Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SPIKE] Review how we check and monitor security group access #1835

Closed
5 tasks
davidkelliott opened this issue May 31, 2022 · 7 comments
Closed
5 tasks

[SPIKE] Review how we check and monitor security group access #1835

davidkelliott opened this issue May 31, 2022 · 7 comments
Labels
networking risk register This issue is on our risk register security Stale

Comments

@davidkelliott
Copy link
Contributor

davidkelliott commented May 31, 2022

User Story

As a Modernisation Platform Engineer
I want to investigate methods for auditing AWS Security Group rules
So that we are appropriately using open SG rules

User Type(s)

Modernisation Platform Customer

Value

Review how we check and monitor security group access, this is to ensure customers don't configure unprotected access points to the modernisation platform.

Does SecurityHub do enough? Is it just a question of correlating the results so that we can take action?

Questions / Assumptions / Hypothesis

Definition of done

  • set appropriate timebox for spike
  • identify AWS-centric ways of auditing security groups
  • investigate other tools that could be integrated with a GitHub action?
  • options identified and presented to team
  • follow-on issues raised

Reference

How to write good user stories

@dms1981
Copy link
Contributor

dms1981 commented Oct 12, 2022

The most obvious tool to use here would be AWS Firewall Manager, as it can be used to audit security groups across, for example, a OU: How to continuously audit and limit security groups with AWS Firewall Manager

An alternative option would be something like (https://steampipe.io/), but I think that would require an account-by-account approach.

1 similar comment
@dms1981
Copy link
Contributor

dms1981 commented Oct 12, 2022

The most obvious tool to use here would be AWS Firewall Manager, as it can be used to audit security groups across, for example, a OU: How to continuously audit and limit security groups with AWS Firewall Manager

An alternative option would be something like (https://steampipe.io/), but I think that would require an account-by-account approach.

@github-actions
Copy link
Contributor

github-actions bot commented Sep 8, 2023

This issue is stale because it has been open 90 days with no activity.

@github-actions github-actions bot added the Stale label Sep 8, 2023
@davidkelliott
Copy link
Contributor Author

These are also currently raised by security hub

@github-actions github-actions bot removed the Stale label Feb 22, 2024
@dms1981
Copy link
Contributor

dms1981 commented May 9, 2024

We do also have our secure analysis tools to check these things.

@dms1981 dms1981 changed the title Review how we check and monitor security group access [SPIKE] Review how we check and monitor security group access May 23, 2024
Copy link
Contributor

This issue is stale because it has been open 90 days with no activity.

@github-actions github-actions bot added the Stale label Aug 23, 2024
@SimonPPledger
Copy link
Contributor

closed as a duplicate

@SimonPPledger SimonPPledger closed this as not planned Won't fix, can't repro, duplicate, stale Nov 25, 2024
@github-project-automation github-project-automation bot moved this from To Do to Done in Modernisation Platform Nov 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
networking risk register This issue is on our risk register security Stale
Projects
Status: Done
Development

No branches or pull requests

4 participants