123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145 |
- # tfsec:ignore:aws-s3-enable-bucket-logging TODO: enable everywhere at a later date enable everywhere at a later date if required
- resource "aws_s3_bucket" "audit_reports" {
- # checkov:skip=CKV2_AWS_6: see tfsec S3 block policy
- # checkov:skip=CKV_AWS_18: see tfsec S3 logging above
- # checkov:skip=CKV_AWS_144: TODO: cross replication
- # checkov:skip=CKV_AWS_145: Risk is low for AES-256 encryption
-
- provider = aws.c2 # The reports go in the c2 bucket
- bucket = "xdr-ca-audit-reports"
- tags = merge(local.standard_tags, var.tags)
- }
- resource "aws_s3_bucket_versioning" "s3_version_audit_reports" {
- provider = aws.c2
- bucket = aws_s3_bucket.audit_reports.id
- versioning_configuration {
- status = "Enabled"
- }
- }
- resource "aws_s3_bucket_acl" "s3_acl_audit_reports" {
- provider = aws.c2
- bucket = aws_s3_bucket.audit_reports.id
- acl = "private"
- }
- # TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
- #resource "aws_s3_bucket_logging" "log_bucket_audit_reports" {
- # target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
- # target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
- #}
- # tfsec:ignore:aws-s3-encryption-customer-key Risk is low for AES-256 encryption
- resource "aws_s3_bucket_server_side_encryption_configuration" "s3_sse_audit_reports" {
- provider = aws.c2
- bucket = aws_s3_bucket.audit_reports.id
- rule {
- apply_server_side_encryption_by_default {
- sse_algorithm = "AES256"
- }
- }
- }
- resource "aws_s3_bucket_lifecycle_configuration" "s3_lifecyle_audit_reports" {
- provider = aws.c2
- bucket = aws_s3_bucket.audit_reports.id
- rule {
- id = "CleanUp"
- status = "Enabled"
- abort_incomplete_multipart_upload {
- days_after_initiation = 7
- }
- noncurrent_version_expiration {
- noncurrent_days = 365
- }
- }
- }
- data "aws_iam_policy_document" "audit_reports_bucket_access" {
- statement {
- actions = [
- "s3:GetBucketAcl",
- "s3:GetBucketLocation",
- "s3:PutObject",
- "s3:PutObjectAcl",
- ]
- resources = [
- aws_s3_bucket.audit_reports.arn,
- "${aws_s3_bucket.audit_reports.arn}/*",
- ]
- principals {
- identifiers = ["acm-pca.amazonaws.com"]
- type = "Service"
- }
- # TODO: Consider restricting this to the accounts, but may need to add Get permissions?
- # "Condition":{
- # "StringEquals":{
- # "aws:SourceAccount":"account",
- # "aws:SourceArn":"arn:partition:acm-pca:region:account:certificate-authority/CA-ID"
- # }
- # }
- }
- }
- resource "aws_s3_bucket_policy" "audit_reports" {
- provider = aws.c2 # The reports go in the c2 bucket
- bucket = aws_s3_bucket.audit_reports.id
- policy = data.aws_iam_policy_document.audit_reports_bucket_access.json
- depends_on = [aws_s3_bucket.audit_reports]
- }
- resource "aws_s3_bucket_public_access_block" "audit_reports_bucket_block_public_access" {
- provider = aws.c2 # The reports go in the c2 bucket
- bucket = aws_s3_bucket.audit_reports.id
- block_public_acls = true
- block_public_policy = true
- ignore_public_acls = true
- restrict_public_buckets = true
- depends_on = [aws_s3_bucket.audit_reports]
- }
- //AWS Provider outdated arguments <4.4.0
- /*resource "aws_s3_bucket" "audit_reports" {
- provider = aws.c2 # The reports go in the c2 bucket
- bucket = "xdr-ca-audit-reports"
- acl = "private"
- versioning {
- enabled = true
- }
- # TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
- #logging {
- # target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
- # target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
- #}
- lifecycle_rule {
- id = "CleanUp"
- enabled = true
- abort_incomplete_multipart_upload_days = 7
- # Clean up old versions after a year
- noncurrent_version_expiration {
- days = 365
- }
- }
- server_side_encryption_configuration {
- rule {
- apply_server_side_encryption_by_default {
- sse_algorithm = "AES256" # Default keys are fine. We don't really need encryption here.
- }
- }
- }
- tags = merge(local.standard_tags, var.tags)
- }
- */
|