Control: 2.21 Ensure a log monitoring and alerts are set up for OSS bucket policy changes
Description
Real-time monitoring of API calls can be achieved by directing ActionTrail Logs to Log Service and establishing corresponding query and alarms. It is recommended that a query and alarm be established for changes to OSS bucket policies.
Remediation
Perform the following to ensure the log monitoring and alerts are set up for OSS bucket policy changes:
- Logon to SLS Console.
- Click
Log Service Audit Servicein the navigation pane. - Go to
Access to Cloud Products > Global Configurationpage.- Select a location of project for logs.
- Check the
Action Trailand configure a proper number of days. - Click
Saveto save the changes.
- Go to
Access to Cloud Products > Global ConfigurationsclickCentral Project. - Select
Log Management > Actiontrail Log. - In the search/analytics console, input the following query:
"event.eventName": PutBucketLifecycle or "event.eventName": PutBucketPolicy or "event.eventName": PutBucketCors or "event.eventName": PutBucketEncryption or "event.eventName": PutBucketReplication or "event.eventName":DeleteBucketPolicy or "event.eventName": DeleteBucketCors or "event.eventName": DeleteBucketLifecycle or "event.eventName": DeleteBucketEncryption or "event.eventName": DeleteBucketReplication) | select bucket, count(1) as cnt
- Create a dashboard and set alert for the query result.
Default Value:
The monitoring dashboard and alert is not set by default.
Usage
Run the control in your terminal:
powerpipe control run alicloud_compliance.control.cis_v200_2_21Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run alicloud_compliance.control.cis_v200_2_21 --shareSQL
This control uses a named query:
with actiontrail_check as ( select name as trail_name, account_id, status, sls_project_arn, sls_write_role_arn, home_region, trail_region, substring(sls_project_arn from 'acs:log:([^:]+):') as sls_region, substring(sls_project_arn from 'project/([^/]+)') as sls_project_name from alicloud_action_trail where status = 'Enable' and sls_project_arn is not null), alert_check as ( select project, region, name as alert_name, display_name, status as alert_status, coalesce( query_obj ->> 'Query', query_obj ->> 'query', query_obj::text ) as query_text from alicloud_sls_alert, jsonb_array_elements(query_list) as query_obj where (status = 'ENABLED' or status is null) and query_list is not null and ( coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="PutBucketLifecycle"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="PutBucketPolicy"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="PutBucketCors"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="PutBucketEncryption"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="PutBucketReplication"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="DeleteBucketPolicy"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="DeleteBucketCors"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="DeleteBucketLifecycle"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="DeleteBucketEncryption"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%event.eventName="DeleteBucketReplication"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "PutBucketLifecycle"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "PutBucketPolicy"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "PutBucketCors"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "PutBucketEncryption"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "PutBucketReplication"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "DeleteBucketPolicy"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "DeleteBucketCors"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "DeleteBucketLifecycle"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "DeleteBucketEncryption"%' or coalesce(query_obj ->> 'Query', query_obj ->> 'query', query_obj::text) ilike '%"event.eventName": "DeleteBucketReplication"%' )),matched_pairs as ( select distinct at.trail_name, at.sls_region, at.home_region, ac.alert_name, ac.region as alert_region from actiontrail_check at inner join alert_check ac on trim(lower(coalesce(at.sls_region, ''))) = trim(lower(coalesce(ac.region, ''))) and at.sls_region is not null and ac.region is not null and at.sls_region != '' and ac.region != '')select 'acs:actiontrail:' || at.home_region || ':' || at.account_id || ':actiontrail/' || at.name as resource, case when at.status = 'Enable' and at.sls_project_arn is not null and exists (select 1 from matched_pairs mp where mp.trail_name = at.name) then 'ok' else 'alarm' end as status, case when at.status = 'Enable' and at.sls_project_arn is not null and exists (select 1 from matched_pairs mp where mp.trail_name = at.name) then at.name || ' is configured with ActionTrail enabled, delivering to SLS project in region ' || substring(at.sls_project_arn from 'acs:log:([^:]+):') || ', and has an OSS bucket policy change monitoring alert configured' when at.status = 'Enable' and at.sls_project_arn is not null then at.name || ' is configured with ActionTrail enabled and delivering to SLS project in region ' || substring(at.sls_project_arn from 'acs:log:([^:]+):') || ', but no OSS bucket policy change monitoring alert found in that region' when at.status = 'Enable' and at.sls_project_arn is null then at.name || ' is enabled but not configured to deliver logs to SLS' else at.name || ' is not enabled' end as reason , account_id as account_id, region as regionfrom alicloud_action_trail at;