config_bucket.tf 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161
  1. # The centralized bucket for AWS config
  2. module "xdr_config_logging_bucket" {
  3. source = "../../thirdparty/terraform-aws-s3logging-bucket"
  4. bucket_name = "xdr-config-${var.environment}-access-logs"
  5. lifecycle_rules = [
  6. {
  7. id = "expire-old-logs"
  8. enabled = true
  9. prefix = ""
  10. expiration = 30
  11. noncurrent_version_expiration = 30
  12. abort_incomplete_multipart_upload_days = 7
  13. }
  14. ]
  15. tags = merge(var.standard_tags, var.tags)
  16. versioning_enabled = true
  17. }
  18. resource "aws_s3_bucket" "xdr_config_bucket" {
  19. bucket = "xdr-config-${var.environment}"
  20. acl = "private"
  21. tags = merge(var.standard_tags, var.tags)
  22. versioning {
  23. enabled = true
  24. }
  25. logging {
  26. target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
  27. target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
  28. }
  29. server_side_encryption_configuration {
  30. rule {
  31. apply_server_side_encryption_by_default {
  32. sse_algorithm = "aws:kms"
  33. kms_master_key_id = aws_kms_key.config_encryption.arn
  34. }
  35. }
  36. }
  37. }
  38. resource "aws_s3_bucket_public_access_block" "awsconfig_bucket_block_public_access" {
  39. block_public_acls = true
  40. block_public_policy = true
  41. bucket = aws_s3_bucket.xdr_config_bucket.id
  42. ignore_public_acls = true
  43. restrict_public_buckets = true
  44. }
  45. data "aws_iam_policy_document" "awsconfig_bucket_policy" {
  46. statement {
  47. sid = "AWSConfigBucketPermissionsCheck"
  48. effect = "Allow"
  49. principals {
  50. type = "Service"
  51. identifiers = [ "config.amazonaws.com" ]
  52. }
  53. actions = [ "s3:GetBucketAcl" ]
  54. resources = [ aws_s3_bucket.xdr_config_bucket.arn ]
  55. }
  56. statement {
  57. sid = "AWSConfigBucketExistenceCheck"
  58. effect = "Allow"
  59. principals {
  60. type = "Service"
  61. identifiers = [ "config.amazonaws.com" ]
  62. }
  63. actions = [ "s3:ListBucket" ]
  64. resources = [ aws_s3_bucket.xdr_config_bucket.arn ]
  65. }
  66. statement {
  67. sid = "AWSConfigBucketDelivery"
  68. effect = "Allow"
  69. principals {
  70. type = "Service"
  71. identifiers = [ "config.amazonaws.com" ]
  72. }
  73. actions = [ "s3:PutObject" ]
  74. resources = [ "${aws_s3_bucket.xdr_config_bucket.arn}/AWSLogs/*" ]
  75. condition {
  76. test = "StringEquals"
  77. variable = "s3:x-amz-acl"
  78. values = [ "bucket-owner-full-control" ]
  79. }
  80. }
  81. }
  82. resource "aws_s3_bucket_policy" "awsconfig_bucket_policy" {
  83. bucket = aws_s3_bucket.xdr_config_bucket.id
  84. policy = data.aws_iam_policy_document.awsconfig_bucket_policy.json
  85. # Ordering bug, see https://github.com/terraform-providers/terraform-provider-aws/issues/7628
  86. depends_on = [ aws_s3_bucket_public_access_block.awsconfig_bucket_block_public_access ]
  87. }
  88. resource "aws_kms_key" "config_encryption" {
  89. description = "This key is used to encrypt AWS config"
  90. deletion_window_in_days = 30
  91. policy = data.aws_iam_policy_document.config_encryption_key_policy.json
  92. enable_key_rotation = true
  93. tags = merge(var.standard_tags, var.tags)
  94. }
  95. resource "aws_kms_alias" "config_encryption" {
  96. name = "alias/aws_config"
  97. target_key_id = aws_kms_key.config_encryption.key_id
  98. }
  99. data "aws_iam_policy_document" "config_encryption_key_policy" {
  100. statement {
  101. actions = ["kms:*"]
  102. effect = "Allow"
  103. resources = ["*"]
  104. principals {
  105. type = "AWS"
  106. identifiers = ["arn:${var.aws_partition}:iam::${var.aws_account_id}:root"]
  107. }
  108. }
  109. statement {
  110. actions = ["kms:GenerateDataKey*"]
  111. effect = "Allow"
  112. resources = ["*"]
  113. principals {
  114. type = "Service"
  115. identifiers = ["config.amazonaws.com"]
  116. }
  117. }
  118. statement {
  119. actions = [
  120. "kms:Encrypt*",
  121. "kms:Decrypt*",
  122. "kms:ReEncrypt*",
  123. "kms:GenerateDataKey*",
  124. "kms:Describe*",
  125. ]
  126. effect = "Allow"
  127. resources = ["*"]
  128. principals {
  129. type = "Service"
  130. identifiers = ["config.amazonaws.com"]
  131. }
  132. }
  133. statement {
  134. actions = ["kms:Describe*"]
  135. effect = "Allow"
  136. resources = ["*"]
  137. principals {
  138. type = "Service"
  139. identifiers = ["config.amazonaws.com"]
  140. }
  141. }
  142. }