The severity of a control is determined based on an assessment of the following criteria: 

  1. How difficult is it for a threat actor to take advantage of the configuration weakness associated with the control? 
  2. How likely is it that the weakness will lead to a compromise of your AWS accounts or resources? 


Severity mapping to the difficulty to exploit and the likelihood of compromise

Compromise highly likely

Compromise likely

Compromise unlikely

Compromise highly unlikely

Very easy to exploit

Critical

Critical

High

Medium

Somewhat easy to exploit

Critical

High

Medium

Medium

Somewhat difficult to exploit

High

Medium

Medium

Low

Very difficult to exploit

Medium

Medium

Low

Low


The severity does not take into account the criticality of the underlying resource. you should consider the criticality of the resource


Severity
Recommended action
CriticalThe issue should be remediated immediately to avoid it escalating
HighThe issue must be addressed as a near-term priority.
MediumThe issue should be addressed as a mid-term priority.
Low The issue does not require action on its own.
Informational No recommended action. Informational findings help customers to demonstrate that they are in a compliant state.