Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/1 iam findings #141

Merged
merged 15 commits into from Feb 7, 2019
Merged

Feature/1 iam findings #141

merged 15 commits into from Feb 7, 2019

Conversation

vifor2
Copy link
Contributor

@vifor2 vifor2 commented Feb 3, 2019

PR for https://github.com/nccgroup/ScoutSuite-Proprietary/issues/1

  • Lack of Access Key Rotation : was already done.
  • Lack of AWS CMK Key Rotation : now fetching the data of an additional service (KMS) : to see the variation of the finding's output you can toggle the rotation of one or multiple keys here :
    [removed as included AWS account number]

The finding can be seen here :
image

  • Managed Policy Allows NotActions : was already done.
  • User With Password and Key Enabled : was already done.

@vifor2
Copy link
Contributor Author

vifor2 commented Feb 3, 2019

@codecov-io
Copy link

Codecov Report

Merging #141 into develop will increase coverage by 0.1%.
The diff coverage is 38.88%.

Impacted file tree graph

@@            Coverage Diff             @@
##           develop     #141     +/-   ##
==========================================
+ Coverage    30.25%   30.35%   +0.1%     
==========================================
  Files           64       65      +1     
  Lines         4191     4213     +22     
==========================================
+ Hits          1268     1279     +11     
- Misses        2923     2934     +11
Impacted Files Coverage Δ
ScoutSuite/providers/aws/services/iam.py 10.67% <0%> (ø) ⬆️
ScoutSuite/providers/aws/configs/services.py 54% <50%> (-0.17%) ⬇️
ScoutSuite/providers/aws/services/kms.py 50% <50%> (ø)
ScoutSuite/providers/azure/utils.py 27.77% <0%> (-0.8%) ⬇️
ScoutSuite/providers/azure/configs/services.py 69.23% <0%> (+2.56%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update f25ba87...338ad7a. Read the comment docs.

@codecov-io
Copy link

codecov-io commented Feb 3, 2019

Codecov Report

Merging #141 into develop will increase coverage by 0.66%.
The diff coverage is 29.16%.

Impacted file tree graph

@@             Coverage Diff             @@
##           develop     #141      +/-   ##
===========================================
+ Coverage    30.25%   30.91%   +0.66%     
===========================================
  Files           64       65       +1     
  Lines         4191     4370     +179     
===========================================
+ Hits          1268     1351      +83     
- Misses        2923     3019      +96
Impacted Files Coverage Δ
ScoutSuite/providers/aws/services/iam.py 10.67% <0%> (ø) ⬆️
ScoutSuite/providers/aws/services/kms.py 33.33% <33.33%> (ø)
ScoutSuite/providers/aws/configs/services.py 54% <50%> (-0.17%) ⬇️
ScoutSuite/providers/azure/provider.py 16.32% <0%> (-4.23%) ⬇️
ScoutSuite/providers/gcp/provider.py 13.37% <0%> (-1.81%) ⬇️
ScoutSuite/providers/azure/utils.py 27.77% <0%> (-0.8%) ⬇️
ScoutSuite/cli_parser.py 77.85% <0%> (+1.95%) ⬆️
ScoutSuite/providers/azure/configs/services.py 69.23% <0%> (+2.56%) ⬆️
ScoutSuite/__main__.py 70.49% <0%> (+4.16%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update f25ba87...4a61a00. Read the comment docs.

@x4v13r64
Copy link
Collaborator

x4v13r64 commented Feb 4, 2019

  • User With Password and Key Enabled : was already done.

Ah I see why I missed this, it's disabled in the default ruleset:

        "iam-user-with-password-and-key.json": [
            {
                "enabled": false,
                "level": "warning"
            }

Copy link
Collaborator

@x4v13r64 x4v13r64 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A view should also be implemented for KMS key resources.

@vifor2
Copy link
Contributor Author

vifor2 commented Feb 4, 2019

A view should also be implemented for KMS key resources.

Alright, will do

@vifor2
Copy link
Contributor Author

vifor2 commented Feb 6, 2019

Sorry for the delay, been pretty busy this week 😐
Added the view for KMS keys, attributes visible are alias name, descrition, id and arn. The page being accessible under Security-->KMS-->Keys
kms

@vifor2 vifor2 merged commit 6a0556b into develop Feb 7, 2019
@vifor2 vifor2 deleted the feature/1-IAM-findings branch February 7, 2019 13:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants