Terraform Module: AWS Secure Baseline Logo

Terraform Module: AWS Secure Baseline

0
Free
Visit Website

A terraform module to set up your AWS account with the reasonably secure configuration baseline. Most configurations are based on CIS Amazon Web Services Foundations v1.4.0 and AWS Foundational Security Best Practices v1.0.0. See Benchmark Compliance to check which items in various benchmarks are covered. Features: Identity and Access Management Set up IAM Password Policy. Create an IAM role for contacting AWS support for incident handling. Enable AWS Config rules to audit root account status. Enable IAM Access Analyzer in each region. Enable S3 account-level Public Access Block configuration. Logging & Monitoring Enable CloudTrail in all regions and deliver events to CloudWatch Logs. Object-level logging for all S3 buckets is enabled by default. CloudTrail Insights event logging is enabled by default. CloudTrail logs are encrypted using AWS Key Management Service. All logs are stored in the S3 bucket with access logging enabled. Logs are automatically archived into Amazon Glacier after the given period(defaults to 90 days). Set up CloudWatch alarms to notify you when critical changes happen in your AWS account. Enable AWS Config to monitor and enforce compliance with AWS security best practices.

FEATURES

ALTERNATIVES

A small project for continuous auditing of internet-facing AWS services

A Python script that lists all main resources of your AWS account, helping you find resources that affect billing and/or security.

Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.

Automated script for creating a vulnerable Azure cloud lab to train offensive security skills.

A cloud native security platform that uses behavioral fingerprinting and runtime verification to detect threats across Kubernetes environments, cloud infrastructure, and software supply chains.

Commercial

A cloud-native security platform that combines vulnerability management, workload protection, and security monitoring for cloud environments with context-aware threat detection capabilities.

Commercial

Docker security audit tool with custom audit profiles and JSON report generation based on CIS Docker 1.6 Benchmark.

A setuid implementation of a subset of user namespaces, providing a way to run unprivileged containers without requiring root privileges.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved