FTR

Foundational Technical Review

Assesses an AWS Partner's solution against a specific set of Amazon Web Services (AWS) best practices around security, performance, and operational processes that are most critical for customer success.
Read more

Summary: [Not available:37] | [Compliant:8] | [Need Attention:8]

Breakdown

Framework. Foundational Technical Review

CategoryRule IDCompliance StatusDescriptionReference
Partner hostedHOST-001Not available
Support levelSUP-001Need Attention
[supportPlanLowTier] - Subscribe to the AWS Business Support tier (or higher)
  • [GLOBAL]Account::Config
AWS Support Plan
Guide
Architecture reviewWAFR-001Not available
Architecture reviewWAFR-002Not available
AWS root accountARC-001Not available
AWS root accountARC-002Not available
AWS root accountARC-003Need Attention
[rootMfaActive] - Enable MFA on root user
  • [GLOBAL]User::root_id
AWS MFA
IAM Best Practices
AWS root accountARC-004Compliant
[rootHasAccessKey]
AWS root accountARC-005Not available
Communications from AWSACOM-001Need Attention
[hasAlternateContact] - Configure AWS account contacts
  • [GLOBAL]Account::Config
Alternate Contact
Communications from AWSACOM-002Not available
AWS CloudTrailCTL-001Not available
AWS CloudTrailCTL-002Not available
AWS CloudTrailCTL-003Not available
AWS CloudTrailCTL-004Not available
Identity and Access ManagementIAM-001Compliant
[mfaActive]
Identity and Access ManagementIAM-002Need Attention
[passwordLastChange90] - Rotate password
  • [GLOBAL]User::root_id
[passwordLastChange365]
[hasAccessKeyNoRotate90days] - Rotate credentials regularly
  • [GLOBAL]User::yopayment-dev-ses-user
[hasAccessKeyNoRotate365days]
Managing IAM Password
Rotate access key
Identity and Access ManagementIAM-003Compliant
[passwordPolicyWeak]
[passwordPolicy]
Identity and Access ManagementIAM-004Compliant
[noUsersFound]
Identity and Access ManagementIAM-005Not available
Identity and Access ManagementIAM-006Need Attention
[InlinePolicyFullAccessOneServ] - Limit access in policy
  • [GLOBAL]Role::AWSReservedSSO_YoPayment-AWS-Data-Pgw-Dev_5af8cd0c694d6669, Role::AWSReservedSSO_YoPayment-AWS-Developer-Pgw-Dev_c207ab9d1e5199f5, Role::AWSReservedSSO_YoPayment-AWS-Platform-Pgw-Dev_c9b162f22c1c139b, Role::YoPayment-AWS-Terraform-Pgw-Dev
[InlinePolicyFullAdminAccess]
[ManagedPolicyFullAccessOneServ] - Limit permissions.
  • [GLOBAL]Role::AWSReservedSSO_AWSOrganizationsFullAccess_159dbe7c34ff4f78, Role::AWSReservedSSO_AWSPowerUserAccess_7a9fc77c08f63f11, Role::AWSReservedSSO_YoPayment-AWS-Developer-Pgw-Dev_c207ab9d1e5199f5, Role::PyraCloudRole, Role::YoPayment-AWS-Terraform-Pgw-Dev
[FullAdminAccess] - Limit permissions.
  • [GLOBAL]Role::aws-controltower-AdministratorExecutionRole, Role::AWSControlTowerExecution, Role::AWSReservedSSO_AWSAdministratorAccess_6ad2f92126b0c1d0, Role::AWSReservedSSO_YoPayment-AWS-Admin-Pgw-Dev_999b53209cafbc21, Role::stacksets-exec-bb8cf4473e8495ef76fab8d8a00a5618
AWS Docs
AWS Docs
AWS Docs
Organization GuardRail Blog
Identity and Access ManagementIAM-007Need Attention
[consoleLastAccess90] - Validate IAM user console access
  • [GLOBAL]User::root_id
[consoleLastAccess365]
[unusedRole] - Review & remove inactive roles
  • [GLOBAL]Role::aws-controltower-AdministratorExecutionRole, Role::aws-controltower-ConfigRecorderRole, Role::aws-controltower-ReadOnlyExecutionRole, Role::AWSControlTower_VPCFlowLogsRole, Role::AWSReservedSSO_AWSAdministratorAccess_6ad2f92126b0c1d0, Role::AWSReservedSSO_AWSOrganizationsFullAccess_159dbe7c34ff4f78, Role::AWSReservedSSO_AWSPowerUserAccess_7a9fc77c08f63f11, Role::AWSReservedSSO_AWSReadOnlyAccess_52218f0875a67871, Role::AWSReservedSSO_YoPayment-AWS-Data-Pgw-Dev_5af8cd0c694d6669, Role::AWSReservedSSO_YoPayment-AWS-ViewOnly-Dev_8b8524750ae8d9c7, Role::backend-pgw-core-pgw-dev-codedeploy-role, Role::backend-pgw-ipn-processor-pgw-dev-codedeploy-role, Role::backend-v1-backoffice-pgw-dev-codedeploy-role-cmc, Role::backend-v1-epay-processor-pgw-dev-codedeploy-role-cmc, Role::backend-v1-mbbank-processor-pgw-dev-codedeploy-role-cmc, Role::backend-v1-merchant-service-pgw-dev-codedeploy-role-cmc, Role::backend-v1-momo-processor-pgw-dev-codedeploy-role-cmc, Role::backend-v1-napas-processor-pgw-dev-codedeploy-role-cmc, Role::backend-v1-payment-service-pgw-dev-codedeploy-role-cmc, Role::backend-v1-pgw-core-pgw-dev-codedeploy-role-cmc, Role::backend-v1-schedule-pgw-dev-codedeploy-role-cmc, Role::backend-v1-zalopay-processor-pgw-dev-codedeploy-role-cmc, Role::ec2-ssm-role, Role::ecs-iam-service, Role::ecsAutoscaleRole, Role::ecsEventsRole, Role::frontend-backoffice-pgw-dev-codedeploy-role, Role::frontend-gateway-core-pgw-dev-codedeploy-role, Role::pay1-wallet-debezium-connector-pgw-dev-codedeploy-role-cmc, Role::pay1-wallet-kafka-ui-pgw-dev-codedeploy-role-cmc, Role::pgw-dev-backend-v1-pgw-core-dev-codedeploy-role-cmc, Role::pgw-dev-ecs-backend-pgw-ipn-processor-task-execution-role, Role::pgw-dev-ecs-backend-pgw-ipn-processor-task-role, Role::pgw-dev-ecs-backend-v1-backoffice-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-backoffice-task-role-cmc, Role::pgw-dev-ecs-backend-v1-epay-processor-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-epay-processor-task-role-cmc, Role::pgw-dev-ecs-backend-v1-mbbank-processor-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-mbbank-processor-task-role-cmc, Role::pgw-dev-ecs-backend-v1-merchant-service-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-merchant-service-task-role-cmc, Role::pgw-dev-ecs-backend-v1-momo-processor-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-momo-processor-task-role-cmc, Role::pgw-dev-ecs-backend-v1-napas-processor-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-napas-processor-task-role-cmc, Role::pgw-dev-ecs-backend-v1-payment-service-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-payment-service-task-role-cmc, Role::pgw-dev-ecs-backend-v1-pgw-core-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-pgw-core-task-role-cmc, Role::pgw-dev-ecs-backend-v1-scheduler-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-scheduler-task-role-cmc, Role::pgw-dev-ecs-backend-v1-zalopay-processor-task-execution-role-cmc, Role::pgw-dev-ecs-backend-v1-zalopay-processor-task-role-cmc, Role::pgw-dev-ecs-frontend-backoffice-task-execution-role, Role::pgw-dev-ecs-frontend-backoffice-task-role, Role::pgw-dev-ecs-frontend-gateway-core-task-execution-role, Role::pgw-dev-ecs-frontend-gateway-core-task-role, Role::pgw-dev-keyspaces-role, Role::pgw-dev-msk-connector-archiver-sink-connector-s3-role, Role::pipeline-cross-account, Role::SecretsManagerRDSPostgreS-SecretsManagerRDSPostgreS-EmjcCJ2iYcSd, Role::stacksets-exec-bb8cf4473e8495ef76fab8d8a00a5618
Finds unused credentials
AWS Blog
Identity and Access ManagementIAM-008Not available
Identity and Access ManagementIAM-009Not available
Identity and Access ManagementIAM-010Not available
Identity and Access ManagementIAM-011Not available
Identity and Access ManagementIAM-012Compliant
[mfaActive]
[EC2IamProfile]
Operational securitySECOPS-001Not available
Network securityNETSEC-001Compliant
[SGDefaultInUsed]
[SGSensitivePortOpenToAll]
[SGAllOpenToAll]
[SGAllOpen]
Network securityNETSEC-002Not available
Backups and recoveryBAR-001Need Attention
[EBSSnapshot] - Enable EBS Snapshot
  • [ap-southeast-1]EBS::vol-04d74d0b594581dea
[Backup]
[BackupTooLow]
[backupStatus]
[enabledContinuousBackup]
Best practices for Amazon EC2
Backups and recoveryBAR-002Not available
ResiliencyRES-001Not available
ResiliencyRES-002Not available
ResiliencyRES-003Not available
ResiliencyRES-004Not available
ResiliencyRES-005Not available
ResiliencyRES-006Not available
ResiliencyRES-007Not available
Amazon S3 bucket accessS3-001Not available
Amazon S3 bucket accessS3-002Compliant
[PublicAccessBlock]
[S3AccountPublicAccessBlock]
Amazon S3 bucket accessS3-003Not available
Cross-account accessCAA-001Not available
Cross-account accessCAA-002Not available
Cross-account accessCAA-003Not available
Cross-account accessCAA-004Not available
Cross-account accessCAA-005Not available
Cross-account accessCAA-006Not available
Cross-account accessCAA-007Not available
Sensitive dataSDAT-001Not available
Sensitive dataSDAT-002Compliant
[EBSEncrypted]
[ServerSideEncrypted]
[StorageEncrypted]
Sensitive dataSDAT-003Need Attention
[SGEncryptionInTransit] - Encryption in Transit
  • [ap-southeast-1]SG::sg-0251261a4780396ef, SG::sg-0af4192d63016f4c6, SG::sg-084f2463febd93807
  • [us-east-1]SG::sg-03ec10c6bdf83dac6
[TlsEnforced] - Enforce Encryption of Data in Transit
  • [ap-southeast-1]Bucket::262130478988-pgw-dev-tf-state, Bucket::archiver-system.dev.sg.pgw, Bucket::images-upload.dev.sg.pgw, Bucket::images-upload.dev.sgp-pay1-wallet, Bucket::logs.dev.sg.pgw, Bucket::payment-gateway-dev-tf-state, Bucket::pgw-config.dev.sg.pgw
Data protection in Amazon EC2
AWS Docs
Regulatory compliance validation processRCVP-001Not available