Skip to content
This repository has been archived by the owner on Jul 22, 2021. It is now read-only.

CIS-3.10-SecurityGroupChanges failed in AWS but passed here #96

Open
azhurbilo opened this issue Apr 28, 2020 · 0 comments
Open

CIS-3.10-SecurityGroupChanges failed in AWS but passed here #96

azhurbilo opened this issue Apr 28, 2020 · 0 comments

Comments

@azhurbilo
Copy link

CIS-3.10-SecurityGroupChanges failed in AWS but passed here

previously when I set pattern which described in guide - CIS Score PASSED

pattern        = "{ $.eventName = AuthorizeSecurityGroupIngress) || ($.eventName = AuthorizeSecurityGroupEgress) || ($.eventName = RevokeSecurityGroupIngress) || ($.eventName = RevokeSecurityGroupEgress) || ($.eventName = CreateSecurityGroup) || ($.eventName = DeleteSecurityGroup }"

but when I add additional filter by terraform user CIS Score FAILED in AWS console.

pattern        = "{ ($.eventName = AuthorizeSecurityGroupIngress) || ($.eventName = AuthorizeSecurityGroupEgress) || ($.eventName = RevokeSecurityGroupIngress) || ($.eventName = RevokeSecurityGroupEgress) || ($.eventName = CreateSecurityGroup) || ($.eventName = DeleteSecurityGroup) && ($.userIdentity.userName NOT EXISTS || $.userIdentity.userName != \"terraform\") }"

But running "python aws-cis-foundation-benchmark-checklist.py" show that 3.10 Passed.

Where I can find real CIS score algorithms?
Can I extend rule pattern to filter false positives?

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant