|
1 | 1 | provider "aws" {
|
2 |
| - region = "eu-west-1" |
| 2 | + region = "us-east-1" |
3 | 3 | }
|
4 | 4 |
|
5 | 5 | data "aws_caller_identity" "current" {}
|
6 | 6 | data "aws_region" "current" {}
|
7 | 7 |
|
8 |
| -module "cloudtrail" { |
9 |
| - source = "./../../" |
10 |
| - |
11 |
| - name = "trails" |
12 |
| - environment = "test" |
13 |
| - label_order = ["environment", "name"] |
14 |
| - |
15 |
| - enabled = true |
16 |
| - iam_role_name = "CloudTrail-CloudWatch-Delivery-Role" |
17 |
| - iam_role_policy_name = "CloudTrail-CloudWatch-Delivery-Policy" |
18 |
| - account_type = "master" |
19 |
| - key_deletion_window_in_days = 10 |
20 |
| - cloudwatch_logs_retention_in_days = 365 |
21 |
| - cloudwatch_logs_group_name = "cloudtrail-log-group" |
22 |
| - EVENT_IGNORE_LIST = jsonencode(["^Describe*", "^Assume*", "^List*", "^Get*", "^Decrypt*", "^Lookup*", "^BatchGet*", "^CreateLogStream$", "^RenewRole$", "^REST.GET.OBJECT_LOCK_CONFIGURATION$", "TestEventPattern", "TestScheduleExpression", "CreateNetworkInterface", "ValidateTemplate"]) |
23 |
| - EVENT_ALERT_LIST = jsonencode(["DetachRolePolicy", "ConsoleLogin"]) |
24 |
| - USER_IGNORE_LIST = jsonencode(["^awslambda_*", "^aws-batch$", "^bamboo*", "^i-*", "^[0-9]*$", "^ecs-service-scheduler$", "^AutoScaling$", "^AWSCloudFormation$", "^CloudTrailBot$", "^SLRManagement$"]) |
25 |
| - SOURCE_LIST = jsonencode(["aws-sdk-go"]) |
26 |
| - |
27 |
| - s3_bucket_name = "logs-bucket-cd" |
28 |
| - secure_s3_enabled = false |
29 |
| - s3_log_bucket_name = "logs-bucket-cd-logs" |
30 |
| - sse_algorithm = "aws:kms" |
31 |
| - slack_webhook = "https://hooks.slack.com/services/TEE0GHDK0F0QZ/B015frHRDBEUFHEVEG/dfdrfrefrwewqe" |
32 |
| - slack_channel = "testing" |
33 |
| - additional_member_root_arn = ["arn:aws:iam::xxxxxxxxxxxx:root"] |
34 |
| - additional_member_trail = ["arn:aws:cloudtrail:*:xxxxxxxxxxxx:trail/*"] |
35 |
| - additional_member_account_id = ["xxxxxxxxxxxx"] |
36 |
| - additional_s3_account_path_arn = ["arn:aws:s3:::logs-bucket-clouddrove/AWSLogs/xxxxxxxxxxxx/*"] |
37 |
| - s3_policy = data.aws_iam_policy_document.default.json |
38 |
| -} |
| 8 | + module "cloudtrail" { |
| 9 | + source = "./../../" |
| 10 | + name = "test-cloudtrail" |
| 11 | + environment = "main" |
| 12 | + label_order = ["environment", "name"] |
| 13 | + enabled = true |
| 14 | + iam_role_name = "CloudTrail-CloudWatch-Delivery-Role" |
| 15 | + iam_role_policy_name = "CloudTrail-CloudWatch-Delivery-Policy" |
| 16 | + account_type = "master" |
| 17 | + key_deletion_window_in_days = 10 |
| 18 | + cloudwatch_logs_retention_in_days = 365 |
| 19 | + cloudwatch_logs_group_name = "cloudtrail-log-group" |
| 20 | + EVENT_IGNORE_LIST = jsonencode(["^Describe*", "^Assume*", "^List*", "^Get*", "^Decrypt*", "^Lookup*", "^BatchGet*", "^CreateLogStream$", "^RenewRole$", "^REST.GET.OBJECT_LOCK_CONFIGURATION$", "TestEventPattern", "TestScheduleExpression", "CreateNetworkInterface", "ValidateTemplate"]) |
| 21 | + EVENT_ALERT_LIST = jsonencode(["DetachRolePolicy", "ConsoleLogin"]) |
| 22 | + USER_IGNORE_LIST = jsonencode(["^awslambda_*", "^aws-batch$", "^bamboo*", "^i-*", "^[0-9]*$", "^ecs-service-scheduler$", "^AutoScaling$", "^AWSCloudFormation$", "^CloudTrailBot$", "^SLRManagement$"]) |
| 23 | + SOURCE_LIST = jsonencode(["aws-sdk-go"]) |
| 24 | + s3_bucket_name = "test-cloudtrail-bucket" |
| 25 | + secure_s3_enabled = false |
| 26 | + s3_log_bucket_name = "test-clouddtrail-logs" |
| 27 | + sse_algorithm = "aws:kms" |
| 28 | + additional_member_root_arn = ["arn:aws:iam::xxxxxxxxxxxx:root"] |
| 29 | + additional_member_trail = ["arn:aws:cloudtrail:*:xxxxxxxxxxxx:trail/*"] |
| 30 | + additional_member_account_id = ["xxxxxxxxxxxx"] |
| 31 | + additional_s3_account_path_arn = ["arn:aws:s3:::test-cloudtrail-bucket/AWSLogs/xxxxxxxxxxxx/*"] |
| 32 | + s3_policy = data.aws_iam_policy_document.default.json |
| 33 | + } |
39 | 34 |
|
40 |
| -data "aws_iam_policy_document" "default" { |
41 |
| - statement { |
42 |
| - sid = "AWSCloudTrailAclCheck" |
43 | 35 |
|
44 |
| - principals { |
45 |
| - type = "Service" |
46 |
| - identifiers = ["cloudtrail.amazonaws.com"] |
47 |
| - } |
| 36 | + data "aws_iam_policy_document" "default" { |
| 37 | + statement { |
| 38 | + sid = "AWSCloudTrailAclCheck20150319" |
48 | 39 |
|
49 |
| - actions = [ |
50 |
| - "s3:GetBucketAcl" |
51 |
| - ] |
| 40 | + principals { |
| 41 | + type = "Service" |
| 42 | + identifiers = ["cloudtrail.amazonaws.com"] |
| 43 | + } |
52 | 44 |
|
53 |
| - resources = ["arn:aws:s3:::logs-bucket-cd"] |
54 |
| - } |
| 45 | + actions = [ |
| 46 | + "s3:GetBucketAcl" |
| 47 | + ] |
55 | 48 |
|
56 |
| - statement { |
57 |
| - sid = "AWSCloudTrailWrite" |
| 49 | + resources = ["arn:aws:s3:::test-cloudtrail-bucket"] |
| 50 | + condition { |
| 51 | + test = "StringEquals" |
| 52 | + variable = "AWS:SourceArn" |
58 | 53 |
|
59 |
| - principals { |
60 |
| - type = "Service" |
61 |
| - identifiers = ["cloudtrail.amazonaws.com"] |
| 54 | + values = [ |
| 55 | + "arn:aws:cloudtrail:us-east-1:xxxxxxxxxxxx:trail/xcheck-trails" |
| 56 | + ] |
| 57 | + } |
62 | 58 | }
|
| 59 | + statement { |
| 60 | + sid = "AWSCloudTrailWrite20150319" |
63 | 61 |
|
64 |
| - actions = [ |
65 |
| - "s3:PutObject" |
66 |
| - ] |
| 62 | + principals { |
| 63 | + type = "Service" |
| 64 | + identifiers = ["cloudtrail.amazonaws.com"] |
| 65 | + } |
67 | 66 |
|
68 |
| - resources = compact( |
69 |
| - concat( |
70 |
| - [format("arn:aws:s3:::logs-bucket-cd/AWSLogs/%s/*", data.aws_caller_identity.current.account_id), "arn:aws:s3:::logs-bucket-cd/AWSLogs/xxxxxxxxxxxx/*"] |
71 |
| - ) |
72 |
| - ) |
| 67 | + actions = [ |
| 68 | + "s3:PutObject" |
| 69 | + ] |
73 | 70 |
|
74 |
| - condition { |
75 |
| - test = "StringEquals" |
76 |
| - variable = "s3:x-amz-acl" |
| 71 | + resources = ["arn:aws:s3:::test-cloudtrail-bucket/AWSLogs/xxxxxxxxxxxx/*"] |
77 | 72 |
|
78 |
| - values = [ |
79 |
| - "bucket-owner-full-control" |
80 |
| - ] |
| 73 | + condition { |
| 74 | + test = "StringEquals" |
| 75 | + variable = "s3:x-amz-acl" |
| 76 | + |
| 77 | + values = [ |
| 78 | + "bucket-owner-full-control" |
| 79 | + ] |
| 80 | + } |
| 81 | + condition { |
| 82 | + test = "StringEquals" |
| 83 | + variable = "AWS:SourceArn" |
| 84 | + |
| 85 | + values = [ |
| 86 | + "arn:aws:cloudtrail:us-east-1:xxxxxxxxxxxx:trail/xcheck-trails" |
| 87 | + ] |
| 88 | + } |
81 | 89 | }
|
| 90 | + |
| 91 | + statement { |
| 92 | + sid = "AWSCloudTrailWrite2015031" |
| 93 | + |
| 94 | + principals { |
| 95 | + type = "Service" |
| 96 | + identifiers = ["cloudtrail.amazonaws.com"] |
| 97 | + } |
| 98 | + |
| 99 | + actions = [ |
| 100 | + "s3:PutObject" |
| 101 | + ] |
| 102 | + |
| 103 | + resources = ["arn:aws:s3:::logs-bucket-cd-test/AWSLogs/<AWS_ORGANIZATION_ID>/*"] |
| 104 | + |
| 105 | + condition { |
| 106 | + test = "StringEquals" |
| 107 | + variable = "s3:x-amz-acl" |
| 108 | + |
| 109 | + values = [ |
| 110 | + "bucket-owner-full-control" |
| 111 | + ] |
| 112 | + } |
| 113 | + condition { |
| 114 | + test = "StringEquals" |
| 115 | + variable = "AWS:SourceArn" |
| 116 | + |
| 117 | + values = [ |
| 118 | + "arn:aws:cloudtrail:us-east-1:xxxxxxxxxxxx:trail/xcheck-trails" |
| 119 | + ] |
| 120 | + } |
| 121 | + } |
82 | 122 | }
|
83 |
| -} |
|
0 commit comments