-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[SPIKE] Review how we check and monitor security group access #1835
Comments
The most obvious tool to use here would be AWS Firewall Manager, as it can be used to audit security groups across, for example, a OU: How to continuously audit and limit security groups with AWS Firewall Manager An alternative option would be something like (https://steampipe.io/), but I think that would require an account-by-account approach. |
1 similar comment
The most obvious tool to use here would be AWS Firewall Manager, as it can be used to audit security groups across, for example, a OU: How to continuously audit and limit security groups with AWS Firewall Manager An alternative option would be something like (https://steampipe.io/), but I think that would require an account-by-account approach. |
This issue is stale because it has been open 90 days with no activity. |
These are also currently raised by security hub |
We do also have our secure analysis tools to check these things. |
This issue is stale because it has been open 90 days with no activity. |
closed as a duplicate |
User Story
As a Modernisation Platform Engineer
I want to investigate methods for auditing AWS Security Group rules
So that we are appropriately using open SG rules
User Type(s)
Modernisation Platform Customer
Value
Review how we check and monitor security group access, this is to ensure customers don't configure unprotected access points to the modernisation platform.
Does SecurityHub do enough? Is it just a question of correlating the results so that we can take action?
Questions / Assumptions / Hypothesis
Definition of done
Reference
How to write good user stories
The text was updated successfully, but these errors were encountered: