Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var CheckEnableTracing = rules.Register( scan2.Rule{ AVDID: "AVD-AWS-0066", Provider: providers2.AWSProvider, Service: "lambda", ShortCode: "enable-tracing", Summary: "Lambda functions should have X-Ray tracing enabled", Impact: "Without full tracing enabled it is difficult to trace the flow of logs", Resolution: "Enable tracing", Explanation: `X-Ray tracing enables end-to-end debugging and analysis of all function activity. This will allow for identifying bottlenecks, slow downs and timeouts.`, Links: []string{ "https://docs.aws.amazon.com/lambda/latest/dg/services-xray.html", }, Terraform: &scan2.EngineMetadata{ GoodExamples: terraformEnableTracingGoodExamples, BadExamples: terraformEnableTracingBadExamples, Links: terraformEnableTracingLinks, RemediationMarkdown: terraformEnableTracingRemediationMarkdown, }, CloudFormation: &scan2.EngineMetadata{ GoodExamples: cloudFormationEnableTracingGoodExamples, BadExamples: cloudFormationEnableTracingBadExamples, Links: cloudFormationEnableTracingLinks, RemediationMarkdown: cloudFormationEnableTracingRemediationMarkdown, }, Severity: severity2.Low, }, func(s *state2.State) (results scan2.Results) { for _, function := range s.AWS.Lambda.Functions { if function.IsUnmanaged() { continue } if function.Tracing.Mode.NotEqualTo(lambda2.TracingModeActive) { results.Add( "Function does not have tracing enabled.", function.Tracing.Mode, ) } else { results.AddPassed(&function) } } return }, )
View Source
var CheckRestrictSourceArn = rules.Register( scan2.Rule{ AVDID: "AVD-AWS-0067", Provider: providers2.AWSProvider, Service: "lambda", ShortCode: "restrict-source-arn", Summary: "Ensure that lambda function permission has a source arn specified", Impact: "Not providing the source ARN allows any resource from principal, even from other accounts", Resolution: "Always provide a source arn for Lambda permissions", Explanation: `When the principal is an AWS service, the ARN of the specific resource within that service to grant permission to. Without this, any resource from principal will be granted permission – even if that resource is from another account. For S3, this should be the ARN of the S3 Bucket. For CloudWatch Events, this should be the ARN of the CloudWatch Events Rule. For API Gateway, this should be the ARN of the API`, Links: []string{ "https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-permission.html", }, Terraform: &scan2.EngineMetadata{ GoodExamples: terraformRestrictSourceArnGoodExamples, BadExamples: terraformRestrictSourceArnBadExamples, Links: terraformRestrictSourceArnLinks, RemediationMarkdown: terraformRestrictSourceArnRemediationMarkdown, }, CloudFormation: &scan2.EngineMetadata{ GoodExamples: cloudFormationRestrictSourceArnGoodExamples, BadExamples: cloudFormationRestrictSourceArnBadExamples, Links: cloudFormationRestrictSourceArnLinks, RemediationMarkdown: cloudFormationRestrictSourceArnRemediationMarkdown, }, Severity: severity2.Critical, }, func(s *state2.State) (results scan2.Results) { for _, function := range s.AWS.Lambda.Functions { for _, permission := range function.Permissions { if !permission.Principal.EndsWith(".amazonaws.com") { continue } if permission.SourceARN.IsEmpty() { results.Add( "Lambda permission lacks source ARN for *.amazonaws.com principal.", permission.SourceARN, ) } else { results.AddPassed(&function) } } } return }, )
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.