turbot/steampipe-mod-aws-compliance

Control: GuardDuty Detector should be centrally configured

Description

Ensure that GuardDuty is centrally configured, if GuardDuty is not under central management, it becomes impossible to centrally manage GuardDuty findings, settings, and member accounts.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.guardduty_centrally_configured

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.guardduty_centrally_configured --share

SQL

This control uses a named query:

select
'arn:' || r.partition || '::' || r.region || ':' || r.account_id as resource,
case
when r.region = any(array['af-south-1', 'ap-northeast-3', 'ap-southeast-3', 'eu-south-1', 'cn-north-1', 'cn-northwest-1', 'me-south-1', 'us-gov-east-1']) then 'skip'
-- Skip any regions that are disabled in the account.
when r.opt_in_status = 'not-opted-in' then 'skip'
when status is null then 'info'
when status = 'DISABLED' then 'alarm'
when status = 'ENABLED' and master_account ->> 'AccountId' is not null then 'ok'
else 'alarm'
end as status,
case
when r.region = any(array['af-south-1', 'ap-northeast-3', 'ap-southeast-3', 'eu-south-1', 'cn-north-1', 'cn-northwest-1', 'me-south-1', 'us-gov-east-1']) then r.region || ' region not supported.'
when r.opt_in_status = 'not-opted-in' then r.region || ' region is disabled.'
when status is null then 'No GuardDuty detector found in ' || r.region || '.'
when status = 'DISABLED' then r.region || ' detector ' || d.title || ' disabled.'
when status = 'ENABLED' and master_account ->> 'AccountId' is not null then r.region || ' detector ' || d.title || ' centrally configured.'
else r.region || ' detector ' || d.title || ' not centrally configured..'
end as reason
, r.region, r.account_id
from
aws_region as r
left join aws_guardduty_detector d on r.account_id = d.account_id and r.name = d.region;

Tags