Closed markusjunior closed 2 years ago
Great info! as we discussed here. We will take a look
@markusjunior FYI, we are releasing this fix in today's latest release (v0.38). Appreciate pointing this out.
wow, lightning fast! Just pulled the release and testing it now against 100+ accounts... let you know soon.
By the way, I combined your awesome work with some stuff from myself. Maybe that is interesting for you as well. Any idea where to share this approach? Just in short: 1) we run steampipe / your plugin on a EC2 2) EC2 instance has an IAM role to assume a auditor role in all other accounts and get a list of all accounts in our org 3) With a "STS wrapper" written in python we iterate over all accounts and store each report in json on the local hdd 4) the EC2 copies each report to S3 5) triggered by new files in S3, our lambda pulls each new report and process the report: --- convert all data from json to relational data (sql ready) --- each find is one record. We add further metadata to each record (costcenter info, friendly account name etc) --- we check a whitelist via dynamoDB for every NON OK finding... --- when done, we push all data via SQL to a MySQL RDS 6) We use AWS Quicksight and use the MySQL RDS data to provide fancy dashboards to our auditors
If you are interested in the details, let me know where to share the idea, maybe with more details...
cheers Markus
Hi, I am routing this to the respective team member; we love to hear from you and continuous feedback. @judell @bob-bot
UAT looks good, works as expected! Thanks again
@markusjunior thanks for sharing more information about your use case! I would love to learn more in a discussion if you a few minutes tomorrow or early next week.
What time works best for you? My calendar link is: https://calendly.com/steampipe/30
Describe the bug
Steampipe version (steampipe -v) steampipe version 0.15.0
Plugin version (steampipe plugin list) | hub.steampipe.io/plugins/turbot/aws@0.57.0 | 0.57.0 | hub.steampipe.io/plugins/turbot/aws@latest | 0.68.0 | aws steampipe-mod-aws-compliance v0.37 [2022-06-29]
To reproduce Setup two AWS Accounts: PROD and WORKLOAD
steampipe check aws_compliance.control.cis_v140_3_9
Expected behavior Please check if the VPC is using a shared VPC and is therefore a participant account. If yes, do not raise an alarm but maybe INFO instead to let the auditor check the owner account.