Auto Checks: AWS
Feature Overview
Auto Checks for AWS enable automated detection of misconfigurations in your AWS cloud environment โ mapped to ISO 27001:2022 controls and curated with auditor input. It helps your organization continuously validate compliance posture across key services like IAM, CloudTrail and Access Analyzer.
How It Works
How to activate Auto Checks for AWS in Kertos?
Steps to enable Auto Checks for AWS:
- Go to Integrations Page
- Click Setup on the AWS Integration card
- Click Reconfigure
- Toggle Auto Checks ON
- Click Save
- Start a discovery run by clicking Start Scan
Once completed, relevant Auto Checks for the AWS services in use will be linked automatically to controls and implementation steps.
What Are the AWS Auto Checks Based On?
The AWS Auto Checks are based on the CIS Amazon Web Services Foundations Benchmark v5.0.0 - 03-31-2025. This Benchmark is an industry-standard security guideline developed by the Center for Internet Security, which defines best-practice configurations to reduce risk in cloud environments.
In close collaboration with auditors we curated a selection of the most relevant auto checks for compliance and security, and aligned them with ISO 27001:2022 controls to provide clear audit evidence and actionable remediation guidance.
Which Auto Checks are available for AWS, and how are they mapped to ISO 27001:2022 controls?
Each Auto Check is mapped to a specific ISO 27001:2022 control, helping to demonstrate technical implementation of key requirements. Below is the full list of our supported AWS Auto Checks and their control mappings:
ISO Control ID | ISO Control Title | Auto Check Title |
---|---|---|
A.5.15 | Access Control | Ensure custom IAM policies do not allow overly permissive role assumption |
A.5.15 | Access Control | Protect IAM service roles from confused deputy attacks using proper trust policies |
A.5.17 | Authentication information | Avoid provisioning access keys during initial IAM user creation when console login is enabled |
A.5.17 | Authentication information | Detect IAM users with multiple active access keys and enforce key rotation |
A.5.18 | Access Rights | Confirm IAM Access Analyzer is enabled to monitor access permissions |
A.5.24 | Information security incident management planning and preparation | Maintain accurate and up-to-date AWS account contact information |
A.5.24 | Information security incident management planning and preparation | Register a valid security contact in the AWS account settings |
A.8.2 | Privileged access rights | Ensure no IAM AWS-managed policies grant full administrative access |
A.8.2 | Privileged access rights | Ensure customer-managed IAM policies do not grant full administrative access |
A.8.2 | Privileged access rights | Prevent IAM identities from having inline policies with unrestricted access |
A.8.2 | Privileged access rights | Block IAM inline policies that enable privilege escalation |
A.8.2 | Privileged access rights | Prevent creation of IAM inline policies with full CloudTrail access |
A.8.2 | Privileged access rights | Prevent creation of IAM inline policies with full KMS access |
A.8.2 | Privileged access rights | Block customer-managed IAM policies that could lead to privilege escalation |
A.8.2 | Privileged access rights | Avoid IAM policies granting unrestricted CloudTrail access |
A.8.2 | Privileged access rights | Avoid IAM policies granting unrestricted KMS access |
A.8.2 | Privileged access rights | Prevent IAM roles from assigning ReadOnlyAccess permissions to external AWS accounts |
A.8.3 | Information access restriction | Prevent IAM roles from assigning ReadOnlyAccess permissions to external AWS accounts |
A.8.5 | Secure authentification | Enforce MFA for the AWS root account |
A.8.5 | Secure authentification | Ensure the root account does not have any active access keys |
A.8.15 | Logging | Verify CloudTrail is logging management events across all AWS regions |
A.8.15 | Logging | Configure a log metric filter and alarm for unauthorized API calls |
A.8.16 | Monitoring activities | Confirm that Amazon GuardDuty is enabled for threat detection |
A.8.16 | Monitoring activities | Configure a log metric filter and alarm for root account usage |
FAQs
Do I need to modify anything in AWS to activate Auto Checks?
No. If your integration is already configured with the right permissions, just enable Auto Checks in Kertos.
What AWS services are currently supported?
We currently support Auto Checks for the following AWS services:
- IAM
- CloudTrail
- CloudWatch
- GuardDuty
- Access Analyzer
Can I disable Auto Checks for AWS?
Yes. Go to the AWS integration in Kertos, click Reconfigure, and toggle Auto Checks off.