Documentation ¶
Index ¶
- func GetInsight(ctx context.Context, cfg *aws.Config, name string) (types.Insight, error)
- func GetInsights(ctx context.Context, cfg *aws.Config) ([]types.Insight, error)
- func HasActiveEc2Instances(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveEc2NetworkInterfaces(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveEc2SecurityGroups(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveEc2Volumes(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveIamAccessKeys(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveIamGroups(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveIamPolicies(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveIamRoles(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveIamUsers(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveRdsDbClusterSnapshots(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveRdsDbClusters(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveRdsDbInstances(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveRdsDbSecurityGroups(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveRdsDbSnapshots(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveRdsEventSubscriptions(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveS3AccountPublicAccessBlocks(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveS3Buckets(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveSnsTopics(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func HasActiveSqsQueues(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
- func SaveInsight(ctx context.Context, cfg *aws.Config, name string, groupBy string, ...) error
- type CheckFindingStatusResult
- type CurrentFindingStatus
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func GetInsight ¶
GetInsight returns the insight with the given name
func GetInsights ¶
GetInsights returns all insights.
func HasActiveEc2Instances ¶
func HasActiveEc2Instances(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveEc2Instances returns true if the finding references any active EC2 instance id's.
func HasActiveEc2NetworkInterfaces ¶
func HasActiveEc2NetworkInterfaces(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveEc2NetworkInterfaces returns true if the finding has any active EC2 network interfaces.
func HasActiveEc2SecurityGroups ¶
func HasActiveEc2SecurityGroups(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveEc2SecurityGroups returns true if the finding has any active EC2 security groups.
func HasActiveEc2Volumes ¶
func HasActiveEc2Volumes(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveEc2Volumes returns true if the finding has any active EC2 volumes.
func HasActiveIamAccessKeys ¶
func HasActiveIamAccessKeys(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveIamAccessKeys returns true if any of the findings IAM access keys still exists.
func HasActiveIamGroups ¶
func HasActiveIamGroups(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveIamGroups returns true if any of the findings IAM groups still exists.
func HasActiveIamPolicies ¶
func HasActiveIamPolicies(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveIamPolicies returns true if any of the findings IAM policies still exists.
func HasActiveIamRoles ¶
func HasActiveIamRoles(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveIamRoles returns true if any of the findings IAM roles still exists.
func HasActiveIamUsers ¶
func HasActiveIamUsers(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveIamUsers returns true if any of the findings IAM users still exists.
func HasActiveRdsDbClusterSnapshots ¶
func HasActiveRdsDbClusterSnapshots(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveRdsDbClusterSnapshots returns true if any of the findings RDS DB cluster snapshots still exists.
func HasActiveRdsDbClusters ¶
func HasActiveRdsDbClusters(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveRdsDbClusters returns true if any of the findings RDS DB clusters still exists.
func HasActiveRdsDbInstances ¶
func HasActiveRdsDbInstances(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveRdsDbInstances returns true if any of the findings RDS DB instances still exists.
func HasActiveRdsDbSecurityGroups ¶
func HasActiveRdsDbSecurityGroups(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveRdsDbSecurityGroups returns true if any of the findings RDS DB security groups still exists.
func HasActiveRdsDbSnapshots ¶
func HasActiveRdsDbSnapshots(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveRdsDbSnapshots returns true if any of the findings RDS DB snapshots still exists.
func HasActiveRdsEventSubscriptions ¶
func HasActiveRdsEventSubscriptions(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveRdsEventSubscriptions returns true if any of the findings RDS event subscriptions still exists.
func HasActiveS3AccountPublicAccessBlocks ¶
func HasActiveS3AccountPublicAccessBlocks(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveS3AccountPublicAccessBlocks returns true if any of the findings S3 account public access blocks still exists.
func HasActiveS3Buckets ¶
func HasActiveS3Buckets(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveS3Buckets returns true if any of the findings S3 buckets still exists.
func HasActiveSnsTopics ¶
func HasActiveSnsTopics(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveSnsTopics returns true if any of the finding's SNS topics still active
func HasActiveSqsQueues ¶
func HasActiveSqsQueues(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) bool
HasActiveSqsQueues returns true if any of the finding queue is still active
Types ¶
type CheckFindingStatusResult ¶
type CheckFindingStatusResult struct {
// contains filtered or unexported fields
}
func CheckFindingStatus ¶
func CheckFindingStatus(ctx context.Context, cfg *aws.Config, finding *types.AwsSecurityFinding) *CheckFindingStatusResult
func (*CheckFindingStatusResult) GetResult ¶
func (c *CheckFindingStatusResult) GetResult() (*types.AwsSecurityFinding, CurrentFindingStatus, error)
type CurrentFindingStatus ¶
type CurrentFindingStatus string
const ( CurrentFindingStatusUnknown CurrentFindingStatus = "Unknown" CurrentFindingStatusActive CurrentFindingStatus = "Active" CurrentFindingStatusInactive CurrentFindingStatus = "Inactive" )