Skip to content

Commit def87df

Browse files
authored
feat: Enhance compliance (#49)
* Specify ingress ports for SecurityGroups * Add S3 Access Logging to the Cloudtrail bucket * Add S3 Public Access Block configuration
1 parent 3069b2a commit def87df

File tree

6 files changed

+69
-3
lines changed

6 files changed

+69
-3
lines changed

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,3 @@
11
packaged-template.yaml
22
*.zip
3+
.idea/

templates/CloudBench.yaml

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,17 @@ Resources:
214214
GroupDescription: CloudBench workload Security Group
215215
SecurityGroupIngress:
216216
- CidrIp: 0.0.0.0/0
217-
IpProtocol: "-1"
217+
IpProtocol: "tcp"
218+
FromPort: 80
219+
ToPort: 80
220+
- CidrIp: 0.0.0.0/0
221+
IpProtocol: "tcp"
222+
FromPort: 443
223+
ToPort: 443
224+
- CidrIp: 0.0.0.0/0
225+
IpProtocol: "tcp"
226+
FromPort: 7000
227+
ToPort: 7000
218228
Tags:
219229
- Key: Name
220230
Value: !Sub "${AWS::StackName}-CloudBench"

templates/CloudConnector.yaml

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,18 @@ Resources:
220220
GroupDescription: CloudConnector workload Security Group
221221
SecurityGroupIngress:
222222
- CidrIp: 0.0.0.0/0
223-
IpProtocol: "-1"
223+
IpProtocol: "tcp"
224+
FromPort: 80
225+
ToPort: 80
226+
- CidrIp: 0.0.0.0/0
227+
IpProtocol: "tcp"
228+
FromPort: 443
229+
ToPort: 443
230+
- CidrIp: 0.0.0.0/0
231+
IpProtocol: "tcp"
232+
FromPort: 5000
233+
ToPort: 5000
234+
224235
Tags:
225236
- Key: Name
226237
Value: !Sub "${AWS::StackName}-CloudConnector"

templates/CloudScanning.yaml

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,17 @@ Resources:
240240
GroupDescription: CloudScanning workload Security Group
241241
SecurityGroupIngress:
242242
- CidrIp: 0.0.0.0/0
243-
IpProtocol: "-1"
243+
IpProtocol: "tcp"
244+
FromPort: 80
245+
ToPort: 80
246+
- CidrIp: 0.0.0.0/0
247+
IpProtocol: "tcp"
248+
FromPort: 443
249+
ToPort: 443
250+
- CidrIp: 0.0.0.0/0
251+
IpProtocol: "tcp"
252+
FromPort: 5000
253+
ToPort: 5000
244254
Tags:
245255
- Key: Name
246256
Value: !Sub "${AWS::StackName}-CloudScanning"

templates/CloudTrail.yaml

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,23 @@ Resources:
1515
Rules:
1616
- ExpirationInDays: !Ref CloudTrailLogRetention
1717
Status: Enabled
18+
PublicAccessBlockConfiguration:
19+
BlockPublicAcls: true
20+
BlockPublicPolicy: true
21+
IgnorePublicAcls: true
22+
RestrictPublicBuckets: true
23+
LoggingConfiguration:
24+
DestinationBucketName: !Ref CloudTrailLoggingBucket
25+
LogFilePrefix: sysdig-cloudtrail-bucket-logs
26+
CloudTrailLoggingBucket:
27+
Type: AWS::S3::Bucket
28+
Properties:
29+
AccessControl: LogDeliveryWrite
30+
PublicAccessBlockConfiguration:
31+
BlockPublicAcls: true
32+
BlockPublicPolicy: true
33+
IgnorePublicAcls: true
34+
RestrictPublicBuckets: true
1835

1936
BucketPolicy:
2037
Type: AWS::S3::BucketPolicy

templates/CloudVision.yaml

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,23 @@ Resources:
134134
Properties:
135135
VersioningConfiguration:
136136
Status: Enabled
137+
PublicAccessBlockConfiguration:
138+
BlockPublicAcls: true
139+
BlockPublicPolicy: true
140+
IgnorePublicAcls: true
141+
RestrictPublicBuckets: true
142+
LoggingConfiguration:
143+
DestinationBucketName: !Ref SysdigConfigLoggingBucket
144+
LogFilePrefix: sysdig-config-bucket-logs
145+
SysdigConfigLoggingBucket:
146+
Type: AWS::S3::Bucket
147+
Properties:
148+
AccessControl: LogDeliveryWrite
149+
PublicAccessBlockConfiguration:
150+
BlockPublicAcls: true
151+
BlockPublicPolicy: true
152+
IgnorePublicAcls: true
153+
RestrictPublicBuckets: true
137154

138155
SysdigSecureAPITokenParameter:
139156
Type: AWS::SSM::Parameter

0 commit comments

Comments
 (0)