Using Additional Application Security Practices

Information

While security governance is important for all organizations, it is a best practice to enforce security policies. Wherever possible, configure your system security parameters to comply with your security policies and guidelines to prevent misuse.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure all services with security best practices in mind. Enable security features for any required services, protocols, or daemons. Choose services such as SSH, which have built-in security mechanisms for user/peer authentication, encryption and data integrity authentication, over less secure equivalents such as Telnet.

See Also

https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

Item Details

Category: PROGRAM MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|PM-1, 800-53|PM-2, 800-53|PM-3, 800-53|PM-4, 800-53|PM-5, 800-53|PM-6, 800-53|PM-7, 800-53|PM-8, 800-53|PM-9, 800-53|PM-10, 800-53|PM-11, 800-53|SC-7

Plugin: amazon_aws

Control ID: 0cb0665d75503977696cc63b3695f3359c41899153664694bad4eaccb6471962