Configuration Summary
ID | aws-s3-bucket |
Provider | aws |
Name | CCC AWS S3 Bucket Terraform Module |
Description | This module creates secure AWS S3 buckets with encryption, versioning, lifecycle management, and advanced security features. |
Service | storage |
Path | remote/aws/s3bucket |
GitHub Link | View GitHub Repository |
Terraform Files | View Terraform Files |
Repository Information
Repository Name | cfi-s3-module |
Description | Various CFI artifacts for AI, Object Storage, VPN, Databases etc. |
Repository URL | https://github.com/robmoffat/cfi-s3-module |
Downloaded At | October 7, 2025 at 07:54 AM |
Workflow Status | successRun #18279299317 |
Test Summary
Aggregate summary of all tests in this configuration
Resources In Configuration | 10 |
Count of Tests | 40 |
Passing Tests | 19 |
Failing Tests | 21 |
Catalogs Tested |
Control Catalog Summary
Summary of test results grouped by control catalog and resource
Control Catalog | Resources | Total Tests | Passing | Failing | Tested Requirements | Missing Requirements |
---|---|---|---|---|---|---|
CCC.ObjStor | 06e4e2ba-d746-4961-a...2112034953943ebf1622-2c1f-4429-9...<root_account>cloudfront-logs-well...d1b7f965-bf16-4960-9...d2d3259d-bfff-4848-8...logs-well-mooses3-bucket-well-moosesimple-well-moose | 40 | 19 | 21 | CCC.Core.C01.TR01CCC.Core.C01.TR02CCC.Core.C01.TR03CCC.Core.C01.TR07CCC.Core.C01.TR08CCC.Core.C02.TR01CCC.Core.C03.TR01CCC.Core.C03.TR02CCC.Core.C03.TR03CCC.Core.C03.TR04CCC.Core.C04.TR01CCC.Core.C04.TR02CCC.Core.C04.TR03CCC.Core.C05.TR01CCC.Core.C05.TR02CCC.Core.C05.TR03CCC.Core.C05.TR04CCC.Core.C05.TR05CCC.Core.C05.TR06CCC.Core.C06.TR01CCC.Core.C06.TR02CCC.Core.C07.TR01CCC.Core.C07.TR02CCC.Core.C09.TR01CCC.Core.C09.TR02CCC.Core.C09.TR03CCC.Core.C10.TR01CCC.ObjStor.C04.TR02 |
Test Mapping Summary
Summary of test mappings showing how event codes map to test requirements
Control Catalog | Test Requirement ID | Mapped Tests (Event Code | Total | Passing | Failing) |
---|---|---|
CCC.ObjStor | CCC.ObjStor.C01.TR01 | kms_key_not_publicly_accessible 110 s3_bucket_kms_encryption 413 |
CCC.ObjStor | CCC.ObjStor.C01.TR02 | kms_cmk_not_deleted_unintentionally 413 kms_key_not_publicly_accessible 110 |
CCC.ObjStor | CCC.ObjStor.C01.TR03 | kms_cmk_not_deleted_unintentionally 413 kms_key_not_publicly_accessible 110 s3_bucket_kms_encryption 413 |
CCC.ObjStor | CCC.ObjStor.C01.TR04 | kms_cmk_not_deleted_unintentionally 413 kms_cmk_not_multi_region 110 kms_key_not_publicly_accessible 110 |
CCC.ObjStor | CCC.ObjStor.C02.TR01 | s3_bucket_public_write_acl 440 |
CCC.ObjStor | CCC.ObjStor.C02.TR02 | s3_bucket_acl_prohibited 422 s3_bucket_public_access 440 s3_bucket_public_write_acl 440 |
CCC.ObjStor | CCC.ObjStor.C03.TR01 | s3_bucket_lifecycle_enabled 413 s3_bucket_object_lock 413 s3_bucket_object_versioning 413 |
CCC.ObjStor | CCC.ObjStor.C03.TR02 | s3_bucket_lifecycle_enabled 413 s3_bucket_object_versioning 413 |
CCC.ObjStor | CCC.ObjStor.C04.TR01 | s3_bucket_object_lock 413 s3_bucket_object_versioning 413 |
CCC.ObjStor | CCC.ObjStor.C05.TR01 | s3_bucket_object_lock 413 s3_bucket_object_versioning 413 |
CCC.ObjStor | CCC.ObjStor.C05.TR02 | iam_rotate_access_key_90_days 110 s3_bucket_object_lock 413 s3_bucket_object_versioning 413 |
CCC.ObjStor | CCC.ObjStor.C05.TR03 | s3_bucket_object_versioning 413 |
CCC.ObjStor | CCC.ObjStor.C05.TR04 | kms_cmk_not_deleted_unintentionally 413 s3_bucket_object_versioning 413 |
CCC.ObjStor | CCC.ObjStor.C06.TR01 | cloudtrail_s3_dataevents_read_enabled 101 s3_bucket_server_access_logging_enabled 413 |
Resource Summary
Summary of all resources mentioned in OCSF results
Resource Name | Resource Type | Control Catalogs | Total Tests | Passing | Failing |
---|---|---|---|---|---|
<root_account> | AwsIamUser | No CCC catalogs | 5 | 3 | 2 |
<root_account> | AwsIamAccessKey | 3 | 3 | 0 | |
06e4e2ba-d746-4961-a0c3-8b3970228960 | AwsKmsKey | 2 | 1 | 1 | |
211203495394 | AwsAccount | No CCC catalogs | 5 | 1 | 1 |
211203495394 | AwsBackupBackupVault | No CCC catalogs | 1 | 0 | 1 |
211203495394 | AwsCloudTrailTrail | 36 | 0 | 36 | |
211203495394 | AwsCloudWatchAlarm | No CCC catalogs | 15 | 0 | 15 |
211203495394 | Other | No CCC catalogs | 30 | 0 | 29 |
211203495394 | AwsIamPolicy | No CCC catalogs | 1 | 1 | 0 |
211203495394 | AwsIamRole | No CCC catalogs | 1 | 0 | 1 |
211203495394 | AwsS3AccountPublicAccessBlock | No CCC catalogs | 1 | 0 | 1 |
211203495394 | AwsEc2Vpc | No CCC catalogs | 1 | 0 | 1 |
3ebf1622-2c1f-4429-9607-9f07906793ad | AwsKmsKey | 2 | 1 | 1 | |
AdministratorAccess | AwsIamPolicy | No CCC catalogs | 1 | 0 | 1 |
analyzer/unknown | Other | No CCC catalogs | 17 | 0 | 17 |
AWSSupportServiceRolePolicy | AwsIamPolicy | No CCC catalogs | 1 | 1 | 0 |
AWSTrustedAdvisorServiceRolePolicy | AwsIamPolicy | No CCC catalogs | 1 | 1 | 0 |
cloudfront-logs-well-moose | AwsS3Bucket | 17 | 7 | 10 | |
d1b7f965-bf16-4960-93e3-c6326c53f1f2 | AwsKmsKey | 5 | 4 | 1 | |
d2d3259d-bfff-4848-8bc7-d81169f2ed74 | AwsKmsKey | 2 | 1 | 1 | |
default | AwsEventsEventbus | No CCC catalogs | 34 | 34 | 0 |
logs-well-moose | AwsS3Bucket | 17 | 8 | 9 | |
model-invocation-logging | Other | No CCC catalogs | 16 | 0 | 16 |
s3-bucket-well-moose | AwsS3Bucket | 17 | 13 | 4 | |
SecurityAudit | AwsIamRole | No CCC catalogs | 1 | 0 | 1 |
sg-008944225f228fd81 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-014e009f46ee13b45 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-01923ef90e2de7133 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-029960885501a0b75 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0327baf3109c76bd6 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-03318d6619212b0ba | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-03a7045e3785df7ff | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-066f794ff1205057d | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-099c221d7926804bb | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0b3de880562ea3eb7 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0c66948cc6f6dcdda | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0d76d3e4b114d9607 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0df0417b64dd9e39e | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0e59948ea67ec4573 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0e6674385e3c02b58 | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0ec663ac32427bceb | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
sg-0f7d37ac7dc72736c | AwsEc2SecurityGroup | No CCC catalogs | 2 | 2 | 0 |
simple-well-moose | AwsS3Bucket | 17 | 8 | 9 | |
terraform-20251006112730373600000001 | AwsIamRole | No CCC catalogs | 1 | 0 | 1 |
TerraformRole | AwsIamRole | No CCC catalogs | 2 | 1 | 1 |
unknown | Other | No CCC catalogs | 4 | 0 | 4 |
vpce-svc-028691921eaeee579 | AwsEc2VpcEndpointService | No CCC catalogs | 1 | 1 | 0 |
vpce-svc-02e288a4c6043110f | AwsEc2VpcEndpointService | No CCC catalogs | 1 | 1 | 0 |
Test Results
OCSF test results filtered for entries with CCC compliance mappings
Status | Finding | Resource Name | Resource Type | Message | Test Requirements |
---|---|---|---|---|---|
FAIL | Check if S3 buckets have Object-level logging for read events is enabled in CloudTrail. No CloudTrail trails have a data event to record all S3 object-level API operations. | 211203495394 | AwsCloudTrailTrail | No CloudTrail trails have a data event to record all S3 object-level API operations. | |
PASS | Ensure access keys are rotated every 90 days or less User <root_account> does not have access keys. | <root_account> | AwsIamAccessKey | User <root_account> does not have access keys. | |
FAIL | AWS KMS keys should not be deleted unintentionally KMS CMK 06e4e2ba-d746-4961-a0c3-8b3970228960 is scheduled for deletion, revert it if it was unintentionally. | 06e4e2ba-d746-4961-a0c3-8b3970228960 | AwsKmsKey | KMS CMK 06e4e2ba-d746-4961-a0c3-8b3970228960 is scheduled for deletion, revert it if it was unintentionally. | |
FAIL | AWS KMS keys should not be deleted unintentionally KMS CMK 3ebf1622-2c1f-4429-9607-9f07906793ad is scheduled for deletion, revert it if it was unintentionally. | 3ebf1622-2c1f-4429-9607-9f07906793ad | AwsKmsKey | KMS CMK 3ebf1622-2c1f-4429-9607-9f07906793ad is scheduled for deletion, revert it if it was unintentionally. | |
PASS | AWS KMS keys should not be deleted unintentionally KMS CMK d1b7f965-bf16-4960-93e3-c6326c53f1f2 is not scheduled for deletion. | d1b7f965-bf16-4960-93e3-c6326c53f1f2 | AwsKmsKey | KMS CMK d1b7f965-bf16-4960-93e3-c6326c53f1f2 is not scheduled for deletion. | |
FAIL | AWS KMS keys should not be deleted unintentionally KMS CMK d2d3259d-bfff-4848-8bc7-d81169f2ed74 is scheduled for deletion, revert it if it was unintentionally. | d2d3259d-bfff-4848-8bc7-d81169f2ed74 | AwsKmsKey | KMS CMK d2d3259d-bfff-4848-8bc7-d81169f2ed74 is scheduled for deletion, revert it if it was unintentionally. | |
PASS | AWS KMS customer managed keys should not be multi-Region KMS CMK d1b7f965-bf16-4960-93e3-c6326c53f1f2 is a single-region key. | d1b7f965-bf16-4960-93e3-c6326c53f1f2 | AwsKmsKey | KMS CMK d1b7f965-bf16-4960-93e3-c6326c53f1f2 is a single-region key. | |
PASS | Check exposed KMS keys KMS key d1b7f965-bf16-4960-93e3-c6326c53f1f2 is not exposed to Public. | d1b7f965-bf16-4960-93e3-c6326c53f1f2 | AwsKmsKey | KMS key d1b7f965-bf16-4960-93e3-c6326c53f1f2 is not exposed to Public. | |
FAIL | Check if S3 buckets have ACLs enabled S3 Bucket cloudfront-logs-well-moose has bucket ACLs enabled. | cloudfront-logs-well-moose | AwsS3Bucket | S3 Bucket cloudfront-logs-well-moose has bucket ACLs enabled. | |
PASS | Check if S3 buckets have ACLs enabled S3 Bucket logs-well-moose has bucket ACLs disabled. | logs-well-moose | AwsS3Bucket | S3 Bucket logs-well-moose has bucket ACLs disabled. | |
FAIL | Check if S3 buckets have ACLs enabled S3 Bucket s3-bucket-well-moose has bucket ACLs enabled. | s3-bucket-well-moose | AwsS3Bucket | S3 Bucket s3-bucket-well-moose has bucket ACLs enabled. | |
