2.1 | [EC2.1](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-1) | 
| PCI DSS | PCI.EC2.2  | [EC2.2](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-2) | 
| PCI DSS  | PCI.EC2.3  | [EC2.3](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-3) | 
| PCI DSS | PCI.EC2.4  | [EC2.12](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-12) | 
| PCI DSS  | PCI.EC2.5  | [EC2.13](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-13) | 
| PCI DSS  | PCI.EC2.6  | [EC2.6](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-6) | 
| PCI DSS | PCI.ELBv2.1 | [ELB.1](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-1) | 
| PCI DSS  | PCI.ES.1  | [ ES.1](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-1) | 
| PCI DSS  | PCI.ES.2  | [ ES.2](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-2) | 
| PCI DSS  | PCI.GuardDuty.1  | [GuardDuty.1](https://docs.aws.amazon.com/securityhub/latest/userguide/guardduty-controls.html#guardduty-1) | 
| PCI DSS  | PCI.IAM.1  | [IAM.1](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-1) | 
| PCI DSS  | PCI.IAM.2  | [IAM.2](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-2) | 
| PCI DSS  | PCI.IAM.3  | [IAM.3](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-3) | 
| PCI DSS  | PCI.IAM.4  | [IAM.4](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-4) | 
| PCI DSS | PCI.IAM.5  | [IAM.9](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-9) | 
| PCI DSS  | PCI.IAM.6  | [IAM.6](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-6) | 
| PCI DSS  | PCI.IAM.7 | [PCI.IAM.7](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-7) | 
| PCI DSS  | PCI.IAM.8  | [PCI.IAM8.](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-8) | 
| PCI DSS  | PCI.KMS.1  | [PCI.KMS.4](https://docs.aws.amazon.com/securityhub/latest/userguide/kms-controls.html#kms-4) | 
| PCI DSS | PCI.Lambda.1 | [Lambda.1](https://docs.aws.amazon.com/securityhub/latest/userguide/lambda-controls.html#lambda-1) | 
| PCI DSS | PCI.Lambda.2  | [Lambda.3](https://docs.aws.amazon.com/securityhub/latest/userguide/lambda-controls.html#lambda-3) | 
| PCI DSS | PCI.Opensearch.1 | [Opensearch.1](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-1) | 
| PCI DSS  | PCI.Opensearch.2  | [Opensearch.2](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-2) | 
| PCI DSS | PCI.RDS.1 | [RDS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-1) | 
| PCI DSS  | PCI.RDS.2  | [RDS.2](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-2) | 
| PCI DSS  | PCI.Redshift.1  | [Redshift.1](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-1) | 
| PCI DSS | PCI.S3.1 | [S3.1](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-1) | 
| PCI DSS  | PCI.S3.2 | [S3.2](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-2) | 
| PCI DSS  | PCI.S3.3  | [S3.3](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-3) | 
| PCI DSS  | PCI.S3.4  | [S3.4](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-4) | 
| PCI DSS  | PCI.S3.5  | [S3.5](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-5) | 
| PCI DSS  | PCI.S3.6  | [S3.1](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-1) | 
| PCI DSS  | PCI.SageMaker.1  | [SageMaker.1](https://docs.aws.amazon.com/securityhub/latest/userguide/sagemaker-controls.html#sagemaker-1) | 
| PCI DSS  | PCI.SSM.1 | [SSM.1](https://docs.aws.amazon.com/securityhub/latest/userguide/ssm-controls.html#ssm-1) | 
| PCI DSS  | PCI.SSM.2  | [SSM.2](https://docs.aws.amazon.com/securityhub/latest/userguide/ssm-controls.html#ssm-2) | 
| PCI DSS | PCI.SSM.3 | [SSM.3](https://docs.aws.amazon.com/securityhub/latest/userguide/ssm-controls.html#ssm-3) | 
| AWS 基礎安全最佳實務  | Account.1 | [Account.1](https://docs.aws.amazon.com/securityhub/latest/userguide/account-controls.html#account-1) | 
| AWS 基礎安全最佳實務  | 帳戶。2 | [帳戶。2](https://docs.aws.amazon.com/securityhub/latest/userguide/account-controls.html#account-2) | 
| AWS 基礎安全最佳實務  | ACM.1 | [ACM.1](https://docs.aws.amazon.com/securityhub/latest/userguide/acm-controls.html#acm-1) | 
| AWS 基礎安全最佳實務  | ACM.2 | [ACM.2](https://docs.aws.amazon.com/securityhub/latest/userguide/acm-controls.html#acm-2) | 
| AWS 基礎安全最佳實務  | APIGateway.1 | [APIGateway.1](https://docs.aws.amazon.com/securityhub/latest/userguide/apigateway-controls.html#apigateway-1) | 
| AWS 基礎安全最佳實務  | APIGateway.2 | [APIGateway.2](https://docs.aws.amazon.com/securityhub/latest/userguide/apigateway-controls.html#apigateway-2) | 
| AWS 基礎安全最佳實務  | APIGateway.3 | [APIGateway.3](https://docs.aws.amazon.com/securityhub/latest/userguide/apigateway-controls.html#apigateway-3) | 
| AWS 基礎安全最佳實務  | APIGateway.4 | [APIGateway.4](https://docs.aws.amazon.com/securityhub/latest/userguide/apigateway-controls.html#apigateway-4) | 
| AWS 基礎安全最佳實務  | APIGateway.5 | [APIGateway.5](https://docs.aws.amazon.com/securityhub/latest/userguide/apigateway-controls.html#apigateway-5) | 
