|
| 1 | +{ |
| 2 | + "name": "example_id", |
| 3 | + "title": "bTitle", |
| 4 | + "maintainer": "The Authors", |
| 5 | + "copyright": "The Authors", |
| 6 | + "copyright_email": "you@example.com", |
| 7 | + "license": "Apache-2.0", |
| 8 | + "summary": "bDescription", |
| 9 | + "version": "0.1.0", |
| 10 | + "supports": [], |
| 11 | + "controls": [ |
| 12 | + { |
| 13 | + "title": "Ensure configuration is set in situations", |
| 14 | + "desc": "Identify the threat actor and threat vector.\n \n Describe the mitigation.\n \n Note the external dependencies of the configuration.", |
| 15 | + "descriptions": { |
| 16 | + "default": "Identify the threat actor and threat vector.\n \n Describe the mitigation.\n \n Note the external dependencies of the configuration.", |
| 17 | + "rationale": "", |
| 18 | + "check": "Describe preconditions for conducting the check.\n \nList each step of the check.\n\nIdentify mitigating factors.\n\nDefine success or failure conditions.", |
| 19 | + "fix": "Describe preconditions for changing the configuration.\n\nList each step of applying the configuration.\n\nIdentify risks to confidentialty, integrity, or availability associated with applying the configuration." |
| 20 | + }, |
| 21 | + "impact": 0.5, |
| 22 | + "refs": [], |
| 23 | + "tags": { |
| 24 | + "severity": "low", |
| 25 | + "gtitle": "SRG-APP-000220-ZZZ-567890", |
| 26 | + "gid": "gid_unused", |
| 27 | + "rid": "r1_rule", |
| 28 | + "stig_id": "stig_id_unused", |
| 29 | + "fix_id": "fix_id_unused", |
| 30 | + "cci": [ |
| 31 | + "CCI-001499", |
| 32 | + "CCI-000197" |
| 33 | + ], |
| 34 | + "legacy": [ |
| 35 | + "V-72845", |
| 36 | + "SV-87497" |
| 37 | + ], |
| 38 | + "nist": [ |
| 39 | + "CM-5 (6)", |
| 40 | + "IA-5 (1) (c)" |
| 41 | + ] |
| 42 | + }, |
| 43 | + "code": "control 'X-123456' do\n title 'Ensure configuration is set in situations'\n desc \"Identify the threat actor and threat vector.\n \n Describe the mitigation.\n \n Note the external dependencies of the configuration.\n \"\n desc 'rationale', ''\n desc 'check', \"Describe preconditions for conducting the check.\n \nList each step of the check.\n\nIdentify mitigating factors.\n\nDefine success or failure conditions.\n\"\n desc 'fix', \"\n Describe preconditions for changing the configuration.\n\n List each step of applying the configuration.\n\n Identify risks to confidentialty, integrity, or availability associated with applying the configuration.\n \"\n impact 0.5\n tag severity: 'low'\n tag gtitle: 'SRG-APP-000220-ZZZ-567890'\n tag gid: 'gid_unused'\n tag rid: 'r1_rule'\n tag stig_id: 'stig_id_unused'\n tag fix_id: 'fix_id_unused'\n tag cci: ['CCI-001499', 'CCI-000197']\n tag legacy: ['V-72845', 'SV-87497']\n tag nist: ['CM-5 (6)', 'IA-5 (1) (c)']\nend\n", |
| 44 | + "source_location": { |
| 45 | + "ref": "./controls/g1Identifier.rb", |
| 46 | + "line": 3 |
| 47 | + }, |
| 48 | + "id": "X-123456" |
| 49 | + }, |
| 50 | + { |
| 51 | + "title": "Ensure a log metric filter and alarm exist for AWS Config\nconfiguration changes", |
| 52 | + "desc": "Real-time monitoring of API calls can be achieved by directing\nCloudTrail Logs to CloudWatch Logs and establishing corresponding metric\nfilters and alarms. It is recommended that a metric filter and alarm be\nestablished for detecting changes to CloudTrail's configurations.", |
| 53 | + "descriptions": { |
| 54 | + "default": "Real-time monitoring of API calls can be achieved by directing\nCloudTrail Logs to CloudWatch Logs and establishing corresponding metric\nfilters and alarms. It is recommended that a metric filter and alarm be\nestablished for detecting changes to CloudTrail's configurations.", |
| 55 | + "rationale": "", |
| 56 | + "check": "N/A", |
| 57 | + "fix": "ft2FixText" |
| 58 | + }, |
| 59 | + "impact": 0.5, |
| 60 | + "refs": [], |
| 61 | + "tags": { |
| 62 | + "severity": "medium", |
| 63 | + "gtitle": "g2Title", |
| 64 | + "gid": "g2Identifier", |
| 65 | + "rid": "r2_rule", |
| 66 | + "stig_id": "r2Version", |
| 67 | + "fix_id": "f2Identifier", |
| 68 | + "cci": [ |
| 69 | + "CCI-001495", |
| 70 | + "CCI-000196" |
| 71 | + ], |
| 72 | + "legacy": [ |
| 73 | + "identVLegacy3", |
| 74 | + "identVLegacy4" |
| 75 | + ], |
| 76 | + "nist": [ |
| 77 | + "AU-9", |
