Issue: No custom IAM policies - relying on AWS managed policies only
$ Create custom IAM policies to restrict access appropriately
Evidence Collection Guide
- AWS Console → IAM → Policies → Create policy → Screenshot custom policies
Open Console →
Issue: Only 0/2 users have MFA enabled
$ Enable MFA for all IAM users
Evidence Collection Guide
- AWS Console → IAM → Users → Security credentials → Screenshot MFA devices
Open Console →
Issue: 1 security groups allow unrestricted access: sg-0ab56571076bcff37
$ Restrict security group rules to specific IP ranges
Evidence Collection Guide
- AWS Console → VPC → Security Groups → Screenshot showing restricted inbound rules
Open Console →
Issue: No custom IAM policies to control information flow
$ Create IAM policies that enforce information flow controls
Evidence Collection Guide
- AWS Console → IAM → Policies → Create policies → Screenshot
Open Console →
Issue: No CloudTrail trails configured
$ Enable CloudTrail with multi-region trail
Evidence Collection Guide
- AWS Console → CloudTrail → Create trail → Screenshot
Open Console →
Issue: CloudTrail not configured to capture required audit content
$ Enable CloudTrail with management events
Evidence Collection Guide
- AWS Console → CloudTrail → Event selectors → Screenshot
Open Console →
Issue: CloudTrail not configured with log file validation
$ Enable CloudTrail log file integrity validation
Evidence Collection Guide
- AWS Console → CloudTrail → Log file validation → Screenshot
Open Console →
Issue: Only 0/2 users have MFA
$ Require MFA for all user accounts
Evidence Collection Guide
- AWS Console → IAM → Users → Enable MFA → Screenshot
Open Console →
Issue: No password policy configured
$ Configure IAM password policy with 14+ characters and complexity requirements
Evidence Collection Guide
- AWS Console → IAM → Account settings → Set password policy → Screenshot
Open Console →
Issue: No password policy configured
$ Configure IAM password policy to prevent reuse
Evidence Collection Guide
- AWS Console → IAM → Account settings → Password reuse prevention → Screenshot
Open Console →
Issue: No password policy configured
$ Configure password expiration policy
Evidence Collection Guide
- AWS Console → IAM → Account settings → Password expiration → Screenshot
Open Console →
Issue: CloudTrail not configured with failure alerting
$ Configure CloudWatch alarms for CloudTrail delivery failures
Evidence Collection Guide
- AWS Console → CloudWatch → Alarms → Screenshot CloudTrail failure alarms
Open Console →
Issue: No KMS keys configured for cryptographic operations
$ Create KMS keys for encryption at rest and in transit
Evidence Collection Guide
- AWS Console → KMS → Create key → Screenshot
Open Console →
IAM access control configured with 2 users
All 2 IAM users have unique identities
All 1 S3 buckets have encryption enabled
AWS KMS uses FIPS 140-2 validated cryptographic modules
Least privilege implemented (1 admin users)
AWS services use TLS 1.2+ for data in transit
AWS encryption services protect data at rest
Separation of duties implemented with 2 users
Access controls configured for remote/wireless access
Network controls configured with 1 VPCs
AWS enforces encryption for data in transit and at rest
External connections controlled via 2 security groups
Configuration change restrictions configured via IAM (2 users)
AWS IAM stores passwords using cryptographic hashing
AWS IAM login feedback does not reveal sensitive information
S3 enforces encryption in transit for 1 buckets
All 1 S3 buckets have public access blocked
Encryption at rest configured for 1 S3 buckets
Network separation implemented with 2 security groups
Least privilege principles implemented in IAM policies
AWS enforces TLS encryption for all remote access sessions
AWS automatically synchronizes system clocks using NTP
AWS IAM uses time-based tokens and nonces to prevent replay attacks
Network segmentation implemented with 1 VPCs
AWS services use cryptographic mechanisms to prevent unauthorized disclosure during transmission
Cryptographic session management configured with 0 KMS keys
AWS KMS and other AWS cryptographic services use FIPS 140-2 validated modules
AWS services use digital signatures and TLS to protect communications authenticity
Documentation Required: MANUAL: Document media sanitization procedures for EBS volumes and S3 objects
Evidence Collection Guide
- Documentation → Screenshot showing media sanitization procedures | AWS Console → S3 → Lifecycle rules
View in Console →
Documentation Required: MANUAL: AWS data centers have physical controls (inherited control)
Evidence Collection Guide
- AWS Artifact → Screenshot SOC 2 report showing physical controls
View in Console →
Documentation Required: MANUAL: AWS data centers escort visitors (inherited control)
Evidence Collection Guide
- AWS Artifact → Screenshot showing visitor management procedures
View in Console →
Documentation Required: MANUAL: AWS maintains physical access logs (inherited control)
Evidence Collection Guide
- AWS Artifact → Screenshot showing physical access logging
View in Console →
Documentation Required: MANUAL: AWS controls physical access devices (inherited control)
Evidence Collection Guide
- AWS Artifact → Screenshot showing physical access device management
View in Console →
Documentation Required: MANUAL: Document personnel screening procedures for CUI access
Evidence Collection Guide
- HR Documentation → Screenshot showing personnel screening procedures and background check records
View in Console →
Documentation Required: MANUAL: Document authorization process for CUI access
Evidence Collection Guide
- Documentation → Screenshot showing CUI access authorization procedures and approval records
View in Console →
Documentation Required: MANUAL: Document flaw identification and remediation processes
Evidence Collection Guide
- AWS Console → Systems Manager → Patch Manager → Screenshot compliance dashboard
View in Console →
Documentation Required: MANUAL: Document malicious code protection mechanisms
Evidence Collection Guide
- AWS Console → GuardDuty → Screenshot showing malware detection enabled
View in Console →
Documentation Required: MANUAL: Document malicious code protection update procedures
Evidence Collection Guide
- AWS Console → GuardDuty → Settings → Screenshot showing automatic updates enabled
View in Console →
Documentation Required: MANUAL: Document baseline configurations for AWS infrastructure
Evidence Collection Guide
- AWS Console → Config → Rules → Screenshot baseline configuration rules
View in Console →
Documentation Required: MANUAL: Document incident response plan and procedures
Evidence Collection Guide
- Documentation → Screenshot incident response plan | AWS Security Hub → Screenshot incident management
View in Console →
Documentation Required: MANUAL: Verify backup encryption and access controls
Evidence Collection Guide
- AWS Console → Backup → Vaults → Screenshot encryption enabled
View in Console →
Documentation Required: MANUAL: Document vulnerability scanning procedures
Evidence Collection Guide
- AWS Console → Inspector → Screenshot vulnerability scans
View in Console →
Documentation Required: MANUAL: Verify VPC Flow Logs and GuardDuty enabled
Evidence Collection Guide
- AWS Console → VPC → Flow Logs → Screenshot | GuardDuty → Screenshot
View in Console →
Documentation Required: MANUAL: Document unauthorized use detection mechanisms
Evidence Collection Guide
- AWS Console → GuardDuty → Screenshot findings | Security Hub → Screenshot
View in Console →
Documentation Required: MANUAL: Verify session timeout policies configured
Evidence Collection Guide
- AWS Console → IAM → Account settings → Screenshot session duration
View in Console →
Documentation Required: MANUAL: Document audit log review procedures
Evidence Collection Guide
- Documentation → Screenshot audit review procedures | CloudTrail → Screenshot log analysis
View in Console →
Documentation Required: MANUAL: Verify audit record correlation across systems
Evidence Collection Guide
- AWS Console → CloudWatch → Insights → Screenshot log correlation
View in Console →
Documentation Required: MANUAL: Document audit log reduction and analysis procedures
Evidence Collection Guide
- AWS Console → CloudWatch → Insights → Screenshot analysis tools
View in Console →
Documentation Required: MANUAL: Verify systems configured with least functionality
Evidence Collection Guide
- AWS Console → Organizations → SCPs → Screenshot service restrictions
View in Console →
Documentation Required: MANUAL: Document incident response training for personnel
Evidence Collection Guide
- Documentation → Screenshot training records | LMS → Screenshot completion certificates
View in Console →
Documentation Required: MANUAL: Document incident response testing procedures
Evidence Collection Guide
- Documentation → Screenshot testing procedures | Test results → Screenshot exercise outcomes
View in Console →
Documentation Required: MANUAL: Document system maintenance procedures
Evidence Collection Guide
- AWS Console → Systems Manager → Maintenance windows → Screenshot
View in Console →
Documentation Required: MANUAL: Document maintenance tool controls
Evidence Collection Guide
- AWS Console → Systems Manager → Session Manager → Screenshot access controls
View in Console →
Documentation Required: MANUAL: Verify VPC and security group boundary protection
Evidence Collection Guide
- AWS Console → VPC → Screenshot network architecture | Security groups → Screenshot boundary controls
View in Console →
Documentation Required: MANUAL: Document position risk designations for CUI access
Evidence Collection Guide
- HR Documentation → Screenshot position risk categories and CUI access levels
View in Console →
Documentation Required: MANUAL: Document formal sanctions process for security violations
Evidence Collection Guide
- HR Documentation → Screenshot sanctions policy and violation procedures
View in Console →
Documentation Required: MANUAL: Document access termination procedures
Evidence Collection Guide
- HR Documentation → Screenshot termination procedures | IAM → Screenshot user deactivation process
View in Console →
Documentation Required: AWS inherited control: AWS data centers limit physical access (verified via AWS Artifact)
Evidence Collection Guide
- AWS Artifact → Screenshot SOC 2 report physical security section
View in Console →
Documentation Required: AWS inherited control: Physical access protection implemented at AWS facilities
Evidence Collection Guide
- AWS Artifact → Screenshot physical protection controls documentation
View in Console →
Documentation Required: AWS inherited control: Visitor escort procedures at AWS data centers
Evidence Collection Guide
- AWS Artifact → Screenshot visitor escort procedures
View in Console →
Documentation Required: AWS inherited control: Physical access logs maintained at AWS facilities
Evidence Collection Guide
- AWS Artifact → Screenshot physical access logging documentation
View in Console →
Documentation Required: AWS inherited control: Physical access devices controlled at AWS facilities
Evidence Collection Guide
- AWS Artifact → Screenshot access device controls
View in Console →
Documentation Required: AWS inherited control: Physical safeguarding mechanisms at AWS facilities
Evidence Collection Guide
- AWS Artifact → Screenshot physical safeguarding mechanisms
View in Console →
Documentation Required: MANUAL: Verify malicious code protection deployed
Evidence Collection Guide
- AWS Console → GuardDuty → Screenshot enabled | EC2 → Screenshot endpoint protection
View in Console →
Documentation Required: MANUAL: Verify spam protection configured for email systems
Evidence Collection Guide
- Email system → Screenshot spam filtering configuration
View in Console →
Documentation Required: MANUAL: Configure account lockout after failed login attempts in authentication systems
Evidence Collection Guide
- Directory Service/IdP → Account lockout policy → Screenshot showing 5 attempts / 30 min lockout
View in Console →
Documentation Required: MANUAL: Display appropriate privacy and security notices on systems processing CUI
Evidence Collection Guide
- EC2 Instances → Login banner configuration → Screenshot security notice | Documentation → Screenshot privacy policy
View in Console →
Documentation Required: MANUAL: Implement session lock after 15 minutes of inactivity
Evidence Collection Guide
- AWS Console → IAM → Account settings → Screenshot session timeout | Workstations → Screenshot screen lock policy
View in Console →
Documentation Required: MANUAL: Automatically terminate network connections after defined conditions
Evidence Collection Guide
- AWS Console → IAM → Session policies → Screenshot termination rules | CloudWatch → Screenshot session monitoring
View in Console →
Documentation Required: MANUAL: Ensure all remote access routes through controlled access points (VPN/bastion hosts)
Evidence Collection Guide
- AWS Console → VPC → VPN connections → Screenshot managed access points | EC2 → Bastion hosts → Screenshot
View in Console →
Documentation Required: MANUAL: Document authorization for remote command/script execution on CUI systems
Evidence Collection Guide
- Documentation → Screenshot remote execution authorization policy | AWS Systems Manager → Screenshot Run Command logs
View in Console →
Documentation Required: MANUAL: Document authorization process for privileged functions and security-relevant information
Evidence Collection Guide
- Documentation → Screenshot privileged access authorization policy | IAM → Screenshot admin role assignments
View in Console →
Documentation Required: MANUAL: Provide security awareness training to all personnel with access to CUI
Evidence Collection Guide
- LMS/Training System → Screenshot training completion records | HR Documentation → Screenshot training policy
View in Console →
Documentation Required: MANUAL: Provide training on recognizing and reporting security threats
Evidence Collection Guide
- Training System → Screenshot threat awareness modules | Security Metrics → Screenshot phishing test results
View in Console →
Documentation Required: MANUAL: Provide role-based security training before granting access to CUI systems
Evidence Collection Guide
- Training System → Screenshot role-based training tracks | HR → Screenshot role-training matrix
View in Console →
Documentation Required: MANUAL: Update security awareness training content annually or when threats change
Evidence Collection Guide
- Training System → Screenshot content update history | Documentation → Screenshot training review schedule
View in Console →
Documentation Required: MANUAL: Incorporate practical exercises in security awareness training
Evidence Collection Guide
- Training System → Screenshot practical exercise modules | Security Metrics → Screenshot exercise participation rates
View in Console →
Documentation Required: MANUAL: Use CloudWatch Logs Insights for audit record analysis and reporting
Evidence Collection Guide
- AWS Console → CloudWatch → Logs Insights → Screenshot query results | Dashboards → Screenshot audit metrics
View in Console →
Documentation Required: MANUAL: Verify CloudTrail logs are protected from unauthorized access and modification
Evidence Collection Guide
- AWS Console → S3 → CloudTrail bucket → Object Lock → Screenshot | IAM → Screenshot restrictive bucket policies
View in Console →
Documentation Required: MANUAL: Conduct annual security control assessments of CUI systems
Evidence Collection Guide
- Documentation → Screenshot assessment schedule and results | AWS Audit Manager → Screenshot assessment framework
View in Console →
Documentation Required: MANUAL: Maintain System Security Plans (SSP) for all systems processing CUI
Evidence Collection Guide
- Documentation Repository → Screenshot SSP documents | Compliance Platform → Screenshot SSP templates
View in Console →
Documentation Required: MANUAL: Maintain Plans of Action & Milestones (POA&M) for identified security weaknesses
Evidence Collection Guide
- Project Management System → Screenshot POA&M tracking | Security Hub → Screenshot finding remediation status
View in Console →
Documentation Required: MANUAL: Continuously monitor security controls using AWS Security Hub and Config
Evidence Collection Guide
- AWS Console → Security Hub → Screenshot continuous monitoring dashboard | Config → Screenshot compliance timeline
View in Console →
Documentation Required: MANUAL: Use AWS Config to track configuration changes to CUI systems
Evidence Collection Guide
- AWS Console → Config → Configuration timeline → Screenshot change history
View in Console →
Documentation Required: MANUAL: Conduct security impact analysis before implementing configuration changes
Evidence Collection Guide
- Change Management System → Screenshot security impact analysis workflow | Documentation → Screenshot change approval records
View in Console →
Documentation Required: MANUAL: Document security configuration settings for all CUI system components
Evidence Collection Guide
- AWS Console → Config → Rules → Screenshot configuration baselines | Systems Manager → Documents → Screenshot configuration standards
View in Console →
Documentation Required: MANUAL: Configure systems with only essential capabilities, disable unnecessary services
Evidence Collection Guide
- AWS Console → Organizations → Service control policies → Screenshot service restrictions
View in Console →
Documentation Required: MANUAL: Implement application whitelisting and default-deny network policies
Evidence Collection Guide
- AWS Console → VPC → Security Groups → Screenshot deny-all baseline with specific allows
View in Console →
Documentation Required: MANUAL: Ensure IAM user names and identifiers are not reused after account deletion
Evidence Collection Guide
- IAM Policy Documentation → Screenshot identifier reuse prohibition | IAM → Screenshot user lifecycle procedures
View in Console →
Documentation Required: MANUAL: Disable IAM user accounts inactive for 90+ days
Evidence Collection Guide
- AWS Console → IAM → Users → Access advisor → Screenshot last activity | IAM Access Analyzer → Screenshot unused access findings
View in Console →
Documentation Required: MANUAL: Maintain incident tracking system for security incidents affecting CUI
Evidence Collection Guide
- Incident Tracking System → Screenshot incident log | Security Hub → Screenshot finding tracking
View in Console →
Documentation Required: MANUAL: Control and monitor the use of maintenance tools on CUI systems
Evidence Collection Guide
- AWS Console → Systems Manager → Session Manager → Screenshot maintenance session logs
View in Console →
Documentation Required: MANUAL: Sanitize or destroy storage media before equipment removal (AWS inherited for cloud infrastructure)
Evidence Collection Guide
- Documentation → Screenshot media sanitization procedures | AWS Artifact → Screenshot AWS media destruction compliance
View in Console →
Documentation Required: MANUAL: Scan media for malicious code before connecting to CUI systems
Evidence Collection Guide
- S3 Bucket → Screenshot antivirus scanning configuration | Security tools → Screenshot malware detection
View in Console →
Documentation Required: MANUAL: Escort and supervise non-cleared personnel performing maintenance on CUI systems
Evidence Collection Guide
- Documentation → Screenshot maintenance supervision policy | Maintenance Logs → Screenshot supervised sessions
View in Console →
Documentation Required: MANUAL: Sanitize equipment prior to maintenance or removal from facility
Evidence Collection Guide
- Documentation → Screenshot equipment sanitization procedures | S3 → Screenshot lifecycle policies for data deletion
View in Console →
Documentation Required: MANUAL: Mark or label media containing CUI to indicate distribution limitations
Evidence Collection Guide
- AWS Console → S3 → Object properties → Screenshot CUI classification tags
View in Console →
Documentation Required: MANUAL: Restrict access to CUI media to authorized individuals
Evidence Collection Guide
- AWS Console → S3 → Bucket permissions → Screenshot restrictive access policies | IAM → Screenshot media access roles
View in Console →
Documentation Required: MANUAL: Conduct annual risk assessments of organizational operations and CUI systems
Evidence Collection Guide
- Documentation → Screenshot annual risk assessment report | Risk Register → Screenshot identified risks and mitigations
View in Console →
Documentation Required: MANUAL: Remediate vulnerabilities based on risk assessment (high/critical within 30 days)
Evidence Collection Guide
- AWS Console → Systems Manager → Patch Manager → Screenshot compliance status | Inspector → Screenshot vulnerability remediation tracking
View in Console →
Documentation Required: MANUAL: Share threat intelligence with organizational stakeholders
Evidence Collection Guide
- GuardDuty → Screenshot threat intelligence findings | Documentation → Screenshot threat sharing procedures
View in Console →
Documentation Required: MANUAL: Verify security groups use deny-by-default, allow-by-exception rules
Evidence Collection Guide
- AWS Console → VPC → Security Groups → Screenshot showing deny-all baseline with specific allow rules
View in Console →
Documentation Required: MANUAL: Use VPN or AWS Direct Connect for all remote connections to CUI systems
Evidence Collection Guide
- AWS Console → VPC → VPN connections → Screenshot authorized remote access methods only
View in Console →
Documentation Required: MANUAL: Verify network communications are denied by default with explicit allow rules
Evidence Collection Guide
- AWS Console → VPC → Security Groups + NACLs → Screenshot deny-by-default configuration
View in Console →
Documentation Required: MANUAL: Ensure VPN connections prevent split tunneling to protect CUI
Evidence Collection Guide
- VPN Configuration → Screenshot showing split tunneling disabled | Network Policy → Screenshot VPN routing rules
View in Console →
Documentation Required: MANUAL: Ensure collaborative computing devices (cameras/microphones) cannot be remotely activated
Evidence Collection Guide
- Security Policy Documentation → Screenshot remote activation prohibition | Endpoint Management → Screenshot device control settings
View in Console →
Documentation Required: MANUAL: Document controls for mobile code (JavaScript, applets) execution
Evidence Collection Guide
- Security Policy → Screenshot mobile code policy | WAF Rules → Screenshot mobile code restrictions
View in Console →
Documentation Required: MANUAL: Document Voice over IP (VoIP) security controls if used for CUI communications
Evidence Collection Guide
- VoIP System → Screenshot encryption settings | Network Monitoring → Screenshot VoIP traffic monitoring
View in Console →
Documentation Required: MANUAL: Implement mobile device management (MDM) for devices accessing CUI
Evidence Collection Guide
- MDM Console → Screenshot device compliance policies | Device Inventory → Screenshot enrolled devices
View in Console →
Documentation Required: MANUAL: Use AWS Systems Manager Patch Manager and Inspector for flaw identification
Evidence Collection Guide
- AWS Console → Inspector → Screenshot vulnerability findings | Systems Manager → Patch Manager → Screenshot compliance
View in Console →
Documentation Required: MANUAL: Monitor AWS Security Hub, GuardDuty, and vendor security advisories
Evidence Collection Guide
- AWS Console → Security Hub → Screenshot security alerts dashboard | GuardDuty → Screenshot threat findings
View in Console →
Documentation Required: MANUAL: Ensure GuardDuty and endpoint protection have automatic updates enabled
Evidence Collection Guide
- AWS Console → GuardDuty → Settings → Screenshot automatic updates enabled | Endpoint Protection → Screenshot update configuration
View in Console →
Documentation Required: MANUAL: Conduct vulnerability scans at least quarterly or when new vulnerabilities identified
Evidence Collection Guide
- AWS Console → Inspector → Screenshot scan schedule and results | Documentation → Screenshot scan frequency policy
View in Console →
Documentation Required: MANUAL: Use VPC Flow Logs, GuardDuty, and CloudWatch to monitor for anomalous activity
Evidence Collection Guide
- AWS Console → VPC → Flow Logs → Screenshot enabled | GuardDuty → Screenshot network anomaly detection
View in Console →