Terraform AWS Cloudtrail Automatic Re-enable
1.) Terraform AWS Cloudtrail Automatic Re-enable
- Automatic re-enable of CloudTrail in case of malicious or accidential disable.
-This is a security enforce module for CloudTrail
2.) Why you need this
-If somebody hacks your AWS account the first action would be disabled or delete the CloudTrail to cover his tracks. Receive an Alert in this case can save our business from huge and expensive disasters
3.) Purpose
-The project catches 2 events one is the StopLogging the other is DeleteTrail.
* StopLogging cause the CloudTrail enabling again and sends an email to the SNS topic.
* DeleteTrail sends an email to the SNS topic.
4) Schema
The Terraform module creates the components in the red square.
5) Prerequisites:
These 2 elements should be created.
-CloudTrail
-SNS with Email confirmation
6) Creation
Use the code in terraform project
module "cloudtrail-automatic-re-enable" {
source = "giuseppeborgese/cloudtrail-autmatic-re-enabled/aws"
prefix = "ts"
sns = "arn:aws:sns:us-east-1:01234567:giuseppe-sns"
}

Komentarze
Prześlij komentarz