| AWS 基礎安全最佳實務  | APIGateway.8 | [APIGateway.8](https://docs.aws.amazon.com/securityhub/latest/userguide/apigateway-controls.html#apigateway-8) | 
| AWS 基礎安全最佳實務  | APIGateway.9 | [APIGateway.9](https://docs.aws.amazon.com/securityhub/latest/userguide/apigateway-controls.html#apigateway-9) | 
| AWS 基礎安全最佳實務  | AppSync.2 | [AppSync.2](https://docs.aws.amazon.com/securityhub/latest/userguide/appsync-controls.html#appsync-2) | 
| AWS 基礎安全最佳實務  | AppSync.5 | [AppSync.5](https://docs.aws.amazon.com/securityhub/latest/userguide/appsync-controls.html#appsync-5) | 
| AWS 基礎安全最佳實務  | Athena.1 | [Athena.1](https://docs.aws.amazon.com/securityhub/latest/userguide/athena-controls.html#athena-1) | 
| AWS 基礎安全最佳實務  | AutoScaling.1 | [AutoScaling.1](https://docs.aws.amazon.com/securityhub/latest/userguide/autoscaling-controls.html#autoscaling-1) | 
| AWS 基礎安全最佳實務  | AutoScaling.2 | [AutoScaling.2](https://docs.aws.amazon.com/securityhub/latest/userguide/autoscaling-controls.html#autoscaling-2) | 
| AWS 基礎安全最佳實務  | AutoScaling.3 | [AutoScaling.3](https://docs.aws.amazon.com/securityhub/latest/userguide/autoscaling-controls.html#autoscaling-3) | 
| AWS 基礎安全最佳實務  | AutoScaling.4 | [AutoScaling.4](https://docs.aws.amazon.com/securityhub/latest/userguide/autoscaling-controls.html#autoscaling-4) | 
| AWS 基礎安全最佳實務  | Autoscaling.5 | [Autoscaling.5](https://docs.aws.amazon.com/securityhub/latest/userguide/autoscaling-controls.html#autoscaling-5) | 
| AWS 基礎安全最佳實務  | AutoScaling.6 | [AutoScaling.6](https://docs.aws.amazon.com/securityhub/latest/userguide/autoscaling-controls.html#autoscaling-6) | 
| AWS 基礎安全最佳實務  | AutoScaling.9 | [AutoScaling.9](https://docs.aws.amazon.com/securityhub/latest/userguide/autoscaling-controls.html#autoscaling-9) | 
| AWS 基礎安全最佳實務  | 備份。1 | [備份。1](https://docs.aws.amazon.com/securityhub/latest/userguide/backup-controls.html#backup-1) | 
| AWS 基礎安全最佳實務  | CloudFormation.1 | [CloudFormation.1](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudformation-controls.html#cloudformation-1) | 
| AWS 基礎安全最佳實務  | CloudFront.1 | [CloudFront.1](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-1) | 
| AWS 基礎安全最佳實務  | CloudFront.2 | [CloudFront.2](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-2) | 
| AWS 基礎安全最佳實務  | CloudFront.3 | [CloudFront.3](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-3) | 
| AWS 基礎安全最佳實務  | CloudFront.4 | [CloudFront.4](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-4) | 
| AWS 基礎安全最佳實務  | CloudFront.5 | [CloudFront.5](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-5) | 
| AWS 基礎安全最佳實務  | CloudFront.6 | [CloudFront.6](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-6) | 
| AWS 基礎安全最佳實務  | CloudFront.7 | [CloudFront.7](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-7) | 
| AWS 基礎安全最佳實務  | CloudFront.8 | [CloudFront.8](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-8) | 
| AWS 基礎安全最佳實務  | CloudFront.9 | [CloudFront.9](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-9) | 
| AWS 基礎安全最佳實務  | CloudFront.10 | [CloudFront.10](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-10) | 
| AWS 基礎安全最佳實務  | CloudFront.12 | [CloudFront.12](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-12) | 
| AWS 基礎安全最佳實務  | CloudFront.13 | [CloudFront.13](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-13) | 
| AWS 基礎安全最佳實務  | CloudTrail.1 | [CloudTrail.1](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-1) | 
| AWS 基礎安全最佳實務  | CloudTrail.2 | [CloudTrail.2](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-2) | 
| AWS 基礎安全最佳實務  | CloudTrail.3 | [CloudTrail.3](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-3) | 
| AWS 基礎安全最佳實務  | CloudTrail.4 | [CloudTrail.4](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-4) | 
| AWS 基礎安全最佳實務  | CloudTrail.5 | [CloudTrail.5](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-5) | 
| AWS 基礎安全最佳實務  | CloudTrail.6 | [CloudTrail.6](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-6) | 
| AWS 基礎安全最佳實務  | CloudTrail.7 | [CloudTrail.7](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudtrail-controls.html#cloudtrail-7) | 
| AWS 基礎安全最佳實務  | CloudWatch.1 | [CloudWatch.1](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-1) | 
| AWS 基礎安全最佳實務  | CloudWatch.2 | [CloudWatch.2](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-2) | 
| AWS 基礎安全最佳實務  | CloudWatch.3 | [CloudWatch.3](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-3) | 
| AWS 基礎安全最佳實務  | CloudWatch.4 | [CloudWatch.4](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-4) | 
| AWS 基礎安全最佳實務  | CloudWatch.5 | [CloudWatch.5](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-5) | 
| AWS 基礎安全最佳實務  | CloudWatch.6 | [CloudWatch.6](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-6) | 
| AWS 基礎安全最佳實務  | CloudWatch.7 | [CloudWatch.7](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-7) | 
