Skip to content

Commit c8801c5

Browse files
committed
Revert "Max-Request Update"
This reverts commit b651809.
1 parent b651809 commit c8801c5

File tree

677 files changed

+1640
-2297
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

677 files changed

+1640
-2297
lines changed

cloud/aws/cloudformation/stack-notification-disabled.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: medium
77
description: |
88
Ensure that your Amazon CloudFormation stacks are using SNS topics to send notifications when important events occur.
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/cloudformation-stack-notification.html
11-
- http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-stack.html
129
impact: |
1310
Disabling CloudFormation Stack Notifications can lead to reduced visibility into stack events and errors, delaying the detection of issues and hindering effective monitoring of changes and deployments in the cloud environment.
1411
remediation: |
1512
Enable CloudFormation Stack Notifications by configuring SNS (Simple Notification Service) topics for your CloudFormation stack. This will ensure real-time alerts on stack events, including updates, errors, and resource creation, providing better monitoring and visibility.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/cloudformation-stack-notification.html
15+
- http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-stack.html
1816
tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config
1917

2018
variables:

cloud/aws/cloudformation/stack-policy-not-inuse.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: medium
77
description: |
88
Ensure your AWS CloudFormation stacks are using policies as a fail-safe mechanism in order to prevent accidental updates to stack resources.
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/cloudformation-stack-policy.html
11-
- http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/protect-stack-resources.html
129
impact: |
1310
Lack of a CloudFormation Stack Policy allows unrestricted modifications to stack resources, increasing the risk of unintended or harmful changes.
1411
remediation: |
1512
Implement a CloudFormation Stack Policy to restrict updates to critical resources, defining explicit rules for which resources can be modified during stack updates.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/cloudformation-stack-policy.html
15+
- http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/protect-stack-resources.html
1816
tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config
1917

2018
variables:

cloud/aws/cloudformation/stack-termination-disabled.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: medium
77
description: |
88
Ensure that Termination Protection safety feature is enabled for your Amazon CloudFormation stacks in order to protect them from being accidentally deleted.
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/stack-termination-protection.html
11-
- http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html
129
impact: |
1310
Disabled termination protection increases the risk of accidental deletion of critical CloudFormation stacks.
1411
remediation: |
1512
Enable termination protection for critical CloudFormation stacks by setting TerminationProtection to true in the stack settings, preventing accidental deletions.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/stack-termination-protection.html
15+
- http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html
1816
tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config
1917

2018
variables:

cloud/aws/cloudfront/cloudfront-compress-object.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: low
77
description: |
88
Ensure that your Amazon CloudFront Content Delivery Network (CDN) distributions are configured to automatically compress content for web requests that include "Accept-Encoding: gzip" in the request header, in order to increase the websites/web applications performance and reduce bandwidth costs.
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/compress-objects-automatically.html
11-
- https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/ServingCompressedFiles.html
129
impact: |
1310
Disabling "Compress Objects Automatically" in CloudFront can lead to increased data transfer costs and slower page load times, negatively impacting user experience and performance.
1411
remediation: |
1512
Enable "Compress Objects Automatically" in CloudFront to reduce data transfer sizes, enhance loading speeds, and improve overall performance for end users.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/compress-objects-automatically.html
15+
- https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/ServingCompressedFiles.html
1816
tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config
1917

2018
variables:

cloud/aws/cloudfront/cloudfront-custom-certificates.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: medium
77
description: |
88
Ensure that your Amazon CloudFront distributions are configured to use a custom SSL/TLS certificate instead of the default one.
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-distro-custom-tls.html
11-
- https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/CNAMEs.html
129
impact: |
1310
Failing to use custom SSL/TLS certificates in CloudFront can result in trust issues with end users, exposing your web content to man-in-the-middle attacks and potentially damaging your brand's reputation due to untrusted connection warnings.
1411
remediation: |
1512
Configure your Amazon CloudFront distribution to use custom SSL/TLS certificates to ensure secure and trusted connections for your users, enhancing data protection and maintaining brand integrity.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-distro-custom-tls.html
15+
- https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/CNAMEs.html
1816
tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config
1917

2018
variables:

cloud/aws/cloudfront/cloudfront-geo-restriction.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: info
77
description: |
88
Ensure that geographic restriction is enabled for your Amazon CloudFront CDN distributions in order to allow or block viewers from specific locations (countries) from accessing your web content.
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/geo-restriction.html
11-
- https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/georestrictions.html
129
impact: |
1310
Not enabling Geo Restriction in CloudFront exposes content to users from unauthorized regions, increasing the risk of content misuse, compliance violations, and potential security threats.
1411
remediation: |
1512
Enable Geo Restriction in CloudFront to control access to content based on geographic locations, ensuring only authorized users from designated regions can access specific resources.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/geo-restriction.html
15+
- https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/georestrictions.html
1816
tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config
1917

2018
variables:

cloud/aws/cloudfront/cloudfront-insecure-protocol.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: medium
77
description: |
88
Ensure that your Amazon CloudFront Content Delivery Network (CDN) distributions are not using insecure SSL protocols (i.e. SSLv3) for HTTPS communication between CloudFront edge locations and custom origins.
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-insecure-origin-ssl-protocols.html
11-
- http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/SecureConnections.html
129
impact: |
1310
Insecure SSL protocols for CloudFront origins can expose sensitive data to interception and compromise, increasing the risk of man-in-the-middle attacks.
1411
remediation: |
1512
Configure your CloudFront distribution to enforce the use of secure SSL/TLS protocols (TLS 1.2 or higher) for all origins and disable support for outdated protocols like SSLv3 and TLS 1.0/1.1.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-insecure-origin-ssl-protocols.html
15+
- http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/SecureConnections.html
1816
tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config
1917

2018
variables:

cloud/aws/cloudfront/cloudfront-integrated-waf.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: medium
77
description: |
88
Ensure that all your Amazon CloudFront distributions are integrated with the Amazon Web Application Firewall (WAF) service to protect against application-layer attacks that can compromise the security of your websites/web applications or place unnecessary load on them
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-integrated-with-waf.html
11-
- http://docs.aws.amazon.com/waf/latest/developerguide/what-is-aws-waf.html
129
impact: |
1310
Lack of integration between CloudFront and a Web Application Firewall (WAF) increases vulnerability to web-based attacks, including DDoS, SQL injection, and cross-site scripting (XSS).
1411
remediation: |
1512
Integrate CloudFront with an appropriate Web Application Firewall (WAF) to filter and monitor HTTP requests, providing enhanced protection against common web threats.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-integrated-with-waf.html
15+
- http://docs.aws.amazon.com/waf/latest/developerguide/what-is-aws-waf.html
1816
tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config
1917

2018
variables:

cloud/aws/cloudfront/cloudfront-logging-disabled.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: medium
77
description: |
88
Ensure that access (standard) logging is enabled for your Amazon CloudFront distributions in order to track all viewer requests for the web content delivered through the Content Delivery Network (CDN).
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-logging-enabled.html
11-
- http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/AccessLogs.html
129
impact: |
1310
Disabling CloudFront logging reduces visibility into traffic patterns, hinders incident response and forensic analysis, compromises compliance efforts, and limits troubleshooting capabilities, increasing security risks.
1411
remediation: |
1512
Enable encryption for all existing EBS volumes and ensure that all new volumes created are configured to use encryption by default. Additionally, update any snapshots to be encrypted and use AWS Key Management Service (KMS) to manage encryption keys securely.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-logging-enabled.html
15+
- http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/AccessLogs.html
1816
tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config
1917

2018
variables:

cloud/aws/cloudfront/cloudfront-origin-shield.yaml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ info:
66
severity: info
77
description: |
88
Ensure that the Origin Shield performance optimization feature is enabled for all your Amazon CloudFront distributions in order to help reduce the load on your distribution's origin, improve its availability, and reduce its operating costs.
9-
reference:
10-
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/enable-origin-shield.html
11-
- https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/origin-shield.html
129
impact: |
1310
Not enabling CloudFront Origin Shield can lead to increased load on your origin server, higher latency, and greater costs due to more frequent requests during traffic spikes.
1411
remediation: |
1512
Enable CloudFront Origin Shield for your distributions to optimize cache efficiency, reduce load on your origin server, and improve content delivery performance during high traffic periods.
16-
metadata:
17-
max-request: 2
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/enable-origin-shield.html
15+
- https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/origin-shield.html
1816
tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config
1917

2018
variables:

0 commit comments

Comments
 (0)