PASS | Check if S3 buckets have ACLs enabled S3 Bucket simple-well-moose has bucket ACLs disabled. | simple-well-moose | AwsS3Bucket | S3 Bucket simple-well-moose has bucket ACLs disabled. | |
FAIL | Check if S3 buckets have KMS encryption enabled. Server Side Encryption is not configured with kms for S3 Bucket cloudfront-logs-well-moose. | cloudfront-logs-well-moose | AwsS3Bucket | Server Side Encryption is not configured with kms for S3 Bucket cloudfront-logs-well-moose. | |
FAIL | Check if S3 buckets have KMS encryption enabled. Server Side Encryption is not configured with kms for S3 Bucket logs-well-moose. | logs-well-moose | AwsS3Bucket | Server Side Encryption is not configured with kms for S3 Bucket logs-well-moose. | |
PASS | Check if S3 buckets have KMS encryption enabled. S3 Bucket s3-bucket-well-moose has Server Side Encryption with aws:kms. | s3-bucket-well-moose | AwsS3Bucket | S3 Bucket s3-bucket-well-moose has Server Side Encryption with aws:kms. | |
FAIL | Check if S3 buckets have KMS encryption enabled. Server Side Encryption is not configured with kms for S3 Bucket simple-well-moose. | simple-well-moose | AwsS3Bucket | Server Side Encryption is not configured with kms for S3 Bucket simple-well-moose. | |
FAIL | Check if S3 buckets have a Lifecycle configuration enabled S3 Bucket cloudfront-logs-well-moose does not have a lifecycle configuration enabled. | cloudfront-logs-well-moose | AwsS3Bucket | S3 Bucket cloudfront-logs-well-moose does not have a lifecycle configuration enabled. | |
FAIL | Check if S3 buckets have a Lifecycle configuration enabled S3 Bucket logs-well-moose does not have a lifecycle configuration enabled. | logs-well-moose | AwsS3Bucket | S3 Bucket logs-well-moose does not have a lifecycle configuration enabled. | |
PASS | Check if S3 buckets have a Lifecycle configuration enabled S3 Bucket s3-bucket-well-moose has a lifecycle configuration enabled. | s3-bucket-well-moose | AwsS3Bucket | S3 Bucket s3-bucket-well-moose has a lifecycle configuration enabled. | |
FAIL | Check if S3 buckets have a Lifecycle configuration enabled S3 Bucket simple-well-moose does not have a lifecycle configuration enabled. | simple-well-moose | AwsS3Bucket | S3 Bucket simple-well-moose does not have a lifecycle configuration enabled. | |
FAIL | Check if S3 buckets have object lock enabled S3 Bucket cloudfront-logs-well-moose has Object Lock disabled. | cloudfront-logs-well-moose | AwsS3Bucket | S3 Bucket cloudfront-logs-well-moose has Object Lock disabled. | |
FAIL | Check if S3 buckets have object lock enabled S3 Bucket logs-well-moose has Object Lock disabled. | logs-well-moose | AwsS3Bucket | S3 Bucket logs-well-moose has Object Lock disabled. | |
PASS | Check if S3 buckets have object lock enabled S3 Bucket s3-bucket-well-moose has Object Lock enabled. | s3-bucket-well-moose | AwsS3Bucket | S3 Bucket s3-bucket-well-moose has Object Lock enabled. | |
FAIL | Check if S3 buckets have object lock enabled S3 Bucket simple-well-moose has Object Lock disabled. | simple-well-moose | AwsS3Bucket | S3 Bucket simple-well-moose has Object Lock disabled. | |
FAIL | Check if S3 buckets have object versioning enabled S3 Bucket cloudfront-logs-well-moose has versioning disabled. | cloudfront-logs-well-moose | AwsS3Bucket | S3 Bucket cloudfront-logs-well-moose has versioning disabled. | |
FAIL | Check if S3 buckets have object versioning enabled S3 Bucket logs-well-moose has versioning disabled. | logs-well-moose | AwsS3Bucket | S3 Bucket logs-well-moose has versioning disabled. | |
PASS | Check if S3 buckets have object versioning enabled S3 Bucket s3-bucket-well-moose has versioning enabled. | s3-bucket-well-moose | AwsS3Bucket | S3 Bucket s3-bucket-well-moose has versioning enabled. | |
FAIL | Check if S3 buckets have object versioning enabled S3 Bucket simple-well-moose has versioning disabled. | simple-well-moose | AwsS3Bucket | S3 Bucket simple-well-moose has versioning disabled. | |
PASS | Ensure there are no S3 buckets open to Everyone or Any AWS user. S3 Bucket cloudfront-logs-well-moose is not public. | cloudfront-logs-well-moose | AwsS3Bucket | S3 Bucket cloudfront-logs-well-moose is not public. | |
PASS | Ensure there are no S3 buckets open to Everyone or Any AWS user. S3 Bucket logs-well-moose is not public. | logs-well-moose | AwsS3Bucket | S3 Bucket logs-well-moose is not public. | |
PASS | Ensure there are no S3 buckets open to Everyone or Any AWS user. S3 Bucket s3-bucket-well-moose is not public. | s3-bucket-well-moose | AwsS3Bucket | S3 Bucket s3-bucket-well-moose is not public. | |
PASS | Ensure there are no S3 buckets open to Everyone or Any AWS user. S3 Bucket simple-well-moose is not public. | simple-well-moose | AwsS3Bucket | S3 Bucket simple-well-moose is not public. | |
PASS | Ensure there are no S3 buckets writable by Everyone or Any AWS customer. S3 Bucket cloudfront-logs-well-moose is not publicly writable. | cloudfront-logs-well-moose | AwsS3Bucket | S3 Bucket cloudfront-logs-well-moose is not publicly writable. | |
PASS | Ensure there are no S3 buckets writable by Everyone or Any AWS customer. S3 Bucket logs-well-moose is not publicly writable. | logs-well-moose | AwsS3Bucket | S3 Bucket logs-well-moose is not publicly writable. | |
PASS | Ensure there are no S3 buckets writable by Everyone or Any AWS customer. S3 Bucket s3-bucket-well-moose is not publicly writable. | s3-bucket-well-moose | AwsS3Bucket | S3 Bucket s3-bucket-well-moose is not publicly writable. | |
PASS | Ensure there are no S3 buckets writable by Everyone or Any AWS customer. S3 Bucket simple-well-moose is not publicly writable. | simple-well-moose | AwsS3Bucket | S3 Bucket simple-well-moose is not publicly writable. | |
FAIL | Check if S3 buckets have server access logging enabled S3 Bucket cloudfront-logs-well-moose has server access logging disabled. | cloudfront-logs-well-moose | AwsS3Bucket | S3 Bucket cloudfront-logs-well-moose has server access logging disabled. | |
FAIL | Check if S3 buckets have server access logging enabled S3 Bucket logs-well-moose has server access logging disabled. | logs-well-moose | AwsS3Bucket | S3 Bucket logs-well-moose has server access logging disabled. | |
PASS | Check if S3 buckets have server access logging enabled S3 Bucket s3-bucket-well-moose has server access logging enabled. | s3-bucket-well-moose | AwsS3Bucket | S3 Bucket s3-bucket-well-moose has server access logging enabled. | |
FAIL | Check if S3 buckets have server access logging enabled S3 Bucket simple-well-moose has server access logging disabled. | simple-well-moose | AwsS3Bucket | S3 Bucket simple-well-moose has server access logging disabled. |