| 78 | + "IA-5 (1) (c)" |
| 79 | + ] |
| 80 | + }, |
| 81 | + "code": "control 'g2Identifier' do\n title \"Ensure a log metric filter and alarm exist for AWS Config\nconfiguration changes\"\n desc \"Real-time monitoring of API calls can be achieved by directing\nCloudTrail Logs to CloudWatch Logs and establishing corresponding metric\nfilters and alarms. It is recommended that a metric filter and alarm be\nestablished for detecting changes to CloudTrail's configurations.\"\n desc 'rationale', ''\n desc 'check', 'N/A'\n desc 'fix', 'ft2FixText'\n impact 0.5\n tag severity: 'medium'\n tag gtitle: 'g2Title'\n tag gid: 'g2Identifier'\n tag rid: 'r2_rule'\n tag stig_id: 'r2Version'\n tag fix_id: 'f2Identifier'\n tag cci: ['CCI-001495', 'CCI-000196']\n tag legacy: ['identVLegacy3', 'identVLegacy4']\n tag nist: ['AU-9', 'IA-5 (1) (c)']\nend\n", |
| 82 | + "source_location": { |
| 83 | + "ref": "./controls/g2Identifier.rb", |
| 84 | + "line": 3 |
| 85 | + }, |
| 86 | + "id": "g2Identifier" |
| 87 | + }, |
| 88 | + { |
| 89 | + "title": "Ensure a log metric filter and alarm exist for AWS Config\nconfiguration changes", |
| 90 | + "desc": "Real-time monitoring of API calls can be achieved by directing\nCloudTrail Logs to CloudWatch Logs and establishing corresponding metric\nfilters and alarms. It is recommended that a metric filter and alarm be\nestablished for detecting changes to CloudTrail's configurations.", |
| 91 | + "descriptions": { |
| 92 | + "default": "Real-time monitoring of API calls can be achieved by directing\nCloudTrail Logs to CloudWatch Logs and establishing corresponding metric\nfilters and alarms. It is recommended that a metric filter and alarm be\nestablished for detecting changes to CloudTrail's configurations.", |
| 93 | + "rationale": "", |
| 94 | + "check": "N/A", |
| 95 | + "fix": "ft3FixText" |
| 96 | + }, |
| 97 | + "impact": 0.5, |
| 98 | + "refs": [], |
| 99 | + "tags": { |
| 100 | + "severity": "medium", |
| 101 | + "gtitle": "g3Title", |
| 102 | + "gid": "g3Identifier", |
| 103 | + "rid": "r3_rule", |
| 104 | + "stig_id": "r3Version", |
| 105 | + "fix_id": "f3Identifier", |
| 106 | + "cci": [ |
| 107 | + "CCI-001495", |
| 108 | + "CCI-000196" |
| 109 | + ], |
| 110 | + "legacy": [ |
| 111 | + "identVLegacy5", |
| 112 | + "identVLegacy6" |
| 113 | + ], |
| 114 | + "nist": [ |
| 115 | + "AU-9", |
| 116 | + "IA-5 (1) (c)" |
| 117 | + ] |
| 118 | + }, |
| 119 | + "code": "control 'g3Identifier' do\n title \"Ensure a log metric filter and alarm exist for AWS Config\nconfiguration changes\"\n desc \"Real-time monitoring of API calls can be achieved by directing\nCloudTrail Logs to CloudWatch Logs and establishing corresponding metric\nfilters and alarms. It is recommended that a metric filter and alarm be\nestablished for detecting changes to CloudTrail's configurations.\"\n desc 'rationale', ''\n desc 'check', 'N/A'\n desc 'fix', 'ft3FixText'\n impact 0.5\n tag severity: 'medium'\n tag gtitle: 'g3Title'\n tag gid: 'g3Identifier'\n tag rid: 'r3_rule'\n tag stig_id: 'r3Version'\n tag fix_id: 'f3Identifier'\n tag cci: ['CCI-001495', 'CCI-000196']\n tag legacy: ['identVLegacy5', 'identVLegacy6']\n tag nist: ['AU-9', 'IA-5 (1) (c)']\nend\n", |
| 120 | + "source_location": { |
| 121 | + "ref": "./controls/g3Identifier.rb", |
| 122 | + "line": 3 |
| 123 | + }, |
| 124 | + "id": "g3Identifier" |
| 125 | + } |
| 126 | + ], |
| 127 | + "groups": [ |
| 128 | + { |
| 129 | + "title": null, |
| 130 | + "controls": [ |
| 131 | + "X-123456" |
| 132 | + ], |
| 133 | + "id": "controls/g1Identifier.rb" |
| 134 | + }, |
| 135 | + { |
| 136 | + "title": null, |
| 137 | + "controls": [ |
| 138 | + "g2Identifier" |
| 139 | + ], |
| 140 | + "id": "controls/g2Identifier.rb" |
| 141 | + }, |
| 142 | + { |
| 143 | + "title": null, |
| 144 | + "controls": [ |
| 145 | + "g3Identifier" |
| 146 | + ], |
| 147 | + "id": "controls/g3Identifier.rb" |
| 148 | + } |
| 149 | + ], |
| 150 | + "inputs": [], |
| 151 | + "sha256": "4e73883fc2f0d7c85e953346717c149539978c2780bc52c99276e3d6d6fe0567", |
| 152 | + "status_message": "", |
| 153 | + "status": "loaded", |
| 154 | + "generator": { |
| 155 | + "name": "inspec", |
| 156 | + "version": "4.28.0" |
| 157 | + } |
| 158 | +} |
0 commit comments