This report performs a technical assessment of your AWS environment against the security and privacy controls defined in NIST Special Publication 800-53 Revision 5. This standard provides a comprehensive catalog of safeguards for managing information security and privacy risk across federal information systems. It is a cornerstone for U.S. government compliance requirements such as FedRAMP, FISMA, and others.
This assessment evaluates your environment against the following NIST 800-53 control families:
Covers account management, access enforcement, separation of duties, least privilege, remote access, access decisions, and information flow enforcement.
Focuses on event logging, audit content and storage, audit review and analysis, non-repudiation, audit record generation, session audit, and cross-organizational logging.
Includes control assessments, continuous monitoring, internal connections, and risk monitoring.
Covers baseline configurations, configuration change control, access restrictions, system inventory, and configuration enforcement.
Addresses contingency plans, alternate storage and processing sites, system backups, and recovery capabilities.
Focuses on user and device authentication, multi-factor authentication, password and identifier policies, and authenticator management.
Includes incident handling, response tracking, and automated response capabilities.
Covers nonlocal maintenance logging and secure maintenance processes.
Focuses on access controls for media.
Covers monitoring of physical access and physical controls.
Includes security strategy, threat awareness, protection of CUI, and continuous monitoring strategies.
Covers risk assessments, vulnerability scanning, threat hunting, and predictive analytics.
Addresses secure development practices, external services, developer configuration management, and cryptographic key control.
Covers boundary protection, denial of service protections, transmission integrity, cryptographic controls, session authenticity, and system isolation.
Includes flaw remediation, malicious code protection, system monitoring, integrity validation, alerts and advisories, and de-identification.
The assessment covers many AWS services, including IAM, CloudTrail, S3, GuardDuty, and KMS.
Upon completion, you will receive a detailed report identifying all passed and failed resources, along with actionable remediation steps to help you meet the NIST 800-53 Rev. 5 compliance requirements.