0% found this document useful (0 votes)
38 views16 pages

Security Hub Report

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1/ 16

Region Date Title

11/25/2021 aws-cloudtrail-logs-735206531520-dff111fc

11/25/2021 aws-cloudtrail-logs-735206531520-f3a08337

11/25/2021 sagemaker-studio-735206531520-g6hjzpv41l

11/25/2021 rawdataroomtype
us-west-2
11/25/2021 mydinhlog - Done

11/25/2021 aws-cloudtrail-logs-735206531520-8fb035d0

11/25/2021 aws-cloudtrail-logs-735206531520-2c115c81

11/29/2021 4.3 Ensure the default security group of every VPC restricts all traffic
EC2.2 The VPC default security group should not allow inbound and
11/29/2021 outbound traffic

11/25/2021 sagemaker-ap-northeast-1-735206531520

11/25/2021 sagemaker-studio-735206531520-v170csq2hy

11/25/2021 sagemaker-studio-735206531520-34fs44x1q2t

11/25/2021 sagemaker-studio-735206531520-i8s8pwbfm9
ap-northeast-1
11/25/2021 myvbcbucket

11/29/2021 4.3 Ensure the default security group of every VPC restricts all traffic
EC2.2 The VPC default security group should not allow inbound and
11/29/2021 outbound traffic

securityhub-vpc-sg-restricted-common-ports-35a44111

EC2.19 Security groups should not allow unrestricted access to ports


12/15/2021 with high risk
FindingID
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'

' arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/ea68919e-a997-4113-b603-54b30d5c416f'
'arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/fcb698d8-a5a7-42c7-a28c-56ae58d583f4'
'arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/754c29ab-c9a3-4705-ba76-07167982d941'
'arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/4964cab3-9965-4f5f-8e1f-332977be81d5'
'arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/c7b7c829-6b09-4222-b914-94901091b2f7'

arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.19/finding/4e1763ff-b5e7-49e7-9e9b-2fff2fdf3c05
Status

Done

Done

Done

Done

Done

Done

Done

Done

Done

Done

Done

Done

Done

Done

Done

Done

Done
Region Date

###
Issue

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

EC2.10 Amazon EC2 should be configured to use VPC endpoints that are created for the Amazon EC2 service

EC2.15 EC2 subnets should not automatically assign public IP addresses

2.9 Ensure VPC flow logging is enabled in all VPCs

EC2.6 VPC flow logging should be enabled in all VPCs

1.7 Ensure IAM password policy requires at least one symbol

2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs

2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs

CloudTrail.2 CloudTrail should have encryption at-rest enabled

CloudTrail.2 CloudTrail should have encryption at-rest enabled

EC2.7 EBS default encryption should be enabled

S3.4 S3 buckets should have server-side encryption enabled


S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.7 Password policies for IAM users should have strong configurations

S3.1 S3 Block Public Access setting should be enabled

1.9 Ensure IAM password policy requires minimum password length of 14 or greater

EFS.2 Amazon EFS volumes should be in backup plans

Config.1 AWS Config should be enabled

2.5 Ensure AWS Config is enabled

S3.5 S3 buckets should require requests to use Secure Socket Layer

EC2.15 EC2 subnets should not automatically assign public IP addresses

S3.4 S3 buckets should have server-side encryption enabled

EC2.10 Amazon EC2 should be configured to use VPC endpoints that are created for the Amazon EC2 service

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

S3.4 S3 buckets should have server-side encryption enabled

IAM.7 Password policies for IAM users should have strong configurations

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer


S3.5 S3 buckets should require requests to use Secure Socket Layer

S3.5 S3 buckets should require requests to use Secure Socket Layer

EC2.7 EBS default encryption should be enabled

EFS.2 Amazon EFS volumes should be in backup plans

2.9 Ensure VPC flow logging is enabled in all VPCs

EC2.6 VPC flow logging should be enabled in all VPCs

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

IAM.5 MFA should be enabled for all IAM users that have a console password

2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs

2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs

CloudTrail.2 CloudTrail should have encryption at-rest enabled

CloudTrail.2 CloudTrail should have encryption at-rest enabled


S3.1 S3 Block Public Access setting should be enabled

1.7 Ensure IAM password policy requires at least one symbol


FindingID
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/dc8e2097-57e0-4c10-9823-0ce5ef91a393
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/cc18d6c9-1636-44aa-908c-7c6fa3d837c6
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/0571cc11-d4fe-46ce-854a-5264ae1f34c0
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/5d869591-0a75-4c37-9abd-803168a0aaa8
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/1ae0779d-58f6-4bd8-856f-0f530a93140e
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/62fa8153-b1c0-462a-a3e9-5b668294ec38
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/f99c666f-ec7c-4a5d-b2a4-df125276588c
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/dd827a2a-047f-4a6d-a129-467559efee36
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/ac5a6ceb-c5ce-4fbe-a610-163abce55222
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/64875edc-2fa8-440c-9600-23f5554a243b
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/450a8cb5-3991-4ec8-ba78-d59a145a4267
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/0e28ab2b-77ab-4a10-bf6f-cc97950af18a
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.10/finding/f39b7cec-53a7-409b-857e-f0af2c2fffc0
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.15/finding/f0a9bba1-8457-4656-a45c-aba54d73bc87
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.9/finding/4b1ded05-69ab-479c-9ebd-83bbbb615aae
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.6/finding/d53cdb3c-e8e7-4b73-b904-7ecbdf9f7678
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.7/finding/2b994859-fb62-4240-ac39-b839b423fb2b
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.7/finding/b51fb3bd-5d6d-4c09-8f66-2d618094508e
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.7/finding/6a4e7b9b-702f-42dc-a515-278e3764fce8
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/CloudTrail.2/finding/bce9959c-084d-4336-b296-3c068111cd46
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/CloudTrail.2/finding/5f357e15-b47d-4ee6-89ca-723ddfd1263e
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.7/finding/1a3f85a9-1dbc-445f-b27f-f79a8487e86b
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/c65673de-8092-4450-af22-6cfb8c270c5c
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/c59a6f21-f33a-4a07-b245-2c79362312d5
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/a2ef72db-148a-463d-824d-2b56f45fb683
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/9f51e2f4-cbfa-436d-bcb6-8c06ea2f8bfe
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/84d28a46-899e-4501-b1dd-006fb33f8d6c
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/7cc084b9-90d1-499d-80ed-5793b17469cd
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/24596229-8510-4e69-b00c-f406623557bd
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/0489b7d6-65c0-484e-95ba-850eabbd1453
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/9b99f7c4-153b-43fa-9a9c-32d4c664a457
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/97276589-27b4-4aa8-8f1a-a39db55290a9
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/89a8443c-7713-4777-a2dd-68967d1806c0
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/7a6ab134-4bc9-4024-93d9-533b46beff16
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/f971f542-7d8d-489b-8630-6e4f3553f206
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/f1908ca5-42c3-45a9-9aae-339acb914fcc
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/b90cc3b1-7ad8-4cac-ab68-fd1f6eb68a99
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/a3d1752a-4510-466c-9578-eb7aee8eb545
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/4bfc92cd-7b63-4624-9fb0-b8840782e3bc
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/4aca708c-6c50-4ec6-a148-fb33d40058d8
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/2b50ab29-4f04-4d88-946b-3cdea7afb60d
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/e5c47bc1-5fa5-4c98-911f-e40ce96165c2
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/d9c6f714-ae6f-41c1-bc19-bdaf2dacb745
