finding

package
v0.0.0-...-6432196 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Aug 30, 2022 License: MIT Imports: 13 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func GetInsight

func GetInsight(ctx context.Context, cfg *aws.Config, name string) (types.Insight, error)

GetInsight returns the insight with the given name

func GetInsights

func GetInsights(ctx context.Context, cfg *aws.Config) ([]types.Insight, error)

GetInsights returns all insights.

func HasActiveEc2Instances

func HasActiveEc2Instances(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveEc2Instances returns true if the finding references any active EC2 instance id's.

func HasActiveEc2NetworkInterfaces

func HasActiveEc2NetworkInterfaces(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveEc2NetworkInterfaces returns true if the finding has any active EC2 network interfaces.

func HasActiveEc2SecurityGroups

func HasActiveEc2SecurityGroups(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveEc2SecurityGroups returns true if the finding has any active EC2 security groups.

func HasActiveEc2Volumes

func HasActiveEc2Volumes(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveEc2Volumes returns true if the finding has any active EC2 volumes.

func HasActiveIamAccessKeys

func HasActiveIamAccessKeys(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveIamAccessKeys returns true if any of the findings IAM access keys still exists.

func HasActiveIamGroups

func HasActiveIamGroups(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveIamGroups returns true if any of the findings IAM groups still exists.

func HasActiveIamPolicies

func HasActiveIamPolicies(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveIamPolicies returns true if any of the findings IAM policies still exists.

func HasActiveIamRoles

func HasActiveIamRoles(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveIamRoles returns true if any of the findings IAM roles still exists.

func HasActiveIamUsers

func HasActiveIamUsers(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveIamUsers returns true if any of the findings IAM users still exists.

func HasActiveRdsDbClusterSnapshots

func HasActiveRdsDbClusterSnapshots(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveRdsDbClusterSnapshots returns true if any of the findings RDS DB cluster snapshots still exists.

func HasActiveRdsDbClusters

func HasActiveRdsDbClusters(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveRdsDbClusters returns true if any of the findings RDS DB clusters still exists.

func HasActiveRdsDbInstances

func HasActiveRdsDbInstances(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveRdsDbInstances returns true if any of the findings RDS DB instances still exists.

func HasActiveRdsDbSecurityGroups

func HasActiveRdsDbSecurityGroups(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveRdsDbSecurityGroups returns true if any of the findings RDS DB security groups still exists.

func HasActiveRdsDbSnapshots

func HasActiveRdsDbSnapshots(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveRdsDbSnapshots returns true if any of the findings RDS DB snapshots still exists.

func HasActiveRdsEventSubscriptions

func HasActiveRdsEventSubscriptions(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveRdsEventSubscriptions returns true if any of the findings RDS event subscriptions still exists.

func HasActiveS3AccountPublicAccessBlocks

func HasActiveS3AccountPublicAccessBlocks(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveS3AccountPublicAccessBlocks returns true if any of the findings S3 account public access blocks still exists.

func HasActiveS3Buckets

func HasActiveS3Buckets(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveS3Buckets returns true if any of the findings S3 buckets still exists.

func HasActiveSnsTopics

func HasActiveSnsTopics(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveSnsTopics returns true if any of the finding's SNS topics still active

func HasActiveSqsQueues

func HasActiveSqsQueues(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool

HasActiveSqsQueues returns true if any of the finding queue is still active

func SaveInsight

func SaveInsight(ctx context.Context, cfg *aws.Config, name string, groupBy string, filters *types.AwsSecurityFindingFilters) error

SaveInsight saves an insight to Security Hub

Types

type CheckFindingStatusResult

type CheckFindingStatusResult struct {
	// contains filtered or unexported fields
}

func CheckFindingStatus

func CheckFindingStatus(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) *CheckFindingStatusResult

func (*CheckFindingStatusResult) GetResult

type CurrentFindingStatus

type CurrentFindingStatus string
const (
	CurrentFindingStatusUnknown  CurrentFindingStatus = "Unknown"
	CurrentFindingStatusActive   CurrentFindingStatus = "Active"
	CurrentFindingStatusInactive CurrentFindingStatus = "Inactive"
)

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL