Skip to content

@glennbolton glennbolton released this Mar 18, 2018

This release includes all Level 1 and Level 2 CloudTrail alarms, recommended by the CIS AWS Foundations Benchmark.

Assets 2

@glennbolton glennbolton released this Mar 12, 2018 · 9 commits to master since this release

This release fixes a bug with the bucket policy remediation function.

Assets 2
  • v0.2.0
  • 8cba553
  • Compare
    Choose a tag to compare
    Search for a tag
  • v0.2.0
  • 8cba553
  • Compare
    Choose a tag to compare
    Search for a tag

@glennbolton glennbolton released this Mar 10, 2018 · 11 commits to master since this release

This release includes major changes:

  • Auto-remediation for S3 public buckets
  • Slack integration
    image
  • The directory structure has been updated for clarity
  • CloudTrail is now enabled automatically
  • CloudTrail Monitoring alerts
Assets 2
  • v0.1.2
  • e47c8c7
  • Compare
    Choose a tag to compare
    Search for a tag
  • v0.1.2
  • e47c8c7
  • Compare
    Choose a tag to compare
    Search for a tag

@glennbolton glennbolton released this Dec 10, 2017 · 18 commits to master since this release

This release enables remote Terraform state storage using the S3 backend.

Assets 2

@glennbolton glennbolton released this Dec 2, 2017 · 29 commits to master since this release

Under-the-hood naming convention updates and additional comments.

Assets 2

@glennbolton glennbolton released this Nov 25, 2017 · 33 commits to master since this release

Defendable design for AWS

Initial release v0.1.0

The initial release of the Defendable Design pattern for AWS enables AWS Config and configures five AWS Config Rules.

  • Check-CloudTrail-Enabled
    • AWS rule: Validates that CloudTrail is enabled.
  • Check-IAM-PasswordPolicy
    • AWS rule: Validates that an IAM Password Policy is configured.
  • Check-EC2-OpenPorts
    • Custom rule: Checks for dangerous security group rules which open prohibited ports to the internet.
    • Supports automatic remediation of dangerous changes
  • Check-S3-PublicRead
    • AWS rule: Checks for S3 buckets with public read permissions
  • Check-S3-PublicWrite
    • AWS rule: Checks for S3 buckets with public write permissions
Assets 2
You can’t perform that action at this time.