-
Notifications
You must be signed in to change notification settings - Fork 63
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add/Update AWS Audit Manager > GxP 21 CFR Part 11. Closes #598 #600
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@madhushreeray30 I left some comments, can you please have a look? Thanks!
gxp_21_cfr_part_11/11_200.sp
Outdated
@@ -1,8 +1,18 @@ | |||
benchmark "gxp_21_cfr_part_11_11_200" { | |||
title = "11.200 Electronic signature components and controls" | |||
description = "TO DO" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is this supposed to be?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@cbruno10 as discussed with @khushboo9024 she will update this as it is not present in the Audit Manager console.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we have any description we can use? Will the Hub page look blank/empty (assming we don't have a separate doc for this one)?
gxp_21_cfr_part_11/11_10.sp
Outdated
@@ -1,14 +1,25 @@ | |||
benchmark "gxp_21_cfr_part_11_11_10" { | |||
title = "11.10 Controls for closed systems" | |||
description = "Persons who use closed systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and, when appropriate, the confidentiality of electronic records, and to ensure that the signer cannot readily repudiate the signed record as not genuine. Such procedures and controls shall include the following benchmarks." | |||
title = "11.10" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@madhushreeray30 we are missing with Title
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please take a look at the review comments. Thanks!!
conformance_pack/codebuild.sp
Outdated
@@ -93,11 +93,24 @@ control "codebuild_project_environment_privileged_mode_disabled" { | |||
|
|||
control "codebuild_project_artifact_encryption_enabled" { | |||
title = "CodeBuild project artifact encryption should be enabled" | |||
description = "This control checks if an AWS CodeBuild project has encryption enabled for all of its artifacts. The rule is non compliant if 'encryptionDisabled' is set to 'true' for any primary or secondary (if present) artifact configurations." | |||
description = "This control checks if an CodeBuild project has encryption enabled for all of its artifacts. The rule is non compliant if 'encryptionDisabled' is set to 'true' for any primary or secondary (if present) artifact configurations." |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
description = "This control checks if an CodeBuild project has encryption enabled for all of its artifacts. The rule is non compliant if 'encryptionDisabled' is set to 'true' for any primary or secondary (if present) artifact configurations." | |
description = "This control checks if a CodeBuild project has encryption enabled for all of its artifacts. The rule is non compliant if 'encryptionDisabled' is set to 'true' for any primary or secondary (if present) artifact configurations." |
conformance_pack/opensearch.sp
Outdated
|
||
control "opensearch_domain_node_to_node_encryption_enabled" { | ||
title = "OpenSearch domains node-to-node encryption should be enabled" | ||
description = "This control check if Amazon OpenSearch Service nodes are encrypted end to end. The rule is non compliant if the node-to-node encryption is not enabled on the domain." |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
description = "This control check if Amazon OpenSearch Service nodes are encrypted end to end. The rule is non compliant if the node-to-node encryption is not enabled on the domain." | |
description = "This control checks if Amazon OpenSearch Service nodes are encrypted end to end. The rule is non-compliant if the node-to-node encryption is not enabled on the domain." |
conformance_pack/s3.sp
Outdated
pci_dss_v321 = "true" | ||
gxp_21_cfr_part_11 = "true" | ||
soc_2 = "true" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please sort the tags.
conformance_pack/s3.sp
Outdated
else 'ok' | ||
end as status, | ||
case | ||
when policy_std is null then title || ' policy not publicly accessable.' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
when policy_std is null then title || ' policy not publicly accessable.' | |
when policy_std is null then title || ' policy not publicly accessible.' |
conformance_pack/s3.sp
Outdated
end as status, | ||
case | ||
when policy_std is null then title || ' policy not publicly accessable.' | ||
when s ->> 'Effect' = 'Allow' and (s -> 'Principal' -> 'AWS' = '["*"]' or s ->> 'Principal' = '*') then title || ' policy publicly accessable.' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
when s ->> 'Effect' = 'Allow' and (s -> 'Principal' -> 'AWS' = '["*"]' or s ->> 'Principal' = '*') then title || ' policy publicly accessable.' | |
when s ->> 'Effect' = 'Allow' and (s -> 'Principal' -> 'AWS' = '["*"]' or s ->> 'Principal' = '*') then title || ' policy publicly accessible.' |
conformance_pack/s3.sp
Outdated
case | ||
when policy_std is null then title || ' policy not publicly accessable.' | ||
when s ->> 'Effect' = 'Allow' and (s -> 'Principal' -> 'AWS' = '["*"]' or s ->> 'Principal' = '*') then title || ' policy publicly accessable.' | ||
else title || ' policy not publicly accessable.' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
else title || ' policy not publicly accessable.' | |
else title || ' policy not publicly accessible.' |
conformance_pack/vpc.sp
Outdated
@@ -299,6 +298,16 @@ control "vpc_network_acl_unused" { | |||
}) | |||
} | |||
|
|||
control "vpc_security_group_allows_ingress_authorized_ports" { | |||
title = "VPC Security groups should only allow unrestricted incoming traffic for authorized ports" | |||
description = "This control checks whether the vpc security groups that are in use allow unrestricted incoming traffic. Optionally the rule checks whether the port numbers are listed in the authorizedTcpPorts parameter. The default values for authorizedTcpPorts are 80 and 443." |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
description = "This control checks whether the vpc security groups that are in use allow unrestricted incoming traffic. Optionally the rule checks whether the port numbers are listed in the authorizedTcpPorts parameter. The default values for authorizedTcpPorts are 80 and 443." | |
description = "This control checks whether the VPC security groups that are in use allow unrestricted incoming traffic. Optionally the rule checks whether the port numbers are listed in the authorizedTcpPorts parameter. The default values for authorizedTcpPorts are 80 and 443." |
Checklist
Removed Controls