deploy to security audit account
scan your entire AWS Organization
receive alerts by Slack or email
or manually scan from your laptop
Subdomain Detection Functionality
Scans Amazon Route53 to identify:
Optional Additional Check
Turned off by default as it may result in Lambda timeouts for large organisations
To enable, create this Terraform variable in your tfvars file or CI/CD pipeline:
lambdas = [“alias-cloudfront-s3”, “alias-eb”, “alias-s3”, “cname-cloudfront-s3”, “cname-eb”, “cname-s3”, “ns-domain”, “ns-subdomain”, “cname-azure”, “cname-google”, “a-storage”]
Options
Notifications
Requirements
Usage
terraform init -backend-config=bucket=TERRAFORM_STATE_BUCKET -backend-config=key=TERRAFORM_STATE_KEY -backend-config=region=TERRAFORM_STATE_REGION
terraform workspace new dev
terraform plan
terraform apply
AWS IAM Policies
For least privilege access control, example AWS IAM policies are provided:
Adding New Checks
var.lambdas
in variables.tfAdding Notifications To Extra Slack Channels
Testing
slack_channels_dev
variable for your dev environment to notify a test Slack channelENVIRONMENT VARIABLE | EXAMPLE VALUE / COMMENT |
---|---|
AWS_ACCESS_KEY_ID | using domain-protect deploy policy |
AWS_SECRET_ACCESS_KEY | – |
TERRAFORM_STATE_BUCKET | tfstate48903 |
TERRAFORM_STATE_KEY | domain-protect |
TERRAFORM_STATE_REGION | us-east-1 |
TF_VAR_org_primary_account | 012345678901 |
TF_VAR_security_audit_role_name | not needed if “domain-protect-audit” used |
TF_VAR_external_id | only required if External ID is configured |
TF_VAR_slack_channels | [“security-alerts”] |
TF_VAR_slack_channels_dev | [“security-alerts-dev”] |
TF_VAR_slack_webhook_urls | [“https://hooks.slack.com/services/XXX/XXX/XXX”] |
docker run -v pwd
:/whatever circleci/circleci-cli circleci config validate /whatever/.circleci/config.yml
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…