crl.tf 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. #tfsec:ignore:aws-s3-block-public-acls tfsec:ignore:aws-s3-block-public-policy tfsec:ignore:aws-s3-ignore-public-acls
  2. #tfsec:ignore:aws-s3-no-public-buckets Certificate CRLs need to be publicly accessible
  3. resource "aws_s3_bucket" "crl" {
  4. bucket = "xdr-root-crl"
  5. tags = merge(local.standard_tags, var.tags)
  6. }
  7. # CRLs are small, but regenerated every expiration/2 days, (every 3.5 days by default), so there will be a good number of versions
  8. resource "aws_s3_bucket_versioning" "s3_version_crl" {
  9. bucket = aws_s3_bucket.crl.id
  10. versioning_configuration {
  11. status = "Enabled"
  12. }
  13. }
  14. # TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
  15. # resource "aws_s3_bucket_logging" "log_bucket_audit_reports" {
  16. # target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
  17. # target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
  18. #}
  19. resource "aws_s3_bucket_lifecycle_configuration" "s3_lifecyle_crl" {
  20. bucket = aws_s3_bucket.crl.id
  21. rule {
  22. id = "CleanUp"
  23. status = "Enabled"
  24. abort_incomplete_multipart_upload {
  25. days_after_initiation = 7
  26. }
  27. noncurrent_version_expiration {
  28. noncurrent_days = 365
  29. }
  30. }
  31. }
  32. resource "aws_s3_bucket_server_side_encryption_configuration" "s3_sse_crl" {
  33. bucket = aws_s3_bucket.crl.id
  34. rule {
  35. apply_server_side_encryption_by_default {
  36. sse_algorithm = "AES256" # Default keys are fine. We don't really need encryption here.
  37. }
  38. }
  39. }
  40. data "aws_iam_policy_document" "acmpca_bucket_access" {
  41. statement {
  42. actions = [
  43. "s3:GetBucketAcl",
  44. "s3:GetBucketLocation",
  45. "s3:PutObject",
  46. "s3:PutObjectAcl",
  47. ]
  48. resources = [
  49. aws_s3_bucket.crl.arn,
  50. "${aws_s3_bucket.crl.arn}/*",
  51. ]
  52. principals {
  53. identifiers = ["acm-pca.amazonaws.com"]
  54. type = "Service"
  55. }
  56. # TODO: Consider restricting this to the account, but may need to add Get permissions?
  57. # "Condition":{
  58. # "StringEquals":{
  59. # "aws:SourceAccount":"account",
  60. # "aws:SourceArn":"arn:partition:acm-pca:region:account:certificate-authority/CA-ID"
  61. # }
  62. # }
  63. }
  64. }
  65. resource "aws_s3_bucket_policy" "crl" {
  66. bucket = aws_s3_bucket.crl.id
  67. policy = data.aws_iam_policy_document.acmpca_bucket_access.json
  68. }
  69. # We want the CRL publicly accessible for zero trust websites and such.
  70. # resource "aws_s3_bucket_public_access_block" "crl_bucket_block_public_access" {
  71. # bucket = aws_s3_bucket.crl.id
  72. # block_public_acls = false # Not supported for CRLs, see https://aws.amazon.com/premiumsupport/knowledge-center/s3-bucket-error-crl-acm-ca/
  73. # block_public_policy = true
  74. # ignore_public_acls = true
  75. # restrict_public_buckets = true
  76. # depends_on = [ aws_s3_bucket.crl ]
  77. #}
  78. //AWS Provider outdated arguments <4.4.0
  79. /*resource "aws_s3_bucket" "crl" {
  80. bucket = "xdr-root-crl"
  81. # CRLs are small, but regenerated every expiration/2 days, (every 3.5 days by default), so there will be a good number of versions
  82. versioning {
  83. enabled = true
  84. }
  85. # TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
  86. #logging {
  87. # target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
  88. # target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
  89. #}
  90. lifecycle_rule {
  91. id = "CleanUp"
  92. enabled = true
  93. abort_incomplete_multipart_upload_days = 7
  94. # Clean up old versions after a year
  95. noncurrent_version_expiration {
  96. days = 365
  97. }
  98. }
  99. server_side_encryption_configuration {
  100. rule {
  101. apply_server_side_encryption_by_default {
  102. sse_algorithm = "AES256" # Default keys are fine. We don't really need encryption here.
  103. }
  104. }
  105. }
  106. tags = merge(local.standard_tags, var.tags)
  107. }
  108. */