We are pleased to announce the general availability of the CloudHealth CIS AWS Foundations Security Policy. You can see your security risk exposure and violations in the Security Violation Report, as well as the policy engine.
The following CIS policies have recently been added:
Avoid the use of the "root" account
Ensure MFA is enabled for the "root" account
Ensure hardware MFA is enabled for the "root" account
Ensure IAM policies are attached only to groups or roles
Ensure a support role has been created to manage incidents with AWS Support
Do not setup access keys during initial user setup for all IAM users that have a console Password
Ensure IAM policies that allow full "*:*" administrative privileges are not created
Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible
Ensure AWS Config is enabled in all regions
Ensure rotation for customer created CMKs is enabled
Ensure VPC flow logging is enabled in all VPCs
Ensure a log metric filter and alarm exist for unauthorized API calls
Ensure a log metric filter and alarm exist for Management Console sign-in without MFA
Ensure a log metric filter and alarm exist for usage of "root" account
Ensure a log metric filter and alarm exist for IAM policy changes
Ensure a log metric filter and alarm exist for CloudTrail configuration changes
Ensure a log metric filter and alarm exist for AWS Management Console authentication failures
Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs
Ensure a log metric filter and alarm exist for S3 bucket policy changes
Ensure a log metric filter and alarm exist for AWS Config configuration changes
Ensure a log metric filter and alarm exist for security group changes
Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)
Ensure a log metric filter and alarm exist for changes to network gateways
Ensure a log metric filter and alarm exist for route table changes
Ensure a log metric filter and alarm exist for VPC changes
Ensure no security groups allow ingress from 0.0.0.0/0 to port 22
Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389
Ensure the default security group of every VPC restricts all traffic
These policies are enabled by default for all customers. Learn more about the CloudHealth CIS AWS Foundations Security Policy in this Help Center article.
A few weeks ago, we announced the new asset metadata collection that began in an effort to support the CloudHealth CIS Azure Foundations Security Policy. We are continuing to add support for additional Azure services and are excited to announce that we are now collecting Azure Active Directory Users.
In order to successfully collect the required metadata in CloudHealth, we will need you to add the reader role to your Service Principal for Azure Active Directory. To do so, please follow the steps outlined in this Help Center article.
In the near future, we will be adding support for Billing Accounts. Moving forward, you will not be able to configure projects within CloudHealth. You will need to configure your Billing Accounts in CloudHealth and all projects will then be derived. For existing customers, no action is required. CloudHealth will be creating a Billing Account automatically for each Master Project configured. During this transition, the Billing Statements Report may be temporarily blank for up to 12 hours as we regenerate billing statements for each Billing Account.
Google Cloud Platform provides two ways to export your billing data. Currently, CloudHealth supports billing data via CSV exports only. Over the coming months we plan to add support for BigQuery billing exports as well. You will get a richer data set and your billing history will start from the day BigQuery is turned on. BigQuery provides more granular details and is refreshed every 4 hours. We plan to use these details to get more accurate and detailed costs. Please note, adding BigQuery exports will only increase your spend by a few cents every month. For example, a BigQuery Table with 10GB of storage, 1GB of streaming inserts and 1TB of queries will cost $0.25 per month ($3 per year).
To learn how to enable billing export to BigQuery, view this Google Cloud article.
As previously announced, we have developed a more comprehensive approach for extracting asset attributes from bills to allocate costs for AWS services using AWS and CloudHealth tags.
We have updated costs for the following services:
Amazon Gamelift
Amazon Kinesis Analytics
Amazon Lex
Amazon MQ
Amazon Pinpoint
Amazon Route53 Traffic Policies
Amazon Simple Email Service
AWS Elemental MediaLive
AWS Elemental MediaStore
AWS Greengrass
AWS OpsWorks
AWS Shield
AWS Snowball
AWS Web Application Firewall
Previously, the costs for these services were included as indirect costs. Going forward, costs associated with the services mentioned above will be distributed into the following direct charges:
Elemental MediaLive - Input
Elemental MediaLive - Output
Elemental MediaLive - Data Transfer
Elemental MediaStore - API Request
Elemental MediaStore - Data Transfer
Elemental MediaStore - Storage
GameLift - Data Transfer
Greengrass - Active Device
Kinesis Analytics - KPU Hour
Lex - Request
MQ - Broker Instance
OpsWorks - Node Hour
Pinpoint - Messages Sent
Route 53 - Traffic Flow
Shield - Subscription
Shield - Load Balancing
Shield - Elastic IP
Shield - CloudFront
Simple Email Service - Dedicated IP
Snowball - Data Transfer
Snowball - Extra Day Charge
Snowball - Service Fee
WAF - WebACL
WAF - Rule
WAF - Request
Elemental MediaLive - Input
Elemental MediaLive - Output
Elemental MediaLive - Other
Elemental MediaStore - Other
GameLift - Instance
GameLift - Other
Greengrass - Other
Kinesis Analytics - Other
Lex - Other
MQ - Other
OpsWorks - Other
Pinpoint - Events Collected
Pinpoint - Other
Shield - Other
Simple Email Service - Dedicated IP
Simple Email Service - Data Transfer
Simple Email Service - Email Message
Simple Email Service - Incoming Mail Chunks
Simple Email Service - Other
Snowball - Extra Day Charge
Snowball - Import/Export
Snowball - Other
WAF - WebACL
WAF - Rule
WAF - Request
WAF - Other
For the services mentioned above, we will be using CloudHealth tags and Resource IDs for cost and asset allocation because these services cannot have AWS tags. This allocation will be applicable to the past 13 months. We recommend that you update your reallocation rules for any ‘<Service> - Other’ indirect charges.
AWS recently announced the latest additions to the EC2 Instance family tree: A1 & C5n instance types. These instance types are now supported across the platform including cost and usage reports, RI recommendations, amortization, Perspectives, rightsizing, and policies.
You can now create a policy to identify unattached Compute Disks within your Google Cloud environment.