audit_bucket.tf 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145
  1. # tfsec:ignore:aws-s3-enable-bucket-logging TODO: enable everywhere at a later date enable everywhere at a later date if required
  2. resource "aws_s3_bucket" "audit_reports" {
  3. # checkov:skip=CKV2_AWS_6: see tfsec S3 block policy
  4. # checkov:skip=CKV_AWS_18: see tfsec S3 logging above
  5. # checkov:skip=CKV_AWS_144: TODO: cross replication
  6. # checkov:skip=CKV_AWS_145: Risk is low for AES-256 encryption
  7. provider = aws.c2 # The reports go in the c2 bucket
  8. bucket = "xdr-ca-audit-reports"
  9. tags = merge(local.standard_tags, var.tags)
  10. }
  11. resource "aws_s3_bucket_versioning" "s3_version_audit_reports" {
  12. provider = aws.c2
  13. bucket = aws_s3_bucket.audit_reports.id
  14. versioning_configuration {
  15. status = "Enabled"
  16. }
  17. }
  18. resource "aws_s3_bucket_acl" "s3_acl_audit_reports" {
  19. provider = aws.c2
  20. bucket = aws_s3_bucket.audit_reports.id
  21. acl = "private"
  22. }
  23. # TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
  24. #resource "aws_s3_bucket_logging" "log_bucket_audit_reports" {
  25. # target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
  26. # target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
  27. #}
  28. # tfsec:ignore:aws-s3-encryption-customer-key Risk is low for AES-256 encryption
  29. resource "aws_s3_bucket_server_side_encryption_configuration" "s3_sse_audit_reports" {
  30. provider = aws.c2
  31. bucket = aws_s3_bucket.audit_reports.id
  32. rule {
  33. apply_server_side_encryption_by_default {
  34. sse_algorithm = "AES256"
  35. }
  36. }
  37. }
  38. resource "aws_s3_bucket_lifecycle_configuration" "s3_lifecyle_audit_reports" {
  39. provider = aws.c2
  40. bucket = aws_s3_bucket.audit_reports.id
  41. rule {
  42. id = "CleanUp"
  43. status = "Enabled"
  44. abort_incomplete_multipart_upload {
  45. days_after_initiation = 7
  46. }
  47. noncurrent_version_expiration {
  48. noncurrent_days = 365
  49. }
  50. }
  51. }
  52. data "aws_iam_policy_document" "audit_reports_bucket_access" {
  53. statement {
  54. actions = [
  55. "s3:GetBucketAcl",
  56. "s3:GetBucketLocation",
  57. "s3:PutObject",
  58. "s3:PutObjectAcl",
  59. ]
  60. resources = [
  61. aws_s3_bucket.audit_reports.arn,
  62. "${aws_s3_bucket.audit_reports.arn}/*",
  63. ]
  64. principals {
  65. identifiers = ["acm-pca.amazonaws.com"]
  66. type = "Service"
  67. }
  68. # TODO: Consider restricting this to the accounts, but may need to add Get permissions?
  69. # "Condition":{
  70. # "StringEquals":{
  71. # "aws:SourceAccount":"account",
  72. # "aws:SourceArn":"arn:partition:acm-pca:region:account:certificate-authority/CA-ID"
  73. # }
  74. # }
  75. }
  76. }
  77. resource "aws_s3_bucket_policy" "audit_reports" {
  78. provider = aws.c2 # The reports go in the c2 bucket
  79. bucket = aws_s3_bucket.audit_reports.id
  80. policy = data.aws_iam_policy_document.audit_reports_bucket_access.json
  81. depends_on = [aws_s3_bucket.audit_reports]
  82. }
  83. resource "aws_s3_bucket_public_access_block" "audit_reports_bucket_block_public_access" {
  84. provider = aws.c2 # The reports go in the c2 bucket
  85. bucket = aws_s3_bucket.audit_reports.id
  86. block_public_acls = true
  87. block_public_policy = true
  88. ignore_public_acls = true
  89. restrict_public_buckets = true
  90. depends_on = [aws_s3_bucket.audit_reports]
  91. }
  92. //AWS Provider outdated arguments <4.4.0
  93. /*resource "aws_s3_bucket" "audit_reports" {
  94. provider = aws.c2 # The reports go in the c2 bucket
  95. bucket = "xdr-ca-audit-reports"
  96. acl = "private"
  97. versioning {
  98. enabled = true
  99. }
  100. # TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
  101. #logging {
  102. # target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
  103. # target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
  104. #}
  105. lifecycle_rule {
  106. id = "CleanUp"
  107. enabled = true
  108. abort_incomplete_multipart_upload_days = 7
  109. # Clean up old versions after a year
  110. noncurrent_version_expiration {
  111. days = 365
  112. }
  113. }
  114. server_side_encryption_configuration {
  115. rule {
  116. apply_server_side_encryption_by_default {
  117. sse_algorithm = "AES256" # Default keys are fine. We don't really need encryption here.
  118. }
  119. }
  120. }
  121. tags = merge(local.standard_tags, var.tags)
  122. }
  123. */