reflexivesecurity / reflex-aws-ebs-public-snapshot

Measure that automatically sets an EBS snapshot to private if made public.
Mozilla Public License 2.0
1 stars 0 forks source link
aws ebs remediate rules

reflex-aws-ebs-public-snapshot

A Reflex rule for enforcing no EBS snapshots are publicly accessible.

To learn more about EBS snapshots, see the AWS Documentation.

Getting Started

To get started using Reflex, check out the Reflex Documentation.

Usage

To use this rule either add it to your reflex.yaml configuration file:

rules:
  aws:
    - enforce-no-public-ebs-snapshot
        configuration:
          mode: remediate
        version: latest

or add it directly to your Terraform:

module "enforce-no-public-ebs-snapshot" {
  source            = "git::https://github.com/reflexivesecurity/reflex-aws-ebs-public-snapshot.git?ref=latest"
  sns_topic_arn     = module.central-sns-topic.arn
  reflex_kms_key_id = module.reflex-kms-key.key_id
  mode              = "remediate"
}

Note: The sns_topic_arn and reflex_kms_key_id example values shown here assume you generated resources with reflex build. If you are using the Terraform on its own you need to provide your own valid values.

Configuration

This rule has the following configuration options:

mode

Sets the rule to operate in detect or remediate mode.

Required: No Type: string Possible values: `detect` | `remediate` Default: `detect`

Contributing

If you are interested in contributing, please review our contribution guide.

License

This Reflex rule is made available under the MPL 2.0 license. For more information view the LICENSE