diff --git a/groups/group17_internetexposed b/groups/group17_internetexposed index 51bb5940..9aea9535 100644 --- a/groups/group17_internetexposed +++ b/groups/group17_internetexposed @@ -13,7 +13,7 @@ GROUP_ID[17]='internet-exposed' GROUP_NUMBER[17]='17.0' -GROUP_TITLE[17]='Find resources exposed to the internet - [internet-exposed] *******' +GROUP_TITLE[17]='Find resources exposed to the internet - [internet-exposed] ***' GROUP_RUN_BY_DEFAULT[17]='N' # run it when execute_all is called GROUP_CHECKS[17]='check41,check42,extra72,extra73,extra74,extra76,extra77,extra78,extra79,extra710,extra711,extra716,extra723,extra727,extra731,extra736,extra738,extra745,extra748,extra749,extra750,extra751,extra752,extra753,extra754,extra755,extra756,extra770,extra771,extra778,extra779,extra787,extra788,extra798' @@ -48,4 +48,4 @@ GROUP_CHECKS[17]='check41,check42,extra72,extra73,extra74,extra76,extra77,extra7 # 7.79 [extra779] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Elasticsearch/Kibana ports [extras, elasticsearch] # 7.87 [extra787] Check connection and authentication for Internet exposed Elasticsearch/Kibana ports [extras, elasticsearch] # 7.88 [extra788] Check connection and authentication for Internet exposed Amazon Elasticsearch Service (ES) domains [extras, elasticsearch] -# 7.71 [extra771] Check if S3 buckets have policies which allow WRITE access (Not Scored) (Not part of CIS benchmark) [extras] \ No newline at end of file +# 7.71 [extra771] Check if S3 buckets have policies which allow WRITE access (Not Scored) (Not part of CIS benchmark) [extras] diff --git a/groups/group18_iso27001 b/groups/group18_iso27001 index f7a5212c..ba6c4496 100644 --- a/groups/group18_iso27001 +++ b/groups/group18_iso27001 @@ -13,7 +13,7 @@ GROUP_ID[18]='iso27001' GROUP_NUMBER[18]='18.0' -GROUP_TITLE[18]='ISO 27001:2013 Readiness - ONLY AS REFERENCE - [iso27001] *********' +GROUP_TITLE[18]='ISO 27001:2013 Readiness - ONLY AS REFERENCE - [iso27001] *****' GROUP_RUN_BY_DEFAULT[18]='N' # run it when execute_all is called GROUP_CHECKS[18]='check11,check110,check111,check112,check113,check116,check12,check122,check13,check14,check15,check16,check17,check18,check19,check21,check23,check24,check25,check26,check29,check31,check310,check311,check312,check313,check314,check32,check33,check34,check35,check36,check37,check38,check39,check41,check42,check43,extra711,extra72,extra723,extra731,extra735,extra76,extra78,extra792' @@ -98,4 +98,4 @@ GROUP_CHECKS[18]='check11,check110,check111,check112,check113,check116,check12,c # 78 A.9 Access Control A.9.4 System and Application Access Control check113 Ensure MFA is enabled for the 'root' account # 79 A.9 Access Control A.9.4 System and Application Access Control check14 Ensure access keys are rotated every 90 days or less # 80 A.9 Access Control A.9.4 System and Application Access Control check13 Ensure credentials unused for 90 days or greater are disabled -# 81 A.9 Access Control A.9.4 System and Application Access Control check112 Ensure no root account access key exists \ No newline at end of file +# 81 A.9 Access Control A.9.4 System and Application Access Control check112 Ensure no root account access key exists diff --git a/groups/group19_eks-cis b/groups/group19_eks-cis index 6194457a..c5b7e09c 100644 --- a/groups/group19_eks-cis +++ b/groups/group19_eks-cis @@ -10,6 +10,6 @@ GROUP_ID[19]='eks-cis' GROUP_NUMBER[19]='19.0' -GROUP_TITLE[19]='CIS EKS Benchmark *****************************************' +GROUP_TITLE[19]='CIS EKS Benchmark *********************************************' GROUP_RUN_BY_DEFAULT[19]='N' # run it when execute_all is called GROUP_CHECKS[19]='extra765,extra794,extra795,extra796,extra797'