FTR

Foundational Technical Review

Assesses an AWS Partner's solution against a specific set of Amazon Web Services (AWS) best practices around security, performance, and operational processes that are most critical for customer success.
Read more

Summary: [Not available:33] | [Compliant:13] | [Need Attention:10]

Breakdown

Framework. Foundational Technical Review

CategoryRule IDCompliance StatusDescriptionReference
Partner hostedHOST-001.1Not available
Partner hostedHOST-001.2Not available
Partner hostedHOST-001.3Not available
Support levelSUP-001.1Need Attention
[supportPlanLowTier] - Subscribe to the AWS Business Support tier (or higher)
  • [GLOBAL]Account::Config
AWS Support Plan
Guide
Architecture reviewWAFR-001.1Not available
Architecture reviewWAFR-001.2Not available
Architecture reviewWAFR-002.1Not available
AWS root accountARC-001.1Compliant
[rootConsoleLogin30days]
AWS root accountARC-004.1Compliant
[rootHasAccessKey]
AWS root accountARC-005.1Not available
Communications from AWSACOM-001.1Need Attention
[hasAlternateContact] - Configure AWS account contacts
  • [GLOBAL]Account::Config
Alternate Contact
Communications from AWSACOM-002.1Not available
Identity and Access ManagementIAM-001.1Need Attention
[mfaActive]
[rootMfaActive] - Enable MFA on root user
  • [GLOBAL]User::root_id
AWS MFA
IAM Best Practices
Identity and Access ManagementIAM-002.1Compliant
[passwordLastChange90]
[passwordLastChange365]
[hasAccessKeyNoRotate90days]
[hasAccessKeyNoRotate30days]
Identity and Access ManagementIAM-002.2Not available
Identity and Access ManagementIAM-002.3Compliant
[NeedToEnableCloudTrail]
[HasOneMultiRegionTrail]
[enableGuardDuty]
Identity and Access ManagementIAM-002.4Not available
Identity and Access ManagementIAM-003.1Need Attention
[passwordPolicyWeak]
[passwordPolicy] - Set a custom password policy.
  • [GLOBAL]Account::Config
[passwordPolicyLength]
[passwordPolicyReuse]
IAM Password Policy
Identity and Access ManagementIAM-004.1Compliant
[noUsersFound]
Identity and Access ManagementIAM-005.1Compliant
[hasExternalIdentityProvider]
[hasSSORoles]
Identity and Access ManagementIAM-005.2Compliant
[hasExternalIdentityProvider]
[hasSSORoles]
Identity and Access ManagementIAM-006.1Need Attention
[InlinePolicyFullAccessOneServ] - Limit access in policy
  • [GLOBAL]Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role
[InlinePolicyFullAdminAccess]
[ManagedPolicyFullAccessOneServ] - Limit permissions.
  • [GLOBAL]Role::CodeStarWorker-dojo-ToolChain, Role::OrthancRole
[FullAdminAccess] - Limit permissions.
  • [GLOBAL]Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::itadmin, Role::OrganizationAccountAccessRole, Role::PACICloudFormationStackSetExecutionRole, Role::ServiceScreenerAutomationRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
AWS Docs
AWS Docs
AWS Docs
Organization GuardRail Blog
Identity and Access ManagementIAM-007.1Need Attention
[consoleLastAccess90]
[consoleLastAccess365]
[consoleLastAccess45]
[unusedRole] - Review & remove inactive roles
  • [GLOBAL]Role::AccessAnalyzerTrustedService, Role::AlpoTrustedServiceRole, Role::AVMContainersUserRole, Role::aws-ec2-spot-fleet-tagging-role, Role::awslogs.prod.kelex.molecule.toppatterns, Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98, Role::AWSVAPTAudit, Role::CloudSecAuditRole, Role::CloudSeerTrustedServiceRole, Role::CodeDeployRole, Role::CodeGuruProfilerForwardToAmazonProfiler, Role::CodeStarWorker-dojo-CloudFormation, Role::CodeStarWorker-dojo-ToolChain, Role::CodeStarWorker-dojo-WebApp, Role::Cognito_dojoIdPAuth_Role, Role::Cognito_dojoIdPUnauth_Role, Role::DocumentUnderstandingSolutionCICD-CICDHelperRole-ERDSGV99V9GT, Role::DocumentUnderstandingSolutionCICD-CodeBuildRole-26NRX1QIOV08, Role::DocumentUnderstandingSolutionCICD-CodePipelineRole-12BUYRAKNJIEQ, Role::DojoEC2AdminRole, Role::EC2AdminRole, Role::EC2CapacityReservationService, Role::EpoxyAccessRole, Role::itadmin, Role::PACICloudFormationStackSetAdministrationRole, Role::PACICloudFormationStackSetExecutionRole, Role::SaltyTrustedService, Role::ServiceScreenerAssumeRole, Role::ServiceScreenerAutomationRole, Role::ShadowTrooperRole, Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659, Role::TurtleRoleManagement
[userNoActivity90days]
AWS Blog
Identity and Access ManagementIAM-008.1Not available
Identity and Access ManagementIAM-009.1Not available
Identity and Access ManagementIAM-010.1Compliant
[NeedToEnableCloudTrail]
Identity and Access ManagementIAM-011.1Not available
Identity and Access ManagementIAM-012.1Compliant
[EC2IamProfile]
Identity and Access ManagementIAM-012.2Not available
Operational securitySECOPS-001Not available
Network securityNETSEC-001.1Compliant
[SGDefaultInUsed]
[SGSensitivePortOpenToAll]
[SGAllOpenToAll]
[SGAllOpen]
Network securityNETSEC-001.2Compliant
[SGSensitivePortOpenToAll]
Network securityNETSEC-002.1Compliant
[EC2InstancePublicIP]
Backups and recoveryBAR-001.1Need Attention
[EBSSnapshot]
[Backup]
[BackupTooLow]
[backupStatus]
[enabledContinuousBackup]
[hasAWSBackupPlans] - Configure AWS Backup plans
  • [GLOBAL]Account::Config
[BucketVersioning] - Enable Versioning
  • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::codepipeline-ap-southeast-1-183991447891, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
  • [us-east-1]Bucket::cloudtrail-awslogs-961319563195-pyvnhwtz-isengard-do-not-delete, Bucket::kuettai-dojo01
AWS Backup
Getting Started
AWS Docs
Manage Versioning Example
Backups and recoveryBAR-002.1Not available
Backups and recoveryBAR-002.2Not available
ResiliencyRES-001.1Not available
ResiliencyRES-002.1Not available
ResiliencyRES-004.1Not available
ResiliencyRES-005.1Not available
ResiliencyRES-006.1Not available
ResiliencyRES-006.2Not available
ResiliencyRES-007.1Not available
Amazon S3 bucket accessS3-001.1Compliant
[PublicAccessBlock]
[PublicReadAccessBlock]
[PublicWriteAccessBlock]
[S3AccountPublicAccessBlock]
Cross-account accessCAA-001.1Not available
Cross-account accessCAA-002.1Not available
Cross-account accessCAA-003.1Not available
Cross-account accessCAA-004.1Not available
Cross-account accessCAA-005.1Not available
Cross-account accessCAA-006.1Not available
Cross-account accessCAA-007.1Not available
Sensitive dataSDAT-001.1Need Attention
[MacieToEnable] - Enable Macie
  • [ap-southeast-1]Macie
  • [us-east-1]Macie
Getting started with Amazon Macie
Sensitive dataSDAT-002.1Need Attention
[EBSEncrypted]
[ServerSideEncrypted]
[SSEWithKMS]
[StorageEncrypted]
[RequiresKmsKey] - Enable SSE
  • [ap-southeast-1]Cloudtrail::IsengardTrail-DO-NOT-DELETE
Encrypt CloudTrail using AWS KMS
CloudTrail Security Best Practices
Sensitive dataSDAT-003.1Need Attention
[SGEncryptionInTransit] - Encryption in Transit
  • [ap-southeast-1]SG::sg-34753642
  • [us-east-1]SG::sg-9b3e45a4
[TlsEnforced] - Enforce Encryption of Data in Transit
  • [ap-southeast-1]Bucket::aws-codestar-ap-southeast-1-961319563195, Bucket::aws-codestar-ap-southeast-1-961319563195-dojo-pipe, Bucket::config-bucket-961319563195, Bucket::documentunderstandingsolutioncic-artifacts3bucket-dtr9a8q6yj2h, Bucket::documentunderstandingsolutioncicd-devoutputbucket-1m11zxjc9fhd6, Bucket::dojo-logs, Bucket::kuettai-solutions-bucket-ap-southeast-1
  • [us-east-1]Bucket::kuettai-dojo01
Data protection in Amazon EC2
AWS Docs
Regulatory compliance validation processRCVP-001.1Not available
Regulatory compliance validation processRCVP-001.2Not available