Region Date Title
11/25/2021 aws-cloudtrail-logs-735206531520-dff111fc
11/25/2021 aws-cloudtrail-logs-735206531520-f3a08337
11/25/2021 sagemaker-studio-735206531520-g6hjzpv41l
11/25/2021 rawdataroomtype
us-west-2
11/25/2021 mydinhlog - Done
11/25/2021 aws-cloudtrail-logs-735206531520-8fb035d0
11/25/2021 aws-cloudtrail-logs-735206531520-2c115c81
11/29/2021 4.3 Ensure the default security group of every VPC restricts all traffic
EC2.2 The VPC default security group should not allow inbound and
11/29/2021 outbound traffic
11/25/2021 sagemaker-ap-northeast-1-735206531520
11/25/2021 sagemaker-studio-735206531520-v170csq2hy
11/25/2021 sagemaker-studio-735206531520-34fs44x1q2t
11/25/2021 sagemaker-studio-735206531520-i8s8pwbfm9
ap-northeast-1
11/25/2021 myvbcbucket
11/29/2021 4.3 Ensure the default security group of every VPC restricts all traffic
EC2.2 The VPC default security group should not allow inbound and
11/29/2021 outbound traffic
securityhub-vpc-sg-restricted-common-ports-35a44111
EC2.19 Security groups should not allow unrestricted access to ports
12/15/2021 with high risk
FindingID
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'
'arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/6826fb00-a720-4377-8619-fbb1594596e4'
' arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/ea68919e-a997-4113-b603-54b30d5c416f'
'arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/fcb698d8-a5a7-42c7-a28c-56ae58d583f4'
'arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/754c29ab-c9a3-4705-ba76-07167982d941'
'arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/4964cab3-9965-4f5f-8e1f-332977be81d5'
'arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.8/finding/c7b7c829-6b09-4222-b914-94901091b2f7'
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.19/finding/4e1763ff-b5e7-49e7-9e9b-2fff2fdf3c05
Status
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Done
Region Date
###
Issue
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
EC2.10 Amazon EC2 should be configured to use VPC endpoints that are created for the Amazon EC2 service
EC2.15 EC2 subnets should not automatically assign public IP addresses
2.9 Ensure VPC flow logging is enabled in all VPCs
EC2.6 VPC flow logging should be enabled in all VPCs
1.7 Ensure IAM password policy requires at least one symbol
2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
CloudTrail.2 CloudTrail should have encryption at-rest enabled
CloudTrail.2 CloudTrail should have encryption at-rest enabled
EC2.7 EBS default encryption should be enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.7 Password policies for IAM users should have strong configurations
S3.1 S3 Block Public Access setting should be enabled
1.9 Ensure IAM password policy requires minimum password length of 14 or greater
EFS.2 Amazon EFS volumes should be in backup plans
Config.1 AWS Config should be enabled
2.5 Ensure AWS Config is enabled
S3.5 S3 buckets should require requests to use Secure Socket Layer
EC2.15 EC2 subnets should not automatically assign public IP addresses
S3.4 S3 buckets should have server-side encryption enabled
EC2.10 Amazon EC2 should be configured to use VPC endpoints that are created for the Amazon EC2 service
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
S3.4 S3 buckets should have server-side encryption enabled
IAM.7 Password policies for IAM users should have strong configurations
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
S3.5 S3 buckets should require requests to use Secure Socket Layer
EC2.7 EBS default encryption should be enabled
EFS.2 Amazon EFS volumes should be in backup plans
2.9 Ensure VPC flow logging is enabled in all VPCs
EC2.6 VPC flow logging should be enabled in all VPCs
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
IAM.5 MFA should be enabled for all IAM users that have a console password
2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
CloudTrail.2 CloudTrail should have encryption at-rest enabled
CloudTrail.2 CloudTrail should have encryption at-rest enabled
S3.1 S3 Block Public Access setting should be enabled
1.7 Ensure IAM password policy requires at least one symbol
FindingID
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/dc8e2097-57e0-4c10-9823-0ce5ef91a393
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/cc18d6c9-1636-44aa-908c-7c6fa3d837c6
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/0571cc11-d4fe-46ce-854a-5264ae1f34c0
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/5d869591-0a75-4c37-9abd-803168a0aaa8
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/1ae0779d-58f6-4bd8-856f-0f530a93140e
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/62fa8153-b1c0-462a-a3e9-5b668294ec38
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/f99c666f-ec7c-4a5d-b2a4-df125276588c
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/dd827a2a-047f-4a6d-a129-467559efee36
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/ac5a6ceb-c5ce-4fbe-a610-163abce55222
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/64875edc-2fa8-440c-9600-23f5554a243b
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/450a8cb5-3991-4ec8-ba78-d59a145a4267
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/0e28ab2b-77ab-4a10-bf6f-cc97950af18a
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.10/finding/f39b7cec-53a7-409b-857e-f0af2c2fffc0
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.15/finding/f0a9bba1-8457-4656-a45c-aba54d73bc87
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.9/finding/4b1ded05-69ab-479c-9ebd-83bbbb615aae
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.6/finding/d53cdb3c-e8e7-4b73-b904-7ecbdf9f7678
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.7/finding/2b994859-fb62-4240-ac39-b839b423fb2b
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.7/finding/b51fb3bd-5d6d-4c09-8f66-2d618094508e
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.7/finding/6a4e7b9b-702f-42dc-a515-278e3764fce8
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/CloudTrail.2/finding/bce9959c-084d-4336-b296-3c068111cd46
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/CloudTrail.2/finding/5f357e15-b47d-4ee6-89ca-723ddfd1263e
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.7/finding/1a3f85a9-1dbc-445f-b27f-f79a8487e86b
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/c65673de-8092-4450-af22-6cfb8c270c5c
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/c59a6f21-f33a-4a07-b245-2c79362312d5
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/a2ef72db-148a-463d-824d-2b56f45fb683
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/9f51e2f4-cbfa-436d-bcb6-8c06ea2f8bfe
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/84d28a46-899e-4501-b1dd-006fb33f8d6c
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/7cc084b9-90d1-499d-80ed-5793b17469cd
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/24596229-8510-4e69-b00c-f406623557bd
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/0489b7d6-65c0-484e-95ba-850eabbd1453
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/9b99f7c4-153b-43fa-9a9c-32d4c664a457
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/97276589-27b4-4aa8-8f1a-a39db55290a9
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/89a8443c-7713-4777-a2dd-68967d1806c0
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/7a6ab134-4bc9-4024-93d9-533b46beff16
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/f971f542-7d8d-489b-8630-6e4f3553f206
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/f1908ca5-42c3-45a9-9aae-339acb914fcc
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/b90cc3b1-7ad8-4cac-ab68-fd1f6eb68a99
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/a3d1752a-4510-466c-9578-eb7aee8eb545
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/4bfc92cd-7b63-4624-9fb0-b8840782e3bc
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/4aca708c-6c50-4ec6-a148-fb33d40058d8
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/2b50ab29-4f04-4d88-946b-3cdea7afb60d
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/e5c47bc1-5fa5-4c98-911f-e40ce96165c2
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/d9c6f714-ae6f-41c1-bc19-bdaf2dacb745
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/ce17e7fb-5ff3-410e-b629-b20a0fe5d329
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/837f8a3c-e6f8-4a7c-b48a-182107a2a3a2
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/4bfeb0eb-3eb5-4739-923c-93bab97e47ed
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/3065b3a9-6269-419a-8d2d-05b7a8a2e05c
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/14b498db-90b9-42e4-8cf1-1d785b8a2bb1
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.7/finding/8e817510-a2b7-4e4f-a6cd-aacff5d4f351
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.1/finding/6fc908d3-8d5d-49a9-9491-124afbcaa32f
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.9/finding/c6611e98-5bf7-421d-ae43-9302ff7f769f
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EFS.2/finding/2036d372-7a77-44c9-a059-99bfe15507cc
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/Config.1/finding/1c31ad05-4acc-479b-bca1-7850f98283ca
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.5/finding/a8ca34a8-3b3d-4c3b-af15-9c425320a1e8
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/86470de2-cffd-4d46-9405-322bd934db41
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.15/finding/dcafe41e-2608-4891-aa81-04627d7a8d57
arn:aws:securityhub:ap-northeast-1:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/9891d712-ec86-4dbf-842a-7da84a11043b
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.10/finding/c005cbb5-45fb-46c4-8e39-35dbfe748f6e
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/fbf6cbe5-3c43-4ad6-9d19-8b5a4377f833
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/ce40ff0c-0850-4136-9e53-745b225f1619
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/bcd46a89-d01c-4105-84f2-5b04a2837267
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/9c5c7d02-279b-48fc-9e00-f42135643f4e
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/8980a3c8-9fbb-487e-8e5c-373463816a2b
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/457d7e14-a553-4c39-9fa0-b7c3ed37eea5
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.4/finding/16341f3a-1aaf-4e29-90e0-f94f3945ca82
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.7/finding/98412a08-c512-4527-ba17-a397dbfb756b
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/ebe91f6e-32a8-48f9-9a4f-7da21467724f
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/ae2a391c-082d-413b-8344-ec799cb06e8f
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/70a43cd0-fbc8-4ecd-b4f8-0eb36292b738
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/6a87da5a-8492-4acc-aa47-580613995f0c
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/561451b9-6ea0-49a2-95bd-b317636a6cde
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/4db4c6ce-92e5-4471-a4bc-86f08cadf182
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.5/finding/08553503-04c2-4dfb-bd8b-079ba10ebc4e
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.7/finding/12c63423-1d0b-4789-be02-6c57a45c48c5
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EFS.2/finding/d1feaa34-0b14-4560-91cd-9323512babce
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.9/finding/d29504b3-89e1-480c-b281-37c2f2835b50
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/EC2.6/finding/6db9c009-8755-4c3a-8f87-fd6b352de9e9
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/f810a153-3855-4d29-8cd0-373906d7d7fa
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/d558168e-924c-44c7-8caf-76e72ed4c97f
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/cfd28233-c5af-4016-8342-6531936820bc
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/b5e5d152-4687-400e-8f7d-fe32ffa23971
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/a4362f36-737b-45f2-b66d-6160dd2995f0
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/29dcb6bf-8c2a-4088-9577-bc2c95d7573e
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.2/finding/10cab96e-d2cb-4572-9b24-8b2b4a33725b
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/85f96cfc-136c-455a-adb9-e26c840694bd
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/7549b81a-6461-4084-a34e-917cd02e9e13
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/6f035cdb-fb91-4c51-8791-89fe5af8d723
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/5d67d989-5625-4559-8788-b37fc51e6c73
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/49b5a969-29d9-4049-8cc3-8e78d130e479
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/3d952180-6e67-4d4f-949d-9936378dc9a8
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/IAM.5/finding/17fa7431-9f60-4206-93c7-a2cceadbdd8c
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.7/finding/d8c91f9d-ac9b-4bf7-9567-c4e64a3cfc53
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/2.7/finding/877ac261-d62d-49bf-88e0-51cf39f0f397
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/CloudTrail.2/finding/9c1747b9-8dde-4235-8548-e7d20601bd6e
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/CloudTrail.2/finding/8c6ae7cd-61ac-4114-80b3-736cfa420e01
arn:aws:securityhub:us-west-2:735206531520:subscription/aws-foundational-security-best-
practices/v/1.0.0/S3.1/finding/3ae57ed6-7653-4eb1-84b5-e84fdc97eb89
arn:aws:securityhub:us-west-2:735206531520:subscription/cis-aws-foundations-
benchmark/v/1.2.0/1.7/finding/af2e3397-8007-43c0-a001-eb559d37cb4e
Status
In-progress