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/ce17e7fb-5ff3-410e-b629-b20a0fe5d329
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/837f8a3c-e6f8-4a7c-b48a-182107a2a3a2
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/4bfeb0eb-3eb5-4739-923c-93bab97e47ed
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/3065b3a9-6269-419a-8d2d-05b7a8a2e05c
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/14b498db-90b9-42e4-8cf1-1d785b8a2bb1
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.7/finding/8e817510-a2b7-4e4f-a6cd-aacff5d4f351
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.1/finding/6fc908d3-8d5d-49a9-9491-124afbcaa32f
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.9/finding/c6611e98-5bf7-421d-ae43-9302ff7f769f
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EFS.2/finding/2036d372-7a77-44c9-a059-99bfe15507cc
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/Config.1/finding/1c31ad05-4acc-479b-bca1-7850f98283ca
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.5/finding/a8ca34a8-3b3d-4c3b-af15-9c425320a1e8
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/86470de2-cffd-4d46-9405-322bd934db41
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.15/finding/dcafe41e-2608-4891-aa81-04627d7a8d57
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/9891d712-ec86-4dbf-842a-7da84a11043b
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.10/finding/c005cbb5-45fb-46c4-8e39-35dbfe748f6e
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/fbf6cbe5-3c43-4ad6-9d19-8b5a4377f833
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/ce40ff0c-0850-4136-9e53-745b225f1619
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/bcd46a89-d01c-4105-84f2-5b04a2837267
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/9c5c7d02-279b-48fc-9e00-f42135643f4e
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/8980a3c8-9fbb-487e-8e5c-373463816a2b
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/457d7e14-a553-4c39-9fa0-b7c3ed37eea5
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/16341f3a-1aaf-4e29-90e0-f94f3945ca82
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.7/finding/98412a08-c512-4527-ba17-a397dbfb756b
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/ebe91f6e-32a8-48f9-9a4f-7da21467724f
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/ae2a391c-082d-413b-8344-ec799cb06e8f
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/70a43cd0-fbc8-4ecd-b4f8-0eb36292b738
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/6a87da5a-8492-4acc-aa47-580613995f0c
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/561451b9-6ea0-49a2-95bd-b317636a6cde
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/4db4c6ce-92e5-4471-a4bc-86f08cadf182
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/08553503-04c2-4dfb-bd8b-079ba10ebc4e
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.7/finding/12c63423-1d0b-4789-be02-6c57a45c48c5
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EFS.2/finding/d1feaa34-0b14-4560-91cd-9323512babce
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.9/finding/d29504b3-89e1-480c-b281-37c2f2835b50
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.6/finding/6db9c009-8755-4c3a-8f87-fd6b352de9e9
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/f810a153-3855-4d29-8cd0-373906d7d7fa
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/d558168e-924c-44c7-8caf-76e72ed4c97f
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/cfd28233-c5af-4016-8342-6531936820bc
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/b5e5d152-4687-400e-8f7d-fe32ffa23971
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/a4362f36-737b-45f2-b66d-6160dd2995f0
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/29dcb6bf-8c2a-4088-9577-bc2c95d7573e
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/10cab96e-d2cb-4572-9b24-8b2b4a33725b
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/85f96cfc-136c-455a-adb9-e26c840694bd
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/7549b81a-6461-4084-a34e-917cd02e9e13
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/6f035cdb-fb91-4c51-8791-89fe5af8d723
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/5d67d989-5625-4559-8788-b37fc51e6c73
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/49b5a969-29d9-4049-8cc3-8e78d130e479
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/3d952180-6e67-4d4f-949d-9936378dc9a8
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/17fa7431-9f60-4206-93c7-a2cceadbdd8c
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.7/finding/d8c91f9d-ac9b-4bf7-9567-c4e64a3cfc53
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.7/finding/877ac261-d62d-49bf-88e0-51cf39f0f397
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/CloudTrail.2/finding/9c1747b9-8dde-4235-8548-e7d20601bd6e
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/CloudTrail.2/finding/8c6ae7cd-61ac-4114-80b3-736cfa420e01
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.1/finding/3ae57ed6-7653-4eb1-84b5-e84fdc97eb89
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.7/finding/af2e3397-8007-43c0-a001-eb559d37cb4e
Status

In-progress

You might also like