You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
So that I can check if qualified resources in my CDK app conforms to the following HIPAA Security control(s): 164.308(a)(4)(ii)(B), 164.312(d)
Details
ruleId: HIPAA.Security-IAMUserMfaEnabled
info: The IAM user does not have MFA enabled - (Control IDs: 164.308(a)(4)(ii)(B), 164.312(d))
Given Reason: Enable this rule to restrict access to resources in the AWS Cloud. This rule ensures multi-factor authentication (MFA) is enabled for all IAM users. MFA adds an extra layer of protection on top of a user name and password. Reduce the incidents of compromised accounts by requiring MFA for IAM users.
Acceptance Criteria
If the rule can be implemented
Given a CDK app with a non-compliant resource
When HIPAA Security Pack is enabled
Then the CDK stack does not deploy and the user receives an ERROR with relevant Control ID information about the non compliant resource
Given a CDK app with a compliant resource
When HIPAA Security Pack is enabled
Then the CDK stack deploys and the user does not receive an ERROR about the compliant resource
Given the cdk-nag RULES file
When the HIPAA.Security-IAMUserMfaEnabled rule is added to the rule pack
Then the HIPAA Security Errors section is updated with the rule information
If the rule cannot be implemented
Given the cdk-nag RULES file
When the iam-user-mfa-enabled check is not added to the rule pack
Then the HIPAA Security Excluded Rules section is updated with the check information
The text was updated successfully, but these errors were encountered:
Summary
As a developer
I would like to implement the iam-user-mfa-enabled config rule
So that I can check if qualified resources in my CDK app conforms to the following HIPAA Security control(s): 164.308(a)(4)(ii)(B), 164.312(d)
Details
ruleId:
HIPAA.Security-IAMUserMfaEnabled
info: The IAM user does not have MFA enabled - (Control IDs: 164.308(a)(4)(ii)(B), 164.312(d))
Given Reason: Enable this rule to restrict access to resources in the AWS Cloud. This rule ensures multi-factor authentication (MFA) is enabled for all IAM users. MFA adds an extra layer of protection on top of a user name and password. Reduce the incidents of compromised accounts by requiring MFA for IAM users.
Acceptance Criteria
If the rule can be implemented
Given a CDK app with a non-compliant resource
ERROR
with relevant Control ID information about the non compliant resourceGiven a CDK app with a compliant resource
ERROR
about the compliant resourceGiven the
cdk-nag
RULES fileHIPAA.Security-IAMUserMfaEnabled
rule is added to the rule packErrors
section is updated with the rule informationIf the rule cannot be implemented
Given the
cdk-nag
RULES fileiam-user-mfa-enabled
check is not added to the rule packExcluded Rules
section is updated with the check informationThe text was updated successfully, but these errors were encountered: