chore: remove check from some compliance requirements

This commit is contained in:
Daniel Barranquero
2026-04-06 17:43:05 +02:00
parent 7972d61fd8
commit 0051a75919
4 changed files with 0 additions and 4 deletions

View File

@@ -317,7 +317,6 @@
}
],
"Checks": [
"bedrock_full_access_policy_attached",
"iam_rotate_access_key_90_days",
"iam_user_accesskey_unused",
"iam_user_with_temporary_credentials",

View File

@@ -3206,7 +3206,6 @@
}
],
"Checks": [
"bedrock_full_access_policy_attached",
"iam_policy_attached_only_to_group_or_roles",
"iam_securityaudit_role_created",
"iam_support_role_created"

View File

@@ -160,7 +160,6 @@
"Description": "Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, network devices, and remote desktop.[1] Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence.",
"TechniqueURL": "https://attack.mitre.org/techniques/T1078/",
"Checks": [
"bedrock_full_access_policy_attached",
"guardduty_is_enabled",
"config_recorder_all_regions_enabled",
"iam_administrator_access_with_mfa",

View File

@@ -1754,7 +1754,6 @@
"Id": "11.3.1",
"Description": "The relevant entities shall maintain policies for management of privileged accounts and system administration accounts as part of the access control policy referred to in point 11.1.",
"Checks": [
"bedrock_full_access_policy_attached",
"iam_role_administratoraccess_policy"
],
"Attributes": [