turbot/aws_compliance

Control: 3.3 Ensure AWS Config is enabled in all regions

Description

CloudTrail logs a record of every API call made in your AWS account. These logs file are stored in an S3 bucket. It is recommended that the bucket policy or access control list (ACL) applied to the S3 bucket that CloudTrail logs to prevent public access to the CloudTrail logs.

Allowing public access to CloudTrail log content may aid an adversary in identifying weaknesses in the affected account's use or configuration.

Remediation

To implement AWS Config configuration:

From Console:

  1. Select the region you want to focus on in the top right of the console
  2. Click Services
  3. Click Config
  4. If a Config recorder is enabled in this region, you should navigate to the Settings page from the navigation menu on the left hand side. If a Config recorder is not yet enabled in this region then you should select "Get Started".
  5. Select "Record all resources supported in this region"
  6. Choose to include global resources (IAM resources)
  7. Specify an S3 bucket in the same account or in another managed AWS account
  8. Create an SNS Topic from the same AWS account or another managed AWS account

From Command Line:

  1. Ensure there is an appropriate S3 bucket, SNS topic, and IAM role per the AWS Config Service prerequisites.
  2. Run this command to create a new configuration recorder:
aws configservice put-configuration-recorder --configuration-recorder
name=default,roleARN=arn:aws:iam::012345678912:role/myConfigRole --recordinggroup allSupported=true,includeGlobalResourceTypes=true
  1. Create a delivery channel configuration file locally which specifies the channel attributes, populated from the prerequisites set up previously:
{
"name": "default",
"s3BucketName": "my-config-bucket",
"snsTopicARN": "arn:aws:sns:us-east-1:012345678912:my-config-notice",
"configSnapshotDeliveryProperties":{
"deliveryFrequency": "Twelve_Hours"
}
}
  1. Run this command to create a new delivery channel, referencing the json configuration file made in the previous step:
aws configservice put-delivery-channel --delivery-channel
file://deliveryChannel.json
  1. Start the configuration recorder by running the following command:
aws configservice start-configuration-recorder --configuration-recorder-name
default

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.cis_v300_3_3

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.cis_v300_3_3 --share

SQL

This control uses a named query:

config_enabled_all_regions

Tags