This rule ensures that security contact information is properly registered for compliance.
Rule | Ensure security contact information is registered |
Framework | cis_v140 |
Severity | ✔ Medium |
Ensure Security Contact Information is Registered for CIS v1.4.0
Overview
The CIS (Center for Internet Security) v1.4.0 standard recommends that all cloud accounts have a registered security contact. This ensures that if there’s a security issue or if the cloud provider needs to communicate urgently with the account owner, they can do so promptly. Keeping the security contact information up-to-date is crucial for the rapid response to any potential security incidents.
Rule Details
Description
Troubleshooting Steps
Necessary Steps and Codes
Azure
Checking Security Contact
Security Center
.Security Policy
.Contact Details
.Updating Security Contact
# Log in to Azure CLI az login # Set the subscription context az account set --subscription "your_subscription_id" # Update the security contact az security contact create --name default --email "security_contact@email.com" --phone "phone_number" --alert-notifications on --alerts-admins on
Verification
# Verify the security contact az security contact list
AWS
Checking Security Contact
AWS Security Hub
.Settings
.Security Contacts
.Updating Security Contact
# Use the AWS Command Line Interface # Get the current contacts aws securityhub describe-hub # Update the contact aws securityhub update-hub --input '{"Contacts": [{"Email": "security_contact@email.com", "PhoneNumber": "phone_number"}]}'
Verification
# Verify the updates have taken effect aws securityhub describe-hub
GCP
Checking Security Contact
IAM & Admin
.Settings
.Updating Security Contact
# Use Google Cloud CLI (gcloud) # Update the security contact email gcloud beta security settings contacts create "security_contact@email.com" --security-contact-email
Verification
# Verify the contact has been updated gcloud beta security settings contacts list
Step by Step Guide for Remediation
General Steps
Specific Commands
For specific CLI commands, refer to the sections above for AWS, Azure, and GCP.
Implementing this rule will help fortify your cloud environment's security posture and ensure compliance with CIS benchmarks. Properly following these guidelines will demonstrate to customers and stakeholders your commitment to security, potentially improving your SEO as users search for reliable and secure service providers. Remember that maintaining clear, concise, and up-to-date online procedures can significantly boost your visibility and credibility in an increasingly security-conscious digital landscape.