Skip to content

Commit

Permalink
Merge branch 'master' into function_plugin
Browse files Browse the repository at this point in the history
  • Loading branch information
jodybrazil committed Jun 15, 2020
2 parents a84c67b + 912b82d commit bc1b8a1
Show file tree
Hide file tree
Showing 14 changed files with 1,176 additions and 2,619 deletions.
4 changes: 3 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -242,7 +242,7 @@ In this stage we will use the console the manually run the ElectricEye ECS task.
3. Select **Run task**, in the next screen select the hyperlink in the **Task** column and select the **Logs** tab to view the result of the logs. **Note** logs coming to this screen may be delayed, and you may have several auditors report failures due to the lack of in-scope resources.

## Supported Services and Checks
These are the following services and checks perform by each Auditor. There are currently **212** checks supported across **65** AWS services / components using **47** Auditors. There are currently **62** supported response and remediation Playbooks with coverage across **32** AWS services / components supported by [ElectricEye-Response](https://github.com/jonrau1/ElectricEye/blob/master/add-ons/electriceye-response).
These are the following services and checks perform by each Auditor. There are currently **214** checks supported across **66** AWS services / components using **48** Auditors. There are currently **62** supported response and remediation Playbooks with coverage across **32** AWS services / components supported by [ElectricEye-Response](https://github.com/jonrau1/ElectricEye/blob/master/add-ons/electriceye-response).

**Regarding Shield Advanced checks:** You must be subscribed to Shield Advanced, be on Business/Enterprise Support and be in us-east-1 to perform all checks. The Shield Adv API only lives in us-east-1, and to have the DRT look at your account you need Biz/Ent support, hence the pre-reqs.

Expand Down Expand Up @@ -445,6 +445,8 @@ These are the following services and checks perform by each Auditor. There are c
| AWS_IAM_Auditor.py | IAM User | Do users have managed policies attached |
| AWS_IAM_Auditor.py | Password policy (Account) | Does the IAM password policy meet or exceed<br>AWS CIS Foundations Benchmark standards |
| AWS_IAM_Auditor.py | Server certs (Account) | Are they any Server certificates stored by IAM |
| AWS_KMS_Auditor.py | KMS key | Is key rotation enabled |
| AWS_KMS_Auditor.py | KMS key | Does the key allow public access |
| AWS_Lambda_Auditor.py | Lambda function | Has function been used or updated in the last<br>30 days |
| AWS_License_Manager_Auditor | License Manager configuration | Do LM configurations enforce a hard limit on<br>license consumption |
| AWS_Secrets_Manager_Auditor.py | Secrets Manager secret | Is the secret over 90 days old |
Expand Down
141 changes: 0 additions & 141 deletions audit_controller.py

This file was deleted.

4 changes: 4 additions & 0 deletions cloudformation/ElectricEye_CFN.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -252,6 +252,10 @@ Resources:
- kinesis:ListStreams
- kms:Decrypt
- kms:DescribeKey
- kms:GetKeyPolicy
- kms:GetKeyRotationStatus
- kms:ListAliases
- kms:ListKeys
- lambda:ListFunctions
- license-manager:GetLicenseConfiguration
- license-manager:ListLicenseConfigurations
Expand Down
Loading

0 comments on commit bc1b8a1

Please sign in to comment.