- Avoid the use of the "root" account
- Ensure Multi-Factor Authentication (MFA) is enabled for all IAM users that have a console password
- Ensure credentials unused for 90 days or greater are disabled
- Ensure Access keys are rotated every 90 days or less
- Ensure no root account access key exists
- Ensure MDA is enabled for the "root" account
- Ensure hardware MFA is enabled for the "root" account
- Ensure IAM policies are attached only to groups or roles
- Ensure IAM policies that allow full ":" administrative privileges are not created
- Ensure AWS Config is enabled in all regions
- Ensure rotation for customer created CMKs is enabled
- Ensure no security groups allow ingress from 0.0.0.0/0 to port 22
- Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389
- Ensure routing tables for VPC peering are "least access"