Terraform AWS Cloudtrail Automatic Re-enable

1.)  Terraform AWS Cloudtrail Automatic Re-enable

- Automatic re-enable of CloudTrail in case of malicious or accidential disable.

-This is a security enforce module for CloudTrail


2.) Why you need this

-If somebody hacks your AWS account the first action would be disabled or delete the CloudTrail to cover his tracks. Receive an Alert in this case can save our business from huge and expensive disasters


3.) Purpose

-The project catches 2 events one is the StopLogging the other is DeleteTrail.

    * StopLogging cause the CloudTrail enabling again and sends an email to the SNS topic.

    * DeleteTrail sends an email to the SNS topic.


4) Schema

The Terraform module creates the components in the red square.




5) Prerequisites:

These 2 elements should be created.

-CloudTrail

-SNS with Email confirmation


6) Creation 

Use the code in terraform project


module "cloudtrail-automatic-re-enable" {

    source = "giuseppeborgese/cloudtrail-autmatic-re-enabled/aws"

    prefix = "ts"

    sns = "arn:aws:sns:us-east-1:01234567:giuseppe-sns"

}


Komentarze

Popularne posty z tego bloga

Kubernetes

Helm

Ansible Tower / AWX