blueteamvillage / DC31-obsidian-sec-eng

MIT License
1 stars 0 forks source link

tfsec findings review #42

Open juju4 opened 1 year ago

juju4 commented 1 year ago

Background:

tfsec has been set to continue-on-error and seems we need a catch-up as said on discord https://github.com/blueteamvillage/DC31-obsidian-sec-eng/actions/runs/4393053053/jobs/7693199551#step:4:903

  results
  ──────────────────────────────────────────
  passed               137
  ignored              3
  critical             14
  high                 10
  medium               2
  low                  10

  137 passed, 3 ignored, 36 potential problem(s) detected.

some are expected like teleport internet inbound

tfsec also put in critical egress internet access (" Result 7 CRITICAL Security group rule allows egress to multiple public internet addresses. ") like for

In high, for teleport

In high, for DC

Per previous conversation, to allow easy imaging/forensics, "Result 23 HIGH Root block device is not encrypted. " should be ignore for corresponding servers

In medium

Ignore part should added flag as per https://aquasecurity.github.io/tfsec/v0.61.3/getting-started/configuration/ignores/

Leaving the low aside

juju4 commented 1 year ago

added egress ignore flags and few low/description in my PR

TheBlackPacket commented 1 year ago

Postponed until after kill chain