Skip to content
This repository has been archived by the owner on Jul 22, 2021. It is now read-only.

How to run -- #33

Closed
iamhasibrahman opened this issue Jun 11, 2017 · 5 comments
Closed

How to run -- #33

iamhasibrahman opened this issue Jun 11, 2017 · 5 comments
Assignees

Comments

@iamhasibrahman
Copy link

Recently, I was involved in reviewing data platform in the context of security for large enterprises. I wish I known something like this repo -- definitely would like to use it in new future.

I've got few questions and would appreciate your prompt response --

In regards to the architecture, please correct me if I am wrong. Your code will create VPC. Would it create one of those compliant vpc architecture where you will have management & prod vpc. As you must be aware, all the quick start guide (PCI DSS, NIST) aws published followed this ..

Would your code also create the subnet topology - public private etc?

Would I be able to do the below that we recommend to client, if yes, then what would be the instructions -

  1. Create proper vpc architecture
  2. Apply all the CIS rules
  3. Turn on monitoring and logs
  4. Create/turn on alerts
  5. Auto alerts and fix (if any rules are broken, it will be fixed and email will sent

Finally, if what I am saying is too comprehensive and not supported at all, any chance you would support/add these features soon?

Please advise.

@HenrikJaySmith HenrikJaySmith self-assigned this Jun 12, 2017
@iamhasibrahman
Copy link
Author

Any update on this?

@HenrikJaySmith
Copy link
Contributor

Regarding #4 and $5. If you implement the "aws-security-benchmark/aws_cis_foundation_framework/aws-cis-foundation-benchmark-checklist.py" as a config rule it will run on a regular schedule and send email with the findings. Meaning all resources that were not configured correctly.
The CFn template have a number of config rules and cloudwatch events in it that will alert when configured incorrectly but won't give full report as the benchmark will.
Non of the scripts have remediation built in at this point, I am looking at that for future version for the benchmark.

Assigning to Rob regarding #1-3 and the CFn template what it enables.

@iamhasibrahman
Copy link
Author

Thanks Henrik. Looking forward to hearing from Rob!

@barnesrobert
Copy link
Contributor

Unlike the Quick Starts that you mentioned, launching this CIS CloudFormation template won't create networking resources like VPCs or subnets. It creates the logging, monitoring, and alarming controls as identified in the CIS benchmarks; you can refer to the security control matrix for a mapping of the controls to the benchmarks.

I hope this helps.

@barnesrobert
Copy link
Contributor

Closing this issue. Please let us know if you need anything further.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants