NEW: guardduty and kms key rotation
This commit is contained in:
parent
30b6131af9
commit
a804af15db
@ -0,0 +1,13 @@
|
|||||||
|
/*
|
||||||
|
Deploy aws guardduty service.
|
||||||
|
*/
|
||||||
|
|
||||||
|
module aws-guardduty-module {
|
||||||
|
source = "../../../modules/security_identity_compliance/guardduty"
|
||||||
|
application = var.application
|
||||||
|
environment = var.environment
|
||||||
|
customer-name = var.customer-name
|
||||||
|
project = var.project
|
||||||
|
aws-region-short = var.aws-region-short
|
||||||
|
default-tags = local.default-tags
|
||||||
|
}
|
@ -2,6 +2,7 @@ resource "aws_kms_key" "ctbucket-key" {
|
|||||||
deletion_window_in_days = 7
|
deletion_window_in_days = 7
|
||||||
tags = var.default-tags
|
tags = var.default-tags
|
||||||
policy = data.aws_iam_policy_document.key-policy.json
|
policy = data.aws_iam_policy_document.key-policy.json
|
||||||
|
enable_key_rotation = true
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "aws_kms_alias" ctbucket-key-aliaas {
|
resource "aws_kms_alias" ctbucket-key-aliaas {
|
||||||
|
17
modules/security_identity_compliance/guardduty/README.md
Normal file
17
modules/security_identity_compliance/guardduty/README.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
# Overview
|
||||||
|
This module performs the following tasks:
|
||||||
|
|
||||||
|
- Enable AWS config
|
||||||
|
- Create AWS config files for CIS benchmark
|
||||||
|
- Create s3 bucket for config use
|
||||||
|
|
||||||
|
## Inputs:
|
||||||
|
| Name | Description | Type | Default | Required |
|
||||||
|
|------|-------------|------|---------|:-----:|
|
||||||
|
| application | name of application | string | none | yes |
|
||||||
|
| environment | capacity of environment (prd/dev/lab) | string | none | yes |
|
||||||
|
| customer-name | owner of aws resources | string | none | yes |
|
||||||
|
| project | name of project | string | none | yes |
|
||||||
|
| default-tags | tags to be added to resources | list | none | yes |
|
||||||
|
| aws-region-short | short name of aws region (e.g. apne1) | string | none | yes |
|
||||||
|
|
8
modules/security_identity_compliance/guardduty/main.tf
Normal file
8
modules/security_identity_compliance/guardduty/main.tf
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
data aws_caller_identity this {}
|
||||||
|
|
||||||
|
resource aws_guardduty_detector gd {
|
||||||
|
enable = true
|
||||||
|
finding_publishing_frequency = "ONE_HOUR"
|
||||||
|
tags = var.default-tags
|
||||||
|
}
|
||||||
|
|
@ -0,0 +1,3 @@
|
|||||||
|
output guardduty-arn {
|
||||||
|
value = aws_guardduty_detector.gd.arn
|
||||||
|
}
|
12
modules/security_identity_compliance/guardduty/variables.tf
Normal file
12
modules/security_identity_compliance/guardduty/variables.tf
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
variable "customer-name" {}
|
||||||
|
variable "environment" {}
|
||||||
|
variable "project" {}
|
||||||
|
variable "application" {}
|
||||||
|
variable "aws-region-short" {}
|
||||||
|
variable "default-tags" {}
|
||||||
|
|
||||||
|
locals {
|
||||||
|
ct-bucket-name = "${var.environment}-${var.aws-region-short}-${var.customer-name}-${var.project}-ctbucket-${data.aws_caller_identity.this.account_id}"
|
||||||
|
resource-prefix = "${var.environment}-${var.aws-region-short}-${var.customer-name}-${var.project}"
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in New Issue
Block a user