Skip to content

Commit

Permalink
refactor securityhub component (cloudposse/terraform-aws-components#728)
Browse files Browse the repository at this point in the history
Co-authored-by: cloudpossebot <[email protected]>
  • Loading branch information
mcalhoun and cloudpossebot authored Jun 21, 2023
0 parents commit e5e5728
Show file tree
Hide file tree
Showing 8 changed files with 872 additions and 0 deletions.
245 changes: 245 additions & 0 deletions src/README.md

Large diffs are not rendered by default.

279 changes: 279 additions & 0 deletions src/context.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,279 @@
#
# ONLY EDIT THIS FILE IN github.com/cloudposse/terraform-null-label
# All other instances of this file should be a copy of that one
#
#
# Copy this file from https://github.com/cloudposse/terraform-null-label/blob/master/exports/context.tf
# and then place it in your Terraform module to automatically get
# Cloud Posse's standard configuration inputs suitable for passing
# to Cloud Posse modules.
#
# curl -sL https://raw.githubusercontent.com/cloudposse/terraform-null-label/master/exports/context.tf -o context.tf
#
# Modules should access the whole context as `module.this.context`
# to get the input variables with nulls for defaults,
# for example `context = module.this.context`,
# and access individual variables as `module.this.<var>`,
# with final values filled in.
#
# For example, when using defaults, `module.this.context.delimiter`
# will be null, and `module.this.delimiter` will be `-` (hyphen).
#

module "this" {
source = "cloudposse/label/null"
version = "0.25.0" # requires Terraform >= 0.13.0

enabled = var.enabled
namespace = var.namespace
tenant = var.tenant
environment = var.environment
stage = var.stage
name = var.name
delimiter = var.delimiter
attributes = var.attributes
tags = var.tags
additional_tag_map = var.additional_tag_map
label_order = var.label_order
regex_replace_chars = var.regex_replace_chars
id_length_limit = var.id_length_limit
label_key_case = var.label_key_case
label_value_case = var.label_value_case
descriptor_formats = var.descriptor_formats
labels_as_tags = var.labels_as_tags

context = var.context
}

# Copy contents of cloudposse/terraform-null-label/variables.tf here

variable "context" {
type = any
default = {
enabled = true
namespace = null
tenant = null
environment = null
stage = null
name = null
delimiter = null
attributes = []
tags = {}
additional_tag_map = {}
regex_replace_chars = null
label_order = []
id_length_limit = null
label_key_case = null
label_value_case = null
descriptor_formats = {}
# Note: we have to use [] instead of null for unset lists due to
# https://github.com/hashicorp/terraform/issues/28137
# which was not fixed until Terraform 1.0.0,
# but we want the default to be all the labels in `label_order`
# and we want users to be able to prevent all tag generation
# by setting `labels_as_tags` to `[]`, so we need
# a different sentinel to indicate "default"
labels_as_tags = ["unset"]
}
description = <<-EOT
Single object for setting entire context at once.
See description of individual variables for details.
Leave string and numeric variables as `null` to use default value.
Individual variable settings (non-null) override settings in context object,
except for attributes, tags, and additional_tag_map, which are merged.
EOT

validation {
condition = lookup(var.context, "label_key_case", null) == null ? true : contains(["lower", "title", "upper"], var.context["label_key_case"])
error_message = "Allowed values: `lower`, `title`, `upper`."
}

validation {
condition = lookup(var.context, "label_value_case", null) == null ? true : contains(["lower", "title", "upper", "none"], var.context["label_value_case"])
error_message = "Allowed values: `lower`, `title`, `upper`, `none`."
}
}

variable "enabled" {
type = bool
default = null
description = "Set to false to prevent the module from creating any resources"
}

variable "namespace" {
type = string
default = null
description = "ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique"
}

variable "tenant" {
type = string
default = null
description = "ID element _(Rarely used, not included by default)_. A customer identifier, indicating who this instance of a resource is for"
}

variable "environment" {
type = string
default = null
description = "ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT'"
}

variable "stage" {
type = string
default = null
description = "ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release'"
}

variable "name" {
type = string
default = null
description = <<-EOT
ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as a `tag`.
The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input.
EOT
}

variable "delimiter" {
type = string
default = null
description = <<-EOT
Delimiter to be used between ID elements.
Defaults to `-` (hyphen). Set to `""` to use no delimiter at all.
EOT
}

variable "attributes" {
type = list(string)
default = []
description = <<-EOT
ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`,
in the order they appear in the list. New attributes are appended to the
end of the list. The elements of the list are joined by the `delimiter`
and treated as a single ID element.
EOT
}

variable "labels_as_tags" {
type = set(string)
default = ["default"]
description = <<-EOT
Set of labels (ID elements) to include as tags in the `tags` output.
Default is to include all labels.
Tags with empty values will not be included in the `tags` output.
Set to `[]` to suppress all generated tags.
**Notes:**
The value of the `name` tag, if included, will be the `id`, not the `name`.
Unlike other `null-label` inputs, the initial setting of `labels_as_tags` cannot be
changed in later chained modules. Attempts to change it will be silently ignored.
EOT
}

variable "tags" {
type = map(string)
default = {}
description = <<-EOT
Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`).
Neither the tag keys nor the tag values will be modified by this module.
EOT
}

variable "additional_tag_map" {
type = map(string)
default = {}
description = <<-EOT
Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`.
This is for some rare cases where resources want additional configuration of tags
and therefore take a list of maps with tag key, value, and additional configuration.
EOT
}

variable "label_order" {
type = list(string)
default = null
description = <<-EOT
The order in which the labels (ID elements) appear in the `id`.
Defaults to ["namespace", "environment", "stage", "name", "attributes"].
You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present.
EOT
}

variable "regex_replace_chars" {
type = string
default = null
description = <<-EOT
Terraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits.
EOT
}

variable "id_length_limit" {
type = number
default = null
description = <<-EOT
Limit `id` to this many characters (minimum 6).
Set to `0` for unlimited length.
Set to `null` for keep the existing setting, which defaults to `0`.
Does not affect `id_full`.
EOT
validation {
condition = var.id_length_limit == null ? true : var.id_length_limit >= 6 || var.id_length_limit == 0
error_message = "The id_length_limit must be >= 6 if supplied (not null), or 0 for unlimited length."
}
}

variable "label_key_case" {
type = string
default = null
description = <<-EOT
Controls the letter case of the `tags` keys (label names) for tags generated by this module.
Does not affect keys of tags passed in via the `tags` input.
Possible values: `lower`, `title`, `upper`.
Default value: `title`.
EOT

validation {
condition = var.label_key_case == null ? true : contains(["lower", "title", "upper"], var.label_key_case)
error_message = "Allowed values: `lower`, `title`, `upper`."
}
}

variable "label_value_case" {
type = string
default = null
description = <<-EOT
Controls the letter case of ID elements (labels) as included in `id`,
set as tag values, and output by this module individually.
Does not affect values of tags passed in via the `tags` input.
Possible values: `lower`, `title`, `upper` and `none` (no transformation).
Set this to `title` and set `delimiter` to `""` to yield Pascal Case IDs.
Default value: `lower`.
EOT

validation {
condition = var.label_value_case == null ? true : contains(["lower", "title", "upper", "none"], var.label_value_case)
error_message = "Allowed values: `lower`, `title`, `upper`, `none`."
}
}

variable "descriptor_formats" {
type = any
default = {}
description = <<-EOT
Describe additional descriptors to be output in the `descriptors` output map.
Map of maps. Keys are names of descriptors. Values are maps of the form
`{
format = string
labels = list(string)
}`
(Type is `any` so the map values can later be enhanced to provide additional options.)
`format` is a Terraform format string to be passed to the `format()` function.
`labels` is a list of labels, in order, to pass to `format()` function.
Label values will be normalized before being passed to `format()` so they will be
identical to how they appear in `id`.
Default is `{}` (`descriptors` output will be empty).
EOT
}

