Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var CheckEnableAtRestEncryption = rules.Register( rules.Rule{ AVDID: "AVD-AWS-0008", Provider: provider.AWSProvider, Service: "autoscaling", ShortCode: "enable-at-rest-encryption", Summary: "Launch configuration with unencrypted block device.", Impact: "The block device could be compromised and read from", Resolution: "Turn on encryption for all block devices", Explanation: `Block devices should be encrypted to ensure sensitive data is held securely at rest.`, Links: []string{ "https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/RootDeviceStorage.html", }, Terraform: &rules.EngineMetadata{ GoodExamples: terraformEnableAtRestEncryptionGoodExamples, BadExamples: terraformEnableAtRestEncryptionBadExamples, Links: terraformEnableAtRestEncryptionLinks, RemediationMarkdown: terraformEnableAtRestEncryptionRemediationMarkdown, }, CloudFormation: &rules.EngineMetadata{ GoodExamples: cloudFormationEnableAtRestEncryptionGoodExamples, BadExamples: cloudFormationEnableAtRestEncryptionBadExamples, Links: cloudFormationEnableAtRestEncryptionLinks, RemediationMarkdown: cloudFormationEnableAtRestEncryptionRemediationMarkdown, }, Severity: severity.High, }, func(s *state.State) (results rules.Results) { for _, launchConfig := range s.AWS.Autoscaling.LaunchConfigurations { if launchConfig.RootBlockDevice != nil && launchConfig.RootBlockDevice.Encrypted.IsFalse() { results.Add( "Root block device is not encrypted.", launchConfig.RootBlockDevice.Encrypted, ) } else { results.AddPassed(&launchConfig) } for _, device := range launchConfig.EBSBlockDevices { if device.Encrypted.IsFalse() { results.Add( "EBS block device is not encrypted.", device.Encrypted, ) } else { results.AddPassed(&device) } } } return }, )
View Source
var CheckNoPublicIp = rules.Register( rules.Rule{ AVDID: "AVD-AWS-0009", Provider: provider.AWSProvider, Service: "autoscaling", ShortCode: "no-public-ip", Summary: "Launch configuration should not have a public IP address.", Impact: "The instance or configuration is publicly accessible", Resolution: "Set the instance to not be publicly accessible", Explanation: `You should limit the provision of public IP addresses for resources. Resources should not be exposed on the public internet, but should have access limited to consumers required for the function of your application.`, Links: []string{ "https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-instance-addressing.html", }, Terraform: &rules.EngineMetadata{ GoodExamples: terraformNoPublicIpGoodExamples, BadExamples: terraformNoPublicIpBadExamples, Links: terraformNoPublicIpLinks, RemediationMarkdown: terraformNoPublicIpRemediationMarkdown, }, CloudFormation: &rules.EngineMetadata{ GoodExamples: cloudFormationNoPublicIpGoodExamples, BadExamples: cloudFormationNoPublicIpBadExamples, Links: cloudFormationNoPublicIpLinks, RemediationMarkdown: cloudFormationNoPublicIpRemediationMarkdown, }, Severity: severity.High, }, func(s *state.State) (results rules.Results) { for _, launchConfig := range s.AWS.Autoscaling.LaunchConfigurations { if launchConfig.AssociatePublicIP.IsTrue() { results.Add( "Launch configuration associates public IP address.", launchConfig.AssociatePublicIP, ) } else { results.AddPassed(&launchConfig) } } return }, )
View Source
var CheckNoSensitiveInfo = rules.Register( rules.Rule{ AVDID: "AVD-AWS-0122", Provider: provider.AWSProvider, Service: "autoscaling", ShortCode: "no-sensitive-info", Summary: "Ensure all data stored in the launch configuration EBS is securely encrypted", Impact: "Sensitive credentials in user data can be leaked", Resolution: "Don't use sensitive data in user data", Explanation: `When creating Launch Configurations, user data can be used for the initial configuration of the instance. User data must not contain any sensitive data.`, Links: []string{}, Terraform: &rules.EngineMetadata{ GoodExamples: terraformNoSensitiveInfoGoodExamples, BadExamples: terraformNoSensitiveInfoBadExamples, Links: terraformNoSensitiveInfoLinks, RemediationMarkdown: terraformNoSensitiveInfoRemediationMarkdown, }, Severity: severity.High, }, func(s *state.State) (results rules.Results) { scanner := squealer.NewStringScanner() for _, launchConfig := range s.AWS.Autoscaling.LaunchConfigurations { if result := scanner.Scan(launchConfig.UserData.Value()); result.TransgressionFound { results.Add( fmt.Sprintf("Sensitive data found in user data: %s", result.Description), launchConfig.UserData, ) } else { results.AddPassed(&launchConfig) } } return }, )
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.