Issue: AWS Organizations not enabled - no centralized governance
$ Enable AWS Organizations and implement Service Control Policies
Evidence Collection Guide
- 1. Go to AWS Organizations
- 2. Screenshot the organization structure
- 3. Document SCPs in place
Open Console →
Issue: Insufficient role segregation for proper oversight
$ Create separate admin, operator, and audit roles
Issue: Only 0% of users have MFA enabled
$ Enforce MFA for all IAM users
Issue: No SNS topics configured - no security alerting mechanism
$ Create SNS topics for security alerts and operational notifications
Evidence Collection Guide
- 1. Go to SNS Console
- 2. Create topics for SecurityAlerts, OperationalAlerts
- 3. Configure subscriptions
Open Console →
Issue: AWS Security Hub not enabled - no centralized security objectives
$ Enable Security Hub to centralize security standards and objectives
Evidence Collection Guide
- 1. Go to Security Hub
- 2. Enable with security standards
- 3. Document compliance scores
Open Console →
Issue: GuardDuty not enabled - no automated threat detection
$ Enable GuardDuty for continuous threat monitoring
Evidence Collection Guide
- 1. Go to GuardDuty
- 2. Enable for all regions
- 3. Configure threat intel feeds
Open Console →
Issue: No automated fraud detection mechanisms in place
$ Enable GuardDuty with IAM finding types
Issue: AWS Config not enabled - no continuous compliance monitoring
$ Enable AWS Config to track configuration changes
Evidence Collection Guide
- 1. Go to AWS Config
- 2. Set up configuration recorder
- 3. Enable compliance rules
Open Console →
Issue: No CloudWatch alarms configured
$ Set up CloudWatch alarms for critical metrics
Issue: No Config Rules configured for compliance checking
$ Deploy Config Rules for compliance requirements
Issue: No AWS Backup plans configured - data at risk
$ Create backup plans for critical resources
Evidence Collection Guide
- 1. Go to AWS Backup
- 2. Create backup plan
- 3. Assign resources
Open Console →
Issue: No KMS keys configured - using default encryption only
$ Create customer-managed KMS keys for sensitive data
Issue: CRITICAL: 1 security groups with admin ports open to internet
$ Restrict SSH/RDP/database ports to specific IPs only
Evidence Collection Guide
- 1. Go to EC2 → Security Groups
- 2. Review inbound rules
- 3. Remove 0.0.0.0/0 from ports 22, 3389, 3306
Open Console →
Issue: 1 VPCs but no VPC endpoints - traffic goes over public internet
$ Create VPC endpoints for AWS services (S3, DynamoDB, etc.)
Evidence Collection Guide
- 1. Go to VPC → Endpoints
- 2. Create endpoints for S3, DynamoDB
- 3. Route table associations
Issue: No CloudTrail configured - cannot detect unauthorized access
$ Enable CloudTrail for all regions
Issue: No password policy configured
$ Configure strong IAM password policy
Issue: Only 0% of S3 buckets have versioning enabled
$ Enable versioning on all S3 buckets
Issue: No CloudTrail configured
$ Enable CloudTrail for comprehensive logging
Issue: No patch groups configured in Systems Manager
$ Configure SSM Patch Manager for automated security patching
Issue: 1 buckets lack versioning (needed for data recovery) | Required for PCI DSS 10.5.5 (secure audit trails)
$ Enable versioning on: auditkit-test-public-1759976302
Evidence Collection Guide
- 1. Open S3 Console
- 2. Click bucket 'auditkit-test-public-1759976302'
- 3. Go to 'Properties' tab
- 4. Screenshot 'Bucket Versioning' showing 'Enabled'
Open Console →
Issue: No password policy configured | Violates PCI DSS 8.2.3-8.2.5 (password requirements)
$ Run: aws iam update-account-password-policy
See PDF for required parameters
Evidence Collection Guide
- 1. Go to IAM → Account settings
- 2. Screenshot 'Password policy' section
- 3. Must show all requirements enabled
- 4. PCI DSS requires minimum 7 chars, we recommend 14+
Open Console →
Issue: 1 security groups have critical ports open to 0.0.0.0/0: sg-0ab56571076bcff37 (port 22/SSH open to world!) | Violates PCI DSS 1.2.1 (firewall config)
$ Close open ports on SG: sg-0ab56571076bcff37
Run: aws ec2 revoke-security-group-ingress
Evidence Collection Guide
- 1. Go to EC2 → Security Groups
- 2. Click on the flagged security group
- 3. Go to 'Inbound rules' tab
- 4. Screenshot showing NO rules with Source '0.0.0.0/0' for ports 22, 3389, or databases
- 5. Critical: SSH/RDP must never be open to internet
- 6. For PCI DSS: Document business justification for any public access
Open Console →
Issue: CRITICAL: NO CloudTrail configured! Zero audit logging | Violates PCI DSS 10.1 (implement audit trails) & HIPAA 164.312(b)
$ aws cloudtrail create-trail --name audit-trail --s3-bucket-name YOUR_BUCKET && aws cloudtrail start-logging --name audit-trail
Evidence Collection Guide
- 1. Go to CloudTrail Console
- 2. Click 'Create trail'
- 3. Enable for all regions
- 4. Screenshot showing trail is 'Logging' status
- 5. This is MANDATORY for SOC2, PCI, and HIPAA!
Open Console →
Issue: AWS Config NOT enabled! Cannot track configuration changes!
$ Enable AWS Config to record all resource configurations
Evidence Collection Guide
- 1. Go to AWS Config Console
- 2. Click 'Get started'
- 3. Enable recording for all resources
- 4. Screenshot showing 'Recorder is ON'
Open Console →
Issue: GuardDuty NOT enabled - missing threat detection!
$ Enable GuardDuty for automated threat detection
Evidence Collection Guide
- 1. Go to GuardDuty Console
- 2. Click 'Get Started'
- 3. Enable GuardDuty
- 4. Screenshot showing 'GuardDuty is ENABLED'
Open Console →
Issue: CRITICAL: No VPC Flow Logs enabled - can't track network traffic!
$ Enable VPC Flow Logs immediately
Evidence Collection Guide
- 1. Go to VPC Console
- 2. Select your VPC
- 3. Go to 'Flow logs' tab
- 4. Screenshot showing flow logs enabled
Open Console →
No cross-account access detected - good isolation
All S3 buckets properly restrict public access
No inactive users with old credentials detected
All S3 buckets have encryption enabled
All 1 S3 buckets block public access | Meets SOC2 CC6.2, PCI DSS 1.2.1, HIPAA 164.312(a)(1)
All 1 S3 buckets have encryption enabled | Meets SOC2 CC6.3, PCI DSS 3.4, HIPAA 164.312(a)(2)(iv)
S3 logging check placeholder | Required for PCI DSS 10.2 (implement audit trails)
Root account has MFA enabled | Meets SOC2 CC6.6, PCI DSS 8.3.1, HIPAA 164.312(a)(2)(i)
All access keys rotated within 90 days | Meets SOC2 CC6.8, PCI DSS 8.2.4, HIPAA 164.308(a)(4)(ii)(B)
No unused credentials found | Meets PCI DSS 8.1.4 (remove inactive accounts within 90 days)
All 0 EBS volumes are encrypted | Meets SOC2 CC6.3, PCI DSS 3.4, HIPAA 164.312(a)(2)(iv)
0/0 instances properly use private IPs | Meets PCI DSS 1.3.1 network segmentation
All AMIs are recent and likely patched | Meets PCI DSS 6.2 patch management
Documentation Required: No explicit deny policies found
Documentation Required: Inspector v2 status checked - manual review required
Documentation Required: Manual review required: Verify change management process includes risk assessment
Documentation Required: Manual review required: Verify security policies are documented and enforced
Documentation Required: 2 users created in last 30 days - verify approval process
Documentation Required: No automated anomaly detection functions found
Documentation Required: Manual review required: Verify incident response procedures are documented
Documentation Required: No custom AMIs found - consider creating golden images