The following table lists the policies that the AWS Lambda you deploy will auto-remediate out-of-the-box.
Note: The runbooks with no associated Prisma Cloud policy descriptor are generic runbooks you can associate a relevant custom policy to by modifying
index_prisma.py
.
Click on a runbook name to see more details, such as the IAM permissions required to run it as well as the script itself.
Runbook | Prisma Cloud Policy Name | Prisma Cloud Policy Descriptor | CIS | Prisma Cloud Policy ID |
---|---|---|---|---|
CloudFormation | ||||
AWS-CFM-003 | Enable CloudFormation Stack termination protection | N/A | N/A | |
CloudTrail | ||||
AWS-CLT-002 | AWS CloudTrail logs are not encrypted using Customer Master Keys (CMKs) | PC-AWS-CT-5 | 2.7 | c2b84f89-7ec8-473e-a6af-404feeeb96c5 |
AWS-CLT-004 | CloudTrail trail is not integrated with CloudWatch Logs | PC-AWS-CT-50 | 2.4 | 0d07ac51-fbfe-44fe-8edb-3314c9995ee0 |
AWS-CLT-005 | AWS CloudTrail log validation is not enabled in all regions | PC-AWS-CT-4 | 2.2 | 38e3d3cf-b694-46ec-8bd2-8f02194b5040 |
AWS-CLT-006 | AWS CloudTrail bucket is publicly accessible | PC-AWS-S3-1 | 2.3 | b76ad441-e715-4fd0-bbc3-cd3b2bee34bf |
Config | ||||
AWS-CONFIG-001 | AWS Config disabled | N/A | 2.5 | N/A |
EC2 | ||||
AWS-EC2-001 | EBS snapshot doesn't exist or older than 15 days | N/A | N/A | |
AWS-EC2-002 | AWS Security Groups allow internet traffic to SSH port (22) | PC-AWS-VPC-23 | 4.1 | 617b9138-584b-4e8e-ad15-7fbabafbed1a |
AWS-EC2-003 | AWS Security Groups allow internet traffic from internet to Telnet port (23) | PC-AWS-VPC-236 | 519456f2-f9eb-407b-b32d-064f1ac7f0ca | |
AWS-EC2-004 | AWS Security Groups allow internet traffic from internet to RDP port (3389) | PC-AWS-VPC-24 | 4.2 | b82f90ce-ed8b-4b49-970c-2268b0a6c2e5 |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to MYSQL port (3306) | PC-AWS-VPC-229 | 65daa6a0-e040-434e-aca3-9d5765c96e7c | |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to PostgreSQL port (5432) | PC-AWS-VPC-230 | 3b642d25-4534-487a-9399-c2622754ecb5 | |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to SQLServer port (1433) | PC-AWS-VPC-233 | 760f2823-997e-495f-a538-5fb073c0ee78 | |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to MSQL port (4333) | PC-AWS-VPC-247 | ab7f8eda-18ab-457c-b5d3-fd4f53c722bc | |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to VNC Listener port (5500) | PC-AWS-VPC-238 | 8dd9e369-0c09-4477-97a2-ff0d50507fe2 | |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to VNC Server port (5900) | PC-AWS-VPC-232 | 89cbc2f1-fcb0-48b9-be71-4cbe2d18a5f7 | |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to FTP port (21) | PC-AWS-VPC-245 | 14d10ad2-51df-4b07-be69-e94951cc7067 | |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to FTP-Data port (20) | PC-AWS-VPC-248 | cdcd663c-e9c9-4472-9779-e5f38751524a | |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to SMTP port (25) | PC-AWS-VPC-227 | c2074d5a-aa28-4dde-90c1-82f528cec55e | |
AWS-EC2-010 | AWS Security Groups allow internet traffic from internet to DNS port (53) | PC-AWS-VPC-228 | 6eaf6455-1659-4c4b-bff5-c8c7b0fda201 | |
AWS-EC2-031 | AWS delete unused EC2 Security Groups | N/A | N/A | |
AWS-EC2-036 | AWS Amazon Machine Image (AMI) is publicly accessible | PC-AWS-EC2-35 | 81a2200a-c63e-4860-85a0-b54eaa581135 | |
AWS-EC2-038 | AWS Default Security Group does not restrict all traffic | PC-AWS-VPC-22 | 4.3 | 2378dbf4-b104-4bda-9b05-7417affbba3f |
AWS-EC2-039 | AWS Security Groups with Inbound rule overly permissive to All Traffic | PC-AWS-VPC-222 | 566686e8-0581-4df5-ae22-5a901ed37b58 | |
AWS-EC2-042 | AWS EBS snapshots are accessible to public | PC-AWS-EC2-31 | 7c714cb4-3d47-4c32-98d4-c13f92ce4ec5 | |
ELB | ||||
AWS-ELB-009 | AWS Elastic Load Balancer (Classic) with connection draining disabled | PC-AWS-ELB-267 | 7eb7f61e-df59-42d4-8236-7d012f278fa6 | |
AWS-ELB-012 | AWS Elastic Load Balancer (Classic) with cross-zone load balancing disabled | PC-AWS-ELB-266 | 551ee7ba-edb6-468e-a018-8774da9b1e85 | |
AWS-ELB-013 | AWS Elastic Load Balancer (Classic) with access log disabled | PC-AWS-ELB-265 | b675c604-e886-43aa-a60f-a9ad1f3742d3 | |
AWS-ELB-015 | AWS Elastic Load Balancer v2 (ELBv2) Application Load Balancer (ALB) with access log disabled | PC-AWS-ELB-242 | f2a2bcf1-2966-4cb5-9230-bd39c9903a02 | |
IAM | ||||
AWS-IAM-002 | Enforce AWS account best practices password policy | N/A | 1.5 - 1.11 | N/A |
AWS-IAM-015 | AWS access keys not used for more than 90 days | PC-AWS-IAM-48 | 1.3 | 7ca5af2c-d18d-4004-9ad4-9c1fbfcab218 |
AWS-IAM-016 | AWS IAM policy allows full administrative privileges | PC-AWS-IAM-46 | 1.22 | d9b86448-11a2-f9d4-74a5-f6fc590caeef |
AWS-IAM-018 | Create an IAM Support Role to manage incidents with AWS Support | N/A | 1.20 | N/A |
KMS | ||||
AWS-KMS-001 | AWS Customer Master Key (CMK) rotation is not enabled | PC-AWS-KMS-20 | 2.8 | 497f7e2c-b702-47c7-9a07-f0f6404ac896 |
RDS | ||||
AWS-RDS-005 | AWS RDS database instance is publicly accessible | PC-AWS-RDS-99 | 1bb6005a-dca6-40e2-b0a6-24da968c0808 | |
AWS-RDS-007 | AWS RDS snapshots are accessible to public | PC-AWS-RDS-32 | a707de6a-11b7-478a-b636-5e21ee1f6162 | |
AWS-RDS-010 | AWS RDS instance with Multi-Availability Zone disabled | PC-AWS-RDS-218 | c5305272-a732-4e8e-8427-6a9701cd2a6f | |
AWS-RDS-011 | AWS RDS minor upgrades not enabled | PC-AWS-RDS-260 | 9dd6cc35-1855-48c8-86ba-0e1818ce11e2 | |
Redshift | ||||
AWS-REDSHIFT-001 | AWS Redshift clusters should not be publicly accessible | PC-AWS-RED-79 | d65fd313-1c5c-42a1-98b2-a73bdeda19a6 | |
S3 | ||||
AWS-SSS-001 | AWS S3 Object Versioning is disabled | PC-AWS-S3-259 | 89ea62c1-3845-4134-b337-cc82203b8ff9 | |
AWS-SSS-008 | AWS S3 bucket has global view ACL permissions enabled | PC-AWS-S3-251 | 43c42760-5283-4bc4-ac43-a80e58c4139f | |
AWS-SSS-009 | AWS Access logging not enabled on S3 buckets | PC-AWS-S3-30 | 2.6 | 4daa435b-fa46-457a-9359-6a4b4a43a442 |
AWS-SSS-014 | AWS S3 buckets do not have server side encryption | PC-AWS-S3-64 | 7913fcbf-b679-5aac-d979-1b6817becb22 | |
PC-AWS-S3-29 | AWS S3 buckets are accessible to public | PC-AWS-S3-29 | 630d3779-d932-4fbf-9cce-6e8d793c6916 | |
VPC | ||||
AWS-VPC-013 | Release unassociated (unused) Elastic IP addresses | N/A | N/A | |
AWS-VPC-020 | AWS VPC has flow logs disabled | PC-AWS-VPC-25 | 2.9 | 49f4760d-c951-40e4-bfe1-08acaa17672a |
AWS-VPC-Default | Delete AWS default VPC | N/A | N/A | |
Misc | ||||
AWS-TEST-001 | Example runbook | N/A | N/A |