#### End of copy of cloudposse/terraform-null-label/variables.tf
77 changes: 77 additions & 0 deletions src/main.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
locals {
enabled = module.this.enabled
account_map = module.account_map.outputs.full_account_map

current_account_id = one(data.aws_caller_identity.this[*].account_id)
member_account_id_list = [for a in keys(local.account_map) : (local.account_map[a]) if local.account_map[a] != local.current_account_id]
org_delegated_administrator_account_id = local.account_map[var.delegated_administrator_account_name]
org_management_account_id = var.organization_management_account_name == null ? local.account_map[module.account_map.outputs.root_account_account_name] : local.account_map[var.organization_management_account_name]
is_org_delegated_administrator_account = local.current_account_id == local.org_delegated_administrator_account_id
is_org_management_account = local.current_account_id == local.org_management_account_id
is_finding_aggregation_region = local.enabled && var.finding_aggregator_enabled && var.finding_aggregation_region == data.aws_region.this[0].name

create_sns_topic = local.enabled && var.create_sns_topic
create_securityhub = local.enabled && local.is_org_delegated_administrator_account && !var.admin_delegated
create_org_delegation = local.enabled && local.is_org_management_account
create_org_configuration = local.enabled && local.is_org_delegated_administrator_account && var.admin_delegated
}

data "aws_caller_identity" "this" {
count = local.enabled ? 1 : 0
}

data "aws_region" "this" {
count = local.enabled ? 1 : 0
}

# If we are running in the AWS Org Management account, delegate Security Hub to the Delegated Admininstrator account
# (usually the security account). We also need to turn on Security Hub in the Management account so that it can
# aggregate findings and be managed by the Delegated Admininstrator account.
resource "aws_securityhub_organization_admin_account" "this" {
count = local.create_org_delegation ? 1 : 0

admin_account_id = local.org_delegated_administrator_account_id
}

resource "aws_securityhub_account" "this" {
count = local.create_org_delegation ? 1 : 0

enable_default_standards = var.default_standards_enabled
}

# If we are running in the AWS Org designated administrator account, enable Security Hub and optionally enable standards
# and finding aggregation
module "security_hub" {
count = local.create_securityhub ? 1 : 0
source = "cloudposse/security-hub/aws"
version = "0.10.0"


cloudwatch_event_rule_pattern_detail_type = var.cloudwatch_event_rule_pattern_detail_type
create_sns_topic = local.create_sns_topic
enable_default_standards = var.default_standards_enabled
enabled_standards = var.enabled_standards
finding_aggregator_enabled = local.is_finding_aggregation_region
finding_aggregator_linking_mode = var.finding_aggregator_linking_mode
finding_aggregator_regions = var.finding_aggregator_regions
imported_findings_notification_arn = var.findings_notification_arn
subscribers = var.subscribers

context = module.this.context
}

# If we are running in the AWS Org designated administrator account with admin_delegated set to tru, set the AWS
# Organization-wide Security Hub configuration by configuring all other accounts to send their Security Hub findings to
# this account.
resource "awsutils_security_hub_organization_settings" "this" {
count = local.create_org_configuration ? 1 : 0

member_accounts = local.member_account_id_list
}

resource "aws_securityhub_organization_configuration" "this" {
count = local.create_org_configuration ? 1 : 0

auto_enable = var.auto_enable_organization_members
auto_enable_standards = var.default_standards_enabled ? "DEFAULT" : "NONE"
}
14 changes: 14 additions & 0 deletions src/outputs.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
output "delegated_administrator_account_id" {
value = local.org_delegated_administrator_account_id
description = "The AWS Account ID of the AWS Organization delegated administrator account"
}

output "sns_topic_name" {
value = local.create_securityhub ? try(module.security_hub[0].sns_topic.name, null) : null
description = "The name of the SNS topic created by the component"
}

output "sns_topic_subscriptions" {
value = local.create_securityhub ? try(module.security_hub[0].sns_topic_subscriptions, null) : null
description = "The SNS topic subscriptions created by the component"
}
Loading

0 comments on commit e5e5728

Please sign in to comment.