| AWS 基礎安全最佳實務  | CloudWatch.8 | [CloudWatch.8](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-8) | 
| AWS 基礎安全最佳實務  | CloudWatch.9 | [CloudWatch.9](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-9) | 
| AWS 基礎安全最佳實務  | CloudWatch.10 | [CloudWatch.10](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-10) | 
| AWS 基礎安全最佳實務  | CloudWatch.11 | [CloudWatch.11](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-11) | 
| AWS 基礎安全最佳實務  | CloudWatch.12 | [CloudWatch.12](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-12) | 
| AWS 基礎安全最佳實務  | CloudWatch.13 | [CloudWatch.13](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-13) | 
| AWS 基礎安全最佳實務  | CloudWatch.14 | [CloudWatch.14](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-14) | 
| AWS 基礎安全最佳實務  | CloudWatch.15 | [CloudWatch.15](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-15) | 
| AWS 基礎安全最佳實務  | CloudWatch.16 | [CloudWatch.16](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-16) | 
| AWS 基礎安全最佳實務  | CloudWatch.17 | [CloudWatch.17](https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-17) | 
| AWS 基礎安全最佳實務  | CodeBuild.1 | [CodeBuild.1](https://docs.aws.amazon.com/securityhub/latest/userguide/codebuild-controls.html#codebuild-1) | 
| AWS 基礎安全最佳實務  | CodeBuild.2 | [CodeBuild.2](https://docs.aws.amazon.com/securityhub/latest/userguide/codebuild-controls.html#codebuild-2) | 
| AWS 基礎安全最佳實務  | CodeBuild.3 | [CodeBuild.3](https://docs.aws.amazon.com/securityhub/latest/userguide/codebuild-controls.html#codebuild-3) | 
| AWS 基礎安全最佳實務  | CodeBuild.4 | [CodeBuild.4](https://docs.aws.amazon.com/securityhub/latest/userguide/codebuild-controls.html#codebuild-4) | 
| AWS 基礎安全最佳實務  | CodeBuild.5 | [CodeBuild.5](https://docs.aws.amazon.com/securityhub/latest/userguide/codebuild-controls.html#codebuild-5) | 
| AWS 基礎安全最佳實務  | Config.1 | [Config.1](https://docs.aws.amazon.com/securityhub/latest/userguide/config-controls.html#config-1) | 
| AWS 基礎安全最佳實務  | DMS.1 | [DMS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/dms-controls.html#dms-1) | 
| AWS 基礎安全最佳實務  | DMS.6 | [DMS.6](https://docs.aws.amazon.com/securityhub/latest/userguide/dms-controls.html#dms-6) | 
| AWS 基礎安全最佳實務  | DMS.7 | [DMS.7](https://docs.aws.amazon.com/securityhub/latest/userguide/dms-controls.html#dms-7) | 
| AWS 基礎安全最佳實務  | DMS.8 | [DMS.8](https://docs.aws.amazon.com/securityhub/latest/userguide/dms-controls.html#dms-8) | 
| AWS 基礎安全最佳實務  | DMS.9 | [DMS.9](https://docs.aws.amazon.com/securityhub/latest/userguide/dms-controls.html#dms-9) | 
| AWS 基礎安全最佳實務 | DocumentDB.1 | [DocumentDB.1](https://docs.aws.amazon.com/securityhub/latest/userguide/documentdb-controls.html#documentdb-1) | 
| AWS 基礎安全最佳實務 | DocumentDB.2 | [DocumentDB.2](https://docs.aws.amazon.com/securityhub/latest/userguide/documentdb-controls.html#documentdb-2) | 
| AWS 基礎安全最佳實務 | DocumentDB.3 | [DocumentDB.3](https://docs.aws.amazon.com/securityhub/latest/userguide/documentdb-controls.html#documentdb-3) | 
| AWS 基礎安全最佳實務 | DocumentDB.4 | [DocumentDB.4](https://docs.aws.amazon.com/securityhub/latest/userguide/documentdb-controls.html#documentdb-4) | 
| AWS 基礎安全最佳實務 | DocumentDB.5 | [DocumentDB.5](https://docs.aws.amazon.com/securityhub/latest/userguide/documentdb-controls.html#documentdb-5) | 
| AWS 基礎安全最佳實務  | DynamoDB.1 | [DynamoDB.1](https://docs.aws.amazon.com/securityhub/latest/userguide/dynamodb-controls.html#dynamodb-1) | 
| AWS 基礎安全最佳實務  | DynamoDB.2 | [DynamoDB.2](https://docs.aws.amazon.com/securityhub/latest/userguide/dynamodb-controls.html#dynamodb-2) | 
| AWS 基礎安全最佳實務  | DynamoDB.3 | [DynamoDB.3](https://docs.aws.amazon.com/securityhub/latest/userguide/dynamodb-controls.html#dynamodb-3) | 
| AWS 基礎安全最佳實務 | DynamoDB.4 | [DynamoDB.4](https://docs.aws.amazon.com/securityhub/latest/userguide/dynamodb-controls.html#dynamodb-4) | 
| AWS 基礎安全最佳實務 | DynamoDB.6 | [DynamoDB.6](https://docs.aws.amazon.com/securityhub/latest/userguide/dynamodb-controls.html#dynamodb-6) | 
| AWS 基礎安全最佳實務  | EC2.1 | [EC2.1](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-1) | 
| AWS 基礎安全最佳實務  | EC2.2 | [EC2.2](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-2) | 
| AWS 基礎安全最佳實務  | EC2.3 | [EC2.3](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-3) | 
| AWS 基礎安全最佳實務  | EC2.4 | [EC2.4](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-4) | 
| AWS 基礎安全最佳實務  | EC2.6 | [EC2.6](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-6) | 
| AWS 基礎安全最佳實務  | EC2.7 | [EC2.7](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-7) | 
| AWS 基礎安全最佳實務  | EC2.8 | [EC2.8](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-8) | 
| AWS 基礎安全最佳實務  | EC2.9 | [EC2.9](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-9) | 
| AWS 基礎安全最佳實務  | EC2.10 | [EC2.10](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-10) | 
| AWS 基礎安全最佳實務 | EC2.12 | [EC2.12](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-12) | 
| AWS 基礎安全最佳實務 | EC2.13 | [EC2.13](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-13) | 
| AWS 基礎安全最佳實務 | EC2.14 | [EC2.14](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-14) | 
| AWS 基礎安全最佳實務  | EC2.15 | [EC2.15](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-15) | 
| AWS 基礎安全最佳實務  | EC2.16 | [EC2.16](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-16) | 
| AWS 基礎安全最佳實務  | EC2.17 | [EC2.17](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-17) | 
| AWS 基礎安全最佳實務  | EC2.18 | [EC2.18](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-18) | 
| AWS 基礎安全最佳實務  | EC2.19 | [EC2.19](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-19) | 
| AWS 基礎安全最佳實務  | EC2.20 | [EC2.20](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-20) | 
| AWS 基礎安全最佳實務  | EC2.21 | [EC2.21](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-21) | 
| AWS 基礎安全最佳實務  | EC2.22 | [EC2.22](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-22) | 
| AWS 基礎安全最佳實務  | EC2.23 | [EC2.23](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-23) | 
| AWS 基礎安全最佳實務  | EC2.24 | [EC2.24](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-24) | 
| AWS 基礎安全最佳實務  | EC2.25 | [EC2.25](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-25) | 
| AWS 基礎安全最佳實務 | EC2.28 | [EC2.28](https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-28) | 
| AWS 基礎安全最佳實務 | EC2.51 | [EC2.51](https://portal.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-51) | 
| AWS 基礎安全最佳實務  | ECR.1 | [ECR.1](https://docs.aws.amazon.com/securityhub/latest/userguide/ecr-controls.html#ecr-1) | 
| AWS 基礎安全最佳實務  | ECR.2 | [ECR.2](https://docs.aws.amazon.com/securityhub/latest/userguide/ecr-controls.html#ecr-2) | 
| AWS 基礎安全最佳實務  | ECR.3 | [ECR.3](https://docs.aws.amazon.com/securityhub/latest/userguide/ecr-controls.html#ecr-3) | 
| AWS 基礎安全最佳實務  | ECS.1 | [ECS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/ecs-controls.html#ecs-1) | 
| AWS 基礎安全最佳實務  | ECS.2 | [ECS.2](https://docs.aws.amazon.com/securityhub/latest/userguide/ecs-controls.html#ecs-2) | 
| AWS 基礎安全最佳實務  | ECS.3 | [ECS.3](https://docs.aws.amazon.com/securityhub/latest/userguide/ecs-controls.html#ecs-3) | 
| AWS 基礎安全最佳實務  | ECS.4 | [ECS.4](https://docs.aws.amazon.com/securityhub/latest/userguide/ecs-controls.html#ecs-4) | 
| AWS 基礎安全最佳實務  | ECS.5 | [ECS.5](https://docs.aws.amazon.com/securityhub/latest/userguide/ecs-controls.html#ecs-5) | 
| AWS 基礎安全最佳實務  | ECS.8 | [ECS.8](https://docs.aws.amazon.com/securityhub/latest/userguide/ecs-controls.html#ecs-8) | 
| AWS 基礎安全最佳實務  | ECS.9 | [ECS.9](https://docs.aws.amazon.com/securityhub/latest/userguide/ecs-controls.html#ecs-9) | 
| AWS 基礎安全最佳實務  | ECS.10 | [ECS.10](https://docs.aws.amazon.com/securityhub/latest/userguide/ecs-controls.html#ecs-10) | 
| AWS 基礎安全最佳實務  | ECS.12 | [ECS.12](https://docs.aws.amazon.com/securityhub/latest/userguide/ecs-controls.html#ecs-12) | 
| AWS 基礎安全最佳實務  | EFS.1 | [EFS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/efs-controls.html#efs-1) | 
| AWS 基礎安全最佳實務  | EFS.2 | [EFS.2](https://docs.aws.amazon.com/securityhub/latest/userguide/efs-controls.html#efs-2) | 
| AWS 基礎安全最佳實務  | EFS.3 | [EFS.3](https://docs.aws.amazon.com/securityhub/latest/userguide/efs-controls.html#efs-3) | 
| AWS 基礎安全最佳實務  | EFS.4 | [EFS.4](https://docs.aws.amazon.com/securityhub/latest/userguide/efs-controls.html#efs-4) | 
| AWS 基礎安全最佳實務  | EKS.1 | [EKS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/eks-controls.html#eks-1) | 
| AWS 基礎安全最佳實務  | EKS.2 | [EKS.2](https://docs.aws.amazon.com/securityhub/latest/userguide/eks-controls.html#eks-2) | 
| AWS 基礎安全最佳實務  | EKS.8 | [EKS.8](https://docs.aws.amazon.com/securityhub/latest/userguide/eks-controls.html#eks-8) | 
| AWS 基礎安全最佳實務  | ElastiCache.1 | [ElastiCache.1](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticache-controls.html#elasticache-1) | 
| AWS 基礎安全最佳實務  | ElastiCache.2 | [ElastiCache.2](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticache-controls.html#elasticache-2) | 
| AWS 基礎安全最佳實務  | ElastiCache.3 | [ElastiCache.3](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticache-controls.html#elasticache-3) | 
| AWS 基礎安全最佳實務  | ElastiCache.4 | [ElastiCache.4](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticache-controls.html#elasticache-4) | 
| AWS 基礎安全最佳實務  | ElastiCache.5 | [ElastiCache.5](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticache-controls.html#elasticache-5) | 
| AWS 基礎安全最佳實務  | ElastiCache.6 | [ElastiCache.6](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticache-controls.html#elasticache-6) | 
| AWS 基礎安全最佳實務  | ElastiCache.7 | [ElastiCache.7](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticache-controls.html#elasticache-7) | 
| AWS 基礎安全最佳實務  | ElasticBeanstalk.1 | [ElasticBeanstalk.1](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticbeanstalk-controls.html#elasticbeanstalk-1) | 
| AWS 基礎安全最佳實務  | ElasticBeanstalk.2 | [ElasticBeanstalk.2](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticbeanstalk-controls.html#elasticbeanstalk-2) | 
| AWS 基礎安全最佳實務  | ElasticBeanstalk.3 | [ElasticBeanstalk.3](https://docs.aws.amazon.com/securityhub/latest/userguide/elasticbeanstalk-controls.html#elasticbeanstalk-3) | 
| AWS 基礎安全最佳實務  | ELB.1 | [ELB.1](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-1) | 
| AWS 基礎安全最佳實務  | ELB.2 | [ELB.2](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-2) | 
| AWS 基礎安全最佳實務  | ELB.3 | [ELB.3](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-3) | 
| AWS 基礎安全最佳實務  | ELB.4 | [ELB.4](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-4) | 
| AWS 基礎安全最佳實務  | ELB.5 | [ELB.5](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-5) | 
| AWS 基礎安全最佳實務  | ELB.6 | [ELB.6](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-6) | 
| AWS 基礎安全最佳實務  | ELB.7 | [ELB.7](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-7) | 
| AWS 基礎安全最佳實務  | ELB.8 | [ELB.8](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-8) | 
| AWS 基礎安全最佳實務  | ELB.9 | [ELB.9](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-9) | 
| AWS 基礎安全最佳實務  | ELB.10 | [ELB.10](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-10) | 
| AWS 基礎安全最佳實務  | ELB.12 | [ELB.12](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-12) | 
| AWS 基礎安全最佳實務  | ELB.13 | [ELB.13](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-13) | 
| AWS 基礎安全最佳實務  | ELB.14 | [ELB.14](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-14) | 
| AWS 基礎安全最佳實務  | ELB.16 | [ELB.16](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-16) | 
| AWS 基礎安全最佳實務  | ELBv2.1 | [ELB.1](https://docs.aws.amazon.com/securityhub/latest/userguide/elb-controls.html#elb-1) | 
| AWS 基礎安全最佳實務  | EMR.1 | [EMR.1](https://docs.aws.amazon.com/securityhub/latest/userguide/emr-controls.html#emr-1) | 
| AWS 基礎安全最佳實務  | EMR.2 | [EMR.2](https://docs.aws.amazon.com/securityhub/latest/userguide/emr-controls.html#emr-2) | 
| AWS 基礎安全最佳實務  | ES.1 | [ES.1](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-1) | 
| AWS 基礎安全最佳實務  | ES.2 | [ES.2](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-2) | 
| AWS 基礎安全最佳實務  | ES.3 | [ES.3](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-3) | 
| AWS 基礎安全最佳實務  | ES.4 | [ES.4](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-4) | 
| AWS 基礎安全最佳實務  | ES.5 | [ES.5](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-5) | 
| AWS 基礎安全最佳實務  | ES.6 | [ES.6](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-6) | 
| AWS 基礎安全最佳實務  | ES.7 | [ES.7](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-7) | 
| AWS 基礎安全最佳實務  | ES.8 | [ES.8](https://docs.aws.amazon.com/securityhub/latest/userguide/es-controls.html#es-8) | 
| AWS 基礎安全最佳實務  | EventBridge.3 | [EventBridge3。](https://docs.aws.amazon.com/securityhub/latest/userguide/eventbridge-controls.html#eventbridge-3) | 
| AWS 基礎安全最佳實務  | EventBridge.4 | [EventBridge.4](https://docs.aws.amazon.com/securityhub/latest/userguide/eventbridge-controls.html#eventbridge-4) | 
| AWS 基礎安全最佳實務  | FSx.1 | [FSx.1](https://docs.aws.amazon.com/securityhub/latest/userguide/fsx-controls.html#fsx-1) | 
| AWS 基礎安全最佳實務  | GuardDuty.1 | [GuardDuty.1](https://docs.aws.amazon.com/securityhub/latest/userguide/guardduty-controls.html#guardduty-1) | 
| AWS 基礎安全最佳實務  | IAM.1 | [IAM.1](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-1) | 
| AWS 基礎安全最佳實務  | IAM.2 | [IAM.2](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-2) | 
| AWS 基礎安全最佳實務  | IAM.3 | [IAM.3](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-3) | 
| AWS 基礎安全最佳實務  | IAM.4 | [IAM.4](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-4) | 
| AWS 基礎安全最佳實務  | IAM.5 | [IAM.5](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-5) | 
| AWS 基礎安全最佳實務  | IAM.6 | [IAM.6](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-6) | 
| AWS 基礎安全最佳實務  | IAM.7 | [IAM.7](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-7) | 
| AWS 基礎安全最佳實務  | IAM.8 | [IAM .8](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-8) | 
| AWS 基礎安全最佳實務  | IAM.9 | [IAM.9](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-9) | 
| AWS 基礎安全最佳實務  | IAM.10 | [IAM.10](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-10) | 
| AWS 基礎安全最佳實務  | IAM.11 | [IAM.11](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-11) | 
| AWS 基礎安全最佳實務  | IAM.12 | [IAM.12](https://forums.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-12) | 
| AWS 基礎安全最佳實務  | IAM.13 | [IAM.13](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-13) | 
| AWS 基礎安全最佳實務  | IAM.14 | [IAM.14](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-14) | 
