Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add a lot of new Auditors #23

Closed
jonrau1 opened this issue Mar 31, 2020 · 4 comments
Closed

Add a lot of new Auditors #23

jonrau1 opened this issue Mar 31, 2020 · 4 comments
Assignees
Labels
documentation Improvements or additions to documentation enhancement New feature or request

Comments

@jonrau1
Copy link
Owner

jonrau1 commented Mar 31, 2020

Story
As a user of ElectricEye, I want to be able to run security scans against a multitude of AWS services and components so that I can know their security posture and/or fulfill regulatory or compliance requirements.

Definition of Done

  • New Auditors and Checks added:
    • QLDB: Ledger deletion protection & journal xfer encryption
    • Comprehend: completed built-in job output encryption, input encryption and VPC config (15 checks in total for each of the 5 built-in jobs [i.e. entity, sentiment, etc]
    • Management Service: Config recorder, Config SNS, Budgets, Compute Optimizer, RAM External Principals check, Xray KMS check
    • Forecast: Dataset encryption, Forecast export job encryption
    • Image Builder: EBS encryption, deletion on fail, test enabled
  • Expand the Security Services auditor:
    • Macie protection on Bucket (for supported regions)
    • Inspector assessment check (just looking if it exists)
    • Detective graph check (for supported regions)
    • KMS Rotation
  • IAM Policies update in CFN, TF and standalone
  • Readme list updated with new Auditor checks
  • Total counts update in the Readme
  • Complete mapping to the ASFF

Nice to Have

  • Response Playbooks where it makes sense
    • Pagerduty
    • Glue Data Catalog encryption
    • Macie protection
  • AMB Fabric Auditor (when AWS fixes the API / feature)

Additional Information
Will be adding 5 new auditors for 28 net-new checks and updating the Security Services auditor for 4 net-new checks.

If AMB is fixed, this will be 6 new auditors and 35 checks in total

@jonrau1 jonrau1 added documentation Improvements or additions to documentation enhancement New feature or request help wanted Extra attention is needed labels Mar 31, 2020
@jonrau1 jonrau1 self-assigned this Mar 31, 2020
@jonrau1 jonrau1 added this to To do in ElectricEye Roadmap via automation Mar 31, 2020
@jonrau1 jonrau1 removed the help wanted Extra attention is needed label Apr 1, 2020
@jonrau1
Copy link
Owner Author

jonrau1 commented Apr 8, 2020

#22 has added IMDSv2 and Detective check

@jonrau1 jonrau1 moved this from To do to Doing in ElectricEye Roadmap Apr 8, 2020
@jonrau1 jonrau1 moved this from Doing to Blocked in ElectricEye Roadmap Apr 19, 2020
@jonrau1
Copy link
Owner Author

jonrau1 commented Apr 19, 2020

Blocking until #26 is complete

@jonrau1 jonrau1 removed their assignment Apr 19, 2020
@jonrau1 jonrau1 moved this from Blocked to Doing in ElectricEye Roadmap Apr 21, 2020
@jonrau1 jonrau1 self-assigned this Jun 9, 2020
@jonrau1
Copy link
Owner Author

jonrau1 commented Jun 9, 2020

New scope for checks:
DDB: KMS, PTR, TTL
GAX: Flow logs, unhealthy endpt check
Glacier: Vault access policy, Vault lock
SSVC: MacieV2
Image Builder: EBS encryption, deletion on fail, test enabled

All other checks in original issue will be chunked into future releases as required

@jonrau1 jonrau1 moved this from Doing to Done in ElectricEye Roadmap Jun 22, 2020
@jonrau1
Copy link
Owner Author

jonrau1 commented Jun 22, 2020

Deferring the rest of the wishlist here. The 2.0 version of ElectricEye will be focusing on automation and reporting.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation enhancement New feature or request
Projects
Development

No branches or pull requests

1 participant