-
Notifications
You must be signed in to change notification settings - Fork 116
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(aws): CloudTrail global service events rule #1401
base: master
Are you sure you want to change the base?
feat(aws): CloudTrail global service events rule #1401
Conversation
a4f406f
to
0c828fd
Compare
BadExample: | ||
GoodExample: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm curious why this has changed?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe this should say GoodExample, after updating it on the policy it still needs to be updated on the auto generated docs. Updated from this policy as part of this PR: https://github.com/aquasecurity/defsec/blob/master/rules/cloud/policies/aws/cloudtrail/enable_all_regions.cf.go
BadExample: | ||
GoodExample: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ditto
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Similar to my previous comment, the policy script has been updated as part of this PR and this should say GoodExample:
https://github.com/aquasecurity/defsec/blob/master/rules/cloud/policies/aws/cloudtrail/enable_at_rest_encryption.cf.go
BadExample: | ||
GoodExample: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ditto
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Similar to my previous comment, the policy script has been updated as part of this PR and this should say GoodExample:
https://github.com/aquasecurity/defsec/blob/master/rules/cloud/policies/aws/cloudtrail/enable_log_validation.cf.go
This PR is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 10 days. |
Thanks for reviewing and apologies for the late reply as I have been away. |
eabb8e3
to
1e9e05d
Compare
1e9e05d
to
dd5fc30
Compare
This PR is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 10 days. |
Adding a new rule to check if Global Service Events are enabled in CloudTrail and have not been turned off as this value is enabled by default.
Links:
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-concepts.html#cloudtrail-concepts-global-service-events
https://registry.terraform.io/providers/rgeraskin/aws2/latest/docs/resources/cloudtrail#include_global_service_events
Also some minor fixes to example docs.