| AWS 基礎安全最佳實務 | IAM.15 | [IAM.15](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-15) | 
| AWS 基礎安全最佳實務  | IAM.16 | [IAM.16](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-16) | 
| AWS 基礎安全最佳實務  | IAM.17 | [IAM.17](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-17) | 
| AWS 基礎安全最佳實務  | IAM.18 | [IAM.18](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-18) | 
| AWS 基礎安全最佳實務  | IAM.19 | [IAM.19](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-19) | 
| AWS 基礎安全最佳實務  | IAM.21 | [IAM.21](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-21) | 
| AWS 基礎安全最佳實務  | IAM.22 | [IAM.22](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-22) | 
| AWS 基礎安全最佳實務  | Kinesis.1 | [Kinesis.1](https://docs.aws.amazon.com/securityhub/latest/userguide/kinesis-controls.html#kinesis-1) | 
| AWS 基礎安全最佳實務  | KMS.1 | [KMS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/kms-controls.html#kms-1) | 
| AWS 基礎安全最佳實務  | KMS.2 | [KMS.2](https://docs.aws.amazon.com/securityhub/latest/userguide/kms-controls.html#kms-2) | 
| AWS 基礎安全最佳實務  | KMS.3 | [KMS.3](https://docs.aws.amazon.com/securityhub/latest/userguide/kms-controls.html#kms-3) | 
| AWS 基礎安全最佳實務  | KMS.4 | [KMS.4](https://docs.aws.amazon.com/securityhub/latest/userguide/kms-controls.html#kms-4) | 
| AWS 基礎安全最佳實務  | Lambda.1 | [Lambda.1](https://docs.aws.amazon.com/securityhub/latest/userguide/lambda-controls.html#lambda-1) | 
| AWS 基礎安全最佳實務  | Lambda.2 | [Lambda.2](https://docs.aws.amazon.com/securityhub/latest/userguide/lambda-controls.html#lambda-2) | 
| AWS 基礎安全最佳實務  | Lambda.3 | [Lambda.3](https://docs.aws.amazon.com/securityhub/latest/userguide/lambda-controls.html#lambda-3) | 
| AWS 基礎安全最佳實務  | Lambda.5 | [Lambda.5](https://docs.aws.amazon.com/securityhub/latest/userguide/lambda-controls.html#lambda-5) | 
| AWS 基礎安全最佳實務  | Macie.1 | [Macie.1](https://docs.aws.amazon.com/securityhub/latest/userguide/macie-controls.html#macie-1) | 
| AWS 基礎安全最佳實務  | MQ.5 | [MQ.5](https://docs.aws.amazon.com/securityhub/latest/userguide/mq-controls.html#mq-5) | 
| AWS 基礎安全最佳實務  | MQ.6 | [MQ.6](https://docs.aws.amazon.com/securityhub/latest/userguide/mq-controls.html#mq-6) | 
| AWS 基礎安全最佳實務  | MSK.1 | [MSK.1](https://docs.aws.amazon.com/securityhub/latest/userguide/msk-controls.html#msk-1) | 
| AWS 基礎安全最佳實務  | MSK.2 | [MSK.2](https://docs.aws.amazon.com/securityhub/latest/userguide/msk-controls.html#msk-2) | 
| AWS 基礎安全最佳實務  | Neptune.1 | [Neptune.1](https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-1) | 
| AWS 基礎安全最佳實務  | Neptune.2 | [Neptune.2](https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-2) | 
| AWS 基礎安全最佳實務  | Neptune.3 | [Neptune.3](https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-3) | 
| AWS 基礎安全最佳實務  | Neptune.4 | [Neptune.4](https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-4) | 
| AWS 基礎安全最佳實務 | Neptune.5 | [Neptune.5](https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-5) | 
| AWS 基礎安全最佳實務  | Neptune.6 | [Neptune.6](https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-6) | 
| AWS 基礎安全最佳實務  | Neptune.7 | [Neptune.7](https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-7) | 
| AWS 基礎安全最佳實務  | Neptune.8 | [Neptune.8](https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-8) | 
| AWS 基礎安全最佳實務  | Neptune.9 | [Neptune.9](https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-9) | 
| AWS 基礎安全最佳實務  | NetworkFirewall.1 | [NetworkFirewall.1](https://docs.aws.amazon.com/securityhub/latest/userguide/networkfirewall-controls.html#networkfirewall-1) | 
| AWS 基礎安全最佳實務  | NetworkFirewall.2 | [NetworkFirewall.2](https://docs.aws.amazon.com/securityhub/latest/userguide/networkfirewall-controls.html#networkfirewall-2) | 
| AWS 基礎安全最佳實務  | NetworkFirewall.3 | [NetworkFirewall.3](https://docs.aws.amazon.com/securityhub/latest/userguide/networkfirewall-controls.html#networkfirewall-3) | 
| AWS 基礎安全最佳實務  | NetworkFirewall.4 | [NetworkFirewall.4](https://docs.aws.amazon.com/securityhub/latest/userguide/networkfirewall-controls.html#networkfirewall-4) | 
| AWS 基礎安全最佳實務  | NetworkFirewall.5 | [NetworkFirewall.5](https://docs.aws.amazon.com/securityhub/latest/userguide/networkfirewall-controls.html#networkfirewall-5) | 
| AWS 基礎安全最佳實務  | NetworkFirewall.6 | [NetworkFirewall.6](https://docs.aws.amazon.com/securityhub/latest/userguide/networkfirewall-controls.html#networkfirewall-6) | 
| AWS 基礎安全最佳實務  | NetworkFirewall.9 | [NetworkFirewall.9](https://docs.aws.amazon.com/securityhub/latest/userguide/networkfirewall-controls.html#networkfirewall-9) | 
| AWS 基礎安全最佳實務  | Opensearch.1 | [Opensearch.1](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-1) | 
| AWS 基礎安全最佳實務  | Opensearch.2 | [Opensearch.2](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-2) | 
| AWS 基礎安全最佳實務  | Opensearch.3 | [Opensearch.3](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-3) | 
| AWS 基礎安全最佳實務  | Opensearch.4 | [Opensearch.4](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-4) | 
| AWS 基礎安全最佳實務  | Opensearch.5 | [Opensearch.5](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-5) | 
| AWS 基礎安全最佳實務  | Opensearch.6 | [Opensearch.6](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-6) | 
| AWS 基礎安全最佳實務  | Opensearch.7 | [Opensearch.7](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-7) | 
| AWS 基礎安全最佳實務  | Opensearch.8 | [Opensearch.8](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-8) | 
| AWS 基礎安全最佳實務  | Opensearch.10 | [Opensearch.10](https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-10) | 
| AWS 基礎安全最佳實務 | PCA.1 | [PCA.1](https://docs.aws.amazon.com/securityhub/latest/userguide/pca-controls.html#pca-1) | 
| AWS 基礎安全最佳實務  | RDS.1 | [RDS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-1) | 
| AWS 基礎安全最佳實務  | RDS.2 | [RDS.2](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-2) | 
| AWS 基礎安全最佳實務  | RDS.3 | [RDS.3](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-3) | 
| AWS 基礎安全最佳實務  | RDS.4 | [RDS.4](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-4) | 
| AWS 基礎安全最佳實務  | RDS.5 | [RDS.5](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-5) | 
| AWS 基礎安全最佳實務  | RDS.6 | [RDS.6](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-6) | 
| AWS 基礎安全最佳實務  | RDS.7 | [RDS.7](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-7) | 
| AWS 基礎安全最佳實務  | RDS.8 | [RDS.8](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-8) | 
| AWS 基礎安全最佳實務  | RDS.9 | [RDS.9](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-9) | 
| AWS 基礎安全最佳實務  | RDS.10 | [RDS.10](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-10) | 
| AWS 基礎安全最佳實務  | RDS.11 | [RDS.11](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-11) | 
| AWS 基礎安全最佳實務  | RDS.12 | [RDS.12](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-12) | 
| AWS 基礎安全最佳實務  | RDS.13 | [RDS.13](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-13) | 
| AWS 基礎安全最佳實務  | RDS.14 | [RDS.14](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-14) | 
| AWS 基礎安全最佳實務  | RDS.15 | [RDS.15](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-15) | 
| AWS 基礎安全最佳實務  | RDS.16 | [RDS.16](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-16) | 
| AWS 基礎安全最佳實務  | RDS.17 | [RDS.17](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-17) | 
| AWS 基礎安全最佳實務  | RDS.18 | [RDS.18](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-18) | 
| AWS 基礎安全最佳實務  | RDS.19 | [RDS.19](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-19) | 
| AWS 基礎安全最佳實務  | RDS.20 | [RDS.20](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-20) | 
| AWS 基礎安全最佳實務  | RDS.21 | [RDS.21](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-21) | 
| AWS 基礎安全最佳實務  | RDS.22 | [RDS.22](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-22) | 
| AWS 基礎安全最佳實務  | RDS.23 | [RDS.23](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-23) | 
| AWS 基礎安全最佳實務  | RDS.24 | [RDS.24](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-24) | 
| AWS 基礎安全最佳實務  | RDS.25 | [RDS.25](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-25) | 
| AWS 基礎安全最佳實務  | RDS.26 | [RDS.26](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-27) | 
| AWS 基礎安全最佳實務  | RDS.27 | [RDS.27](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-26) | 
| AWS 基礎安全最佳實務  | RDS.34 | [RDS.34](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-34) | 
| AWS 基礎安全最佳實務  | RDS.35 | [RDS.35](https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html#rds-35) | 
| AWS 基礎安全最佳實務  | Redshift.1 | [Redshift.1](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-1) | 
| AWS 基礎安全最佳實務  | Redshift.2 | [Redshift.2](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-2) | 
| AWS 基礎安全最佳實務  | Redshift.3 | [Redshift.3](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-3) | 
| AWS 基礎安全最佳實務  | Redshift.4 | [Redshift.4](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-4) | 
| AWS 基礎安全最佳實務  | Redshift.6 | [Redshift.6](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-6) | 
| AWS 基礎安全最佳實務  | Redshift.7 | [Redshift.7](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-7) | 
| AWS 基礎安全最佳實務  | Redshift.8 | [Redshift.8](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-8) | 
| AWS 基礎安全最佳實務  | Redshift.9 | [Redshift.9](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-9) | 
| AWS 基礎安全最佳實務  | Redshift.10 | [Redshift.10](https://docs.aws.amazon.com/securityhub/latest/userguide/redshift-controls.html#redshift-10) | 
| AWS 基礎安全最佳實務  | Route53.2 | [Route53.2](https://docs.aws.amazon.com/securityhub/latest/userguide/route53-controls.html#route53-2) | 
| AWS 基礎安全最佳實務  | S3.1 | [S3.1](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-1) | 
| AWS 基礎安全最佳實務  | S3.2 | [S3.2](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-2) | 
| AWS 基礎安全最佳實務  | S3.3 | [S3.3](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-3) | 
| AWS 基礎安全最佳實務  | S3.4 | [S3.4](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-4) | 
| AWS 基礎安全最佳實務  | S3.5 | [S3.5](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-5) | 
| AWS 基礎安全最佳實務  | S3.6 | [S3.6](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-6) | 
| AWS 基礎安全最佳實務  | S3.7 | [S3.7](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-7) | 
| AWS 基礎安全最佳實務  | S3.8 | [S3.8](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-8) | 
| AWS 基礎安全最佳實務  | S3.9 | [S3.9](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-9) | 
| AWS 基礎安全最佳實務  | S3.11 | [S3.11](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-11) | 
| AWS 基礎安全最佳實務  | S3.12 | [S3.12](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-12) | 
| AWS 基礎安全最佳實務  | S3.13 | [S3.13](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-13) | 
| AWS 基礎安全最佳實務  | S3.14 | [S3.14](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-14) | 
| AWS 基礎安全最佳實務  | S3.15 | [S3.15](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-15) | 
| AWS 基礎安全最佳實務  | S3.17 | [S3.17](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-17) | 
| AWS 基礎安全最佳實務  | S3.19 | [S3.19](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-19) | 
| AWS 基礎安全最佳實務  | S3.19 | [S3.20](https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-20) | 
| AWS 基礎安全最佳實務  | SageMaker.1 | [SageMaker.1](https://docs.aws.amazon.com/securityhub/latest/userguide/sagemaker-controls.html#sagemaker-1) | 
| AWS 基礎安全最佳實務  | SageMaker.2 | [SageMaker.2](https://docs.aws.amazon.com/securityhub/latest/userguide/sagemaker-controls.html#sagemaker-2) | 
| AWS 基礎安全最佳實務  | SageMaker.3 | [SageMaker.3](https://docs.aws.amazon.com/securityhub/latest/userguide/sagemaker-controls.html#sagemaker-3) | 
| AWS 基礎安全最佳實務  | SecretsManager.1 | [SecretsManager.1](https://docs.aws.amazon.com/securityhub/latest/userguide/secretsmanager-controls.html#secretsmanager-1) | 
| AWS 基礎安全最佳實務  | SecretsManager.2 | [SecretsManager.2](https://docs.aws.amazon.com/securityhub/latest/userguide/secretsmanager-controls.html#secretsmanager-2) | 
| AWS 基礎安全最佳實務  | SecretsManager.3 | [SecretsManager.3](https://docs.aws.amazon.com/securityhub/latest/userguide/secretsmanager-controls.html#secretsmanager-3) | 
| AWS 基礎安全最佳實務  | SecretsManager.4 | [SecretsManager.4](https://docs.aws.amazon.com/securityhub/latest/userguide/secretsmanager-controls.html#secretsmanager-4) | 
| AWS 基礎安全最佳實務  | SNS.1 | [SNS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/sns-controls.html#sns-1) | 
| AWS 基礎安全最佳實務  | SNS.2 | [SNS.2](https://docs.aws.amazon.com/securityhub/latest/userguide/sns-controls.html#sns-2) | 
| AWS 基礎安全最佳實務  | SQS.1 | [SQS.1](https://docs.aws.amazon.com/securityhub/latest/userguide/sqs-controls.html#sqs-1) | 
| AWS 基礎安全最佳實務  | SSM.1 | [SSM.1](https://docs.aws.amazon.com/securityhub/latest/userguide/ssm-controls.html#ssm-1) | 
| AWS 基礎安全最佳實務  | SSM.2 | [SSM.2](https://docs.aws.amazon.com/securityhub/latest/userguide/ssm-controls.html#ssm-2) | 
| AWS 基礎安全最佳實務  | SSM.3 | [SSM.3](https://docs.aws.amazon.com/securityhub/latest/userguide/ssm-controls.html#ssm-3) | 
| AWS 基礎安全最佳實務  | SSM.4 | [SSM.4](https://docs.aws.amazon.com/securityhub/latest/userguide/ssm-controls.html#ssm-4) | 
| AWS 基礎安全最佳實務  | StepFunctions.1 | [StepFunctions.1](https://docs.aws.amazon.com/securityhub/latest/userguide/stepfunctions-controls.html#stepfunctions-1) | 
| AWS 基礎安全最佳實務  | WAF.1 | [WAF.1](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-1) | 
| AWS 基礎安全最佳實務  | WAF.2 | [WAF.2](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-2) | 
| AWS 基礎安全最佳實務  | WAF.3 | [WAF.3](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-3) | 
| AWS 基礎安全最佳實務  | WAF.4 | [WAF.4](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-4) | 
| AWS 基礎安全最佳實務  | WAF.6 | [WAF.6](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-6) | 
| AWS 基礎安全最佳實務  | WAF.7 | [WAF.7](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-7) | 
| AWS 基礎安全最佳實務  | WAF.8 | [WAF.8](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-8) | 
| AWS 基礎安全最佳實務  | WAF.10 | [WAF.10](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-10) | 
| AWS 基礎安全最佳實務  | WAF.11 | [WAF.11](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-11) | 
| AWS 基礎安全最佳實務  | WAF.12 | [WAF.12](https://docs.aws.amazon.com/securityhub/latest/userguide/waf-controls.html#waf-12) | 

## 其他資源
<a name="using-security-hub-controls-additional-resources"></a>
+ 若要尋找有關此資料來源類型的證據收集問題的說明，請參閱 [我的評估未從 收集合規檢查證據 AWS Security Hub CSPM](evidence-collection-issues.md#no-evidence-from-security-hub)。
+ 若要使用此資料來源類型建立自訂控制項，請參閱 [在 中建立自訂控制項 AWS Audit Manager](create-controls.md)。
+ 若要建立使用您的自訂控制項的自訂架構，請參閱 [在 中建立自訂架構 AWS Audit Manager](custom-frameworks.md)。
+ 若要將自訂控制項新增至現有的自訂架構，請參閱 [在 中編輯自訂架構 AWS Audit Manager](edit-custom-frameworks.md)。