Skip to main content

Compliance · AWS · CIS Benchmark

CIS AWS Benchmark tool: which controls CloudArq checks

The Center for Internet Security's AWS Foundations Benchmark is the de-facto baseline for cloud security. This page explains what it covers, how CloudArq aligns with v1.5 and v3.0, and which specific controls we scan on every audit run.

Updated 2026-04-19 · ~6 minute read

What is the CIS AWS Benchmark?

A free, community-maintained checklist of AWS security settings that, if implemented, reduce the most common attack vectors. The Center for Internet Security (cisecurity.org) publishes it annually. Version 1.5 (2022) is still the most-cited; version 3.0 (late 2024) adds coverage for Organizations, KMS, and Lambda.

Every AWS-focused compliance framework (SOC 2, HIPAA, PCI DSS, NIST 800-53) is more demanding than CIS, but every one of them treats CIS as the entry ticket. If you fail the Benchmark, you won't pass any of them. If you pass it, you're ready for the harder frameworks — which is why the SOC 2 checklist starts by assuming CIS is done.

How CloudArq aligns

  • v1.5Primary baseline. Every CloudArq tier — Starter, Pro, Max — enables the v1.5 control set. Starter runs the 46-check subset that covers the Section 1 (IAM) and Section 5 (Networking) controls most likely to block an audit.
  • v3.0Additive delta. v3.0 controls that aren't in v1.5 (Organizations, KMS rotation, Lambda) are merged into the Pro and Max checker sets so organisations on either benchmark have coverage.
  • gapA small set of CIS controls are on the roadmap rather than implemented — mostly controls that require organization-wide AWS Config rules or IAM Access Analyser data. They're flagged with roadmap in the table below.

Controls at a glance

A representative subset of the CIS AWS Benchmark — full coverage in the Max tier. See cisecurity.org for the complete spec.

IDSectionTitleSeverityCloudArq
1.4IAMEnsure no root account access key existshighChecked
1.5IAMEnsure MFA is enabled for the root accounthighChecked
1.7IAMEliminate use of the root account for administrative taskshighChecked
1.8IAMEnsure IAM password policy requires ≥ 14 charactersmediumChecked
1.9IAMEnsure IAM password policy prevents password reusemediumChecked
1.10IAMEnsure MFA is enabled for all IAM users with a console passwordhighChecked
1.12IAMEnsure credentials unused for 90 days or greater are disabledmediumChecked
1.14IAMEnsure access keys are rotated every 90 days or lessmediumChecked
1.20IAMEnsure that IAM Access Analyser is enabled for all regionsmediumRoadmap
3.1LoggingEnsure CloudTrail is enabled in all regionshighChecked
3.2LoggingEnsure CloudTrail log-file validation is enabledmediumChecked
3.3LoggingEnsure the S3 bucket used for CloudTrail logs is not publicly accessiblehighChecked
3.4LoggingEnsure CloudTrail trails are integrated with CloudWatch LogsmediumRoadmap
3.5LoggingEnsure AWS Config is enabled in all regionsmediumChecked
3.7LoggingEnsure CloudTrail logs are encrypted at rest using KMS-managed keysmediumChecked
3.8LoggingEnsure rotation for customer-created KMS keys is enabledmediumChecked
3.9LoggingEnsure VPC flow logging is enabled in all VPCsmediumChecked
4.1MonitoringEnsure a log metric filter + alarm for unauthorized API calls existsmediumChecked
4.2MonitoringEnsure a log metric filter + alarm for Management-Console sign-in without MFAmediumChecked
4.3MonitoringEnsure a log metric filter + alarm for root-account usagehighChecked
4.4MonitoringEnsure a log metric filter + alarm for IAM policy changesmediumChecked
5.1NetworkingEnsure no NACLs allow ingress from 0.0.0.0/0 to remote admin portshighChecked
5.2NetworkingEnsure no security group allows ingress from 0.0.0.0/0 to port 22highChecked
5.3NetworkingEnsure no security group allows ingress from 0.0.0.0/0 to port 3389highChecked
5.4NetworkingEnsure the default security group of every VPC restricts all trafficmediumChecked
5.5NetworkingEnsure routing tables for VPC peering are least-accessmediumRoadmap

How to read the output

Each CloudArq finding carries the CIS control ID it satisfies in its metadata. From the compliance-gaps page you can filter by framework (CIS) and sort by severity; every row shows the AWS CLI command or Terraform block to fix the gap. The same finding carries its mapping for SOC 2, HIPAA, PCI-DSS, NIST 800-53, and ISO 27001 — useful when you're preparing for more than one audit.

If you're evaluating scanners, Prowler vs CloudArq covers the open-source alternative.

Run the benchmark on your own AWS

Starter tier is free for accounts under 50 resources. No credit card. 5-minute read-only CloudFormation setup.

Further reading