amiracle / grand_central

Grand Central logging for Cloud Services to Splunk
MIT License
36 stars 5 forks source link

Broad Permissions #7

Closed nathan-bonner closed 4 years ago

nathan-bonner commented 4 years ago

Good day,

The permissions policy seems quite broad for this to function. For instance s3:DeleteBucket for Resource": "*" does not seem necessary. Have the permissions been scoped to least privilege for the integration to function?

This method for gathering AWS data for Splunk looks very promising but the scope of the permissions make me a bit uneasy.

Thanks

amiracle commented 4 years ago

I will be working with the team to make these permissions more specific to the resources that Grand Central uses.

irvine-j commented 4 years ago

It's that "Resource": "*" that's the killer. I'm reasonably fine with things controlling their own assets as long as those are reasonably constrained, but when you give carte blanche for some of these, it gets thoroughly dangerous. There's quite a bit here that can be an issue for exfiltration of data or security configuration, but that's the nature of any reporting platform.

Off-hand, the particularly problematic ones on scope are:

s3:GetObject is a bit different here than the rest, but since it gives that user the ability to literally see anything that's been put in an S3 bucket in the account, I thought it was worth calling out in the list.

amiracle commented 4 years ago

I just went in and fix the permissions so that the resource "*" is now just limited to less impactful services. The new copy of the IAM policy is available on the Readme.md . The catch is that you will need to insert 'grandcentral' as a prefix for the Deployment Name in the UI.

This can be modified for your own use case, but for consistency I've added it to the policy. I tested it with a Cloudwatch log group, Config and Cloudtrail.

amiracle commented 4 years ago

Closing the issue, if there are any additional issues with this policy, please open a new issue and we will look into it.