Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/zoph-io/aws-security-survival-kit
Bare minimum AWS Security Alerting and Configuration
https://github.com/zoph-io/aws-security-survival-kit
alerting aws observability security
Last synced: 2 months ago
JSON representation
Bare minimum AWS Security Alerting and Configuration
- Host: GitHub
- URL: https://github.com/zoph-io/aws-security-survival-kit
- Owner: zoph-io
- License: gpl-3.0
- Created: 2022-09-20T12:43:15.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-07-31T12:19:42.000Z (6 months ago)
- Last Synced: 2024-08-01T22:04:13.952Z (6 months ago)
- Topics: alerting, aws, observability, security
- Language: Makefile
- Homepage: https://bio.link/zoph
- Size: 740 KB
- Stars: 442
- Watchers: 19
- Forks: 37
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-github-repos - zoph-io/aws-security-survival-kit - Bare minimum AWS Security Alerting and Configuration (Makefile)
README
# 🚑 AWS Security Survival Kit
## :brain: Rationale
This AWS Security Survival Kit (ASSK) sets up a basic proactive monitoring and alerting environment on common suspicious activities in your AWS Account.
We know that [CloudTrail](https://aws.amazon.com/cloudtrail/) is the bare minimum service to activate on a newly created AWS Account to track all activities on your AWS account. It helps, but this will not alert you to suspicious activities by itself. You still have to check periodically if something has gone wrong in multiple services and the console.
With these CloudFormation templates, you will bring proactive security monitoring and alerting to your AWS account. It's complementary to the GuardDuty service as there are no built-in alerts on GuardDuty.
## ✅ Secure by Default
This kit will also enable the following default security configuration to your AWS Account.
1. EBS Volumes Default Encryption (Region level)
2. S3 Block Public Access (Account level)
3. Block AMI Public Sharing ([Region](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/sharingamis-intro.html#block-public-access-to-amis) level) - [from 2023-10-20](https://aws.amazon.com/about-aws/whats-new/2023/10/ami-block-public-enabled-aws-accounts-no-public-amis/)
4. Block Snapshot Public Sharing ([Region](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/sharingamis-intro.html#block-public-access-to-amis) level) - [from 2023-11-09](https://aws.amazon.com/blogs/aws/new-block-public-sharing-of-amazon-ebs-snapshots/)
5. Enable IMDSv2 by Default for new Instances (Region Level) - [from 2024-03-25](https://aws.amazon.com/about-aws/whats-new/2024/03/set-imdsv2-default-new-instance-launches/)## 💾 Suspicious Activities
Using this kit, you will deploy EventBridge (CloudWatch Event) Rules and CloudWatch Metric Filters and Alarms on select suspicious activities. It comes with a CloudWatch Dashboard to give you more insights about what is ringing 🔔
The following suspicious activities are currently supported:
1. Root User activities
2. CloudTrail changes (`StopLogging`, `DeleteTrail`, `UpdateTrail`)
3. AWS Personal Health Dashboard Events
4. IAM Users Changes (`Create`, `Delete`, `Update`, `CreateAccessKey`, etc..)
5. MFA Monitoring (`CreateVirtualMFADevice` `DeactivateMFADevice` `DeleteVirtualMFADevice`, etc..)
6. Unauthorized Operations (`Access Denied`, `UnauthorizedOperation`)
7. Failed AWS Console login authentication (`ConsoleLoginFailures`)
8. EBS Snapshots Exfiltration (`ModifySnapshotAttribute`, `SharedSnapshotCopyInitiated` `SharedSnapshotVolumeCreated`)
9. AMI Exfiltration (`ModifyImageAttribute`)
10. Who Am I Calls (`GetCallerIdentity`)
11. IMDSv1 RunInstances (`RunInstances` && `optional` http tokens)
12. CloudShell Exfiltration (`GetFileDownloadUrls`)## :keyboard: Usage
### Parameters
- `AlarmRecipient`: Recipient for the alerts (e.g.: [email protected])
- `Project`: Name of the Project (e.g.: aws-security-survival-kit)
- `Description`: Description of the Project (e.g.: Bare minimum ...)
- `LocalAWSRegion`: Region where your workloads and CloudTrail are located (e.g.: `eu-west-1`)
- `CTLogGroupName`: Cloudtrail CloudWatch LogGroup nameSetup the correct parameters in the `Makefile`, then run the following command:
$ make deploy
### 📫 Notifications
> You will receive alerts by emails sent by SNS Topic
![Email Notification](./assets/notification.png)
### :robot: ChatOps
Setup [AWS Chatbot](https://aws.amazon.com/chatbot/) for best experience to get notified directly on Slack.
![Slack Alerts](./assets/slack-alert03.png)
![Slack Alerts](./assets/slack-alert02.png)### 📈 Dashboard
ASSK comes with a CloudWatch Dashboard, please don't hesitate to adjust to your needs.
![dashboard](assets/dashboard.png)
## :man_technologist: Credits
- 🏴☠️ AWS Security Boutique: [zoph.io](https://zoph.io)
- 💌 [AWS Security Digest Newsletter](https://awssecuritydigest.com)
- 🐦 X/Twitter: [zoph](https://twitter.com/zoph)## 🌧️ Other CSP Initiatives
- [Microsoft Azure](https://github.com/O3-Cyber/azure-security-survival-kit) from folks @[O3 Cyber](https://www.o3c.no/)