-
Notifications
You must be signed in to change notification settings - Fork 178
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
adding new plugins for open ec2 sg rules and rds logging
- Loading branch information
1 parent
489a2bd
commit 6f9439f
Showing
7 changed files
with
93 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com) | ||
|
||
# AWS / EC2 / Open Hadoop HDFS NameNode Metadata Service | ||
|
||
## Quick Info | ||
|
||
| | | | ||
|-|-| | ||
| **Plugin Title** | Open Hadoop HDFS NameNode Metadata Service | | ||
| **Cloud** | AWS | | ||
| **Category** | EC2 | | ||
| **Description** | Determine if TCP port 8020 for HDFS NameNode metadata service is open to the public | | ||
| **More Info** | While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as Hadoop/HDFS should be restricted to known IP addresses. | | ||
| **AWS Link** | http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/authorizing-access-to-an-instance.html | | ||
| **Recommended Action** | Restrict TCP port 8020 to known IP addresses for Hadoop/HDFS | | ||
|
||
## Detailed Remediation Steps | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com) | ||
|
||
# AWS / EC2 / Open Hadoop HDFS NameNode WebUI | ||
|
||
## Quick Info | ||
|
||
| | | | ||
|-|-| | ||
| **Plugin Title** | Open Hadoop HDFS NameNode WebUI | | ||
| **Cloud** | AWS | | ||
| **Category** | EC2 | | ||
| **Description** | Determine if TCP port 50070 and 50470 for Hadoop/HDFS NameNode WebUI service is open to the public | | ||
| **More Info** | While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as Hadoop/HDFS should be restricted to known IP addresses. | | ||
| **AWS Link** | http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/authorizing-access-to-an-instance.html | | ||
| **Recommended Action** | Restrict TCP port 50070 and 50470 to known IP addresses for Hadoop/HDFS | | ||
|
||
## Detailed Remediation Steps | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com) | ||
|
||
# AWS / EC2 / Open Kibana | ||
|
||
## Quick Info | ||
|
||
| | | | ||
|-|-| | ||
| **Plugin Title** | Open Kibana | | ||
| **Cloud** | AWS | | ||
| **Category** | EC2 | | ||
| **Description** | Determine if TCP port 5601 for Kibana is open to the public | | ||
| **More Info** | While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as Kibana should be restricted to known IP addresses. | | ||
| **AWS Link** | http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/authorizing-access-to-an-instance.html | | ||
| **Recommended Action** | Restrict TCP port 5601 to known IP addresses | | ||
|
||
## Detailed Remediation Steps | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com) | ||
|
||
# AWS / IAM / Canary Keys Used | ||
|
||
## Quick Info | ||
|
||
| | | | ||
|-|-| | ||
| **Plugin Title** | Canary Keys Used | | ||
| **Cloud** | AWS | | ||
| **Category** | IAM | | ||
| **Description** | Detects when a special canary-token access key has been used | | ||
| **More Info** | Canary access keys can be created with limited permissions and then used to detect when a potential breach occurs. | | ||
| **AWS Link** | https://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingCredentials.html | | ||
| **Recommended Action** | Create a canary access token and provide its user to CloudSploit. If CloudSploit detects that the account is in use, it will trigger a failure. | | ||
|
||
## Detailed Remediation Steps | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com) | ||
|
||
# AWS / RDS / RDS Logging Enabled | ||
|
||
## Quick Info | ||
|
||
| | | | ||
|-|-| | ||
| **Plugin Title** | RDS Logging Enabled | | ||
| **Cloud** | AWS | | ||
| **Category** | RDS | | ||
| **Description** | Ensures logging is configured for RDS instances | | ||
| **More Info** | Logging database level events enables teams to analyze events for the purpose diagnostics as well as audit tracking for compliance purposes. | | ||
| **AWS Link** | https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_LogAccess.html | | ||
| **Recommended Action** | Modify the RDS instance to enable logging as required. | | ||
|
||
## Detailed Remediation Steps | ||
|