config_bucket.tf 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. # The centralized bucket for AWS config
  2. module "xdr_config_logging_bucket" {
  3. source = "../../thirdparty/terraform-aws-s3logging-bucket"
  4. bucket_name = "xdr-config-${var.environment}-access-logs"
  5. lifecycle_rules = list(
  6. {
  7. id = "expire-old-logs"
  8. enabled = true
  9. prefix = ""
  10. expiration = 30
  11. noncurrent_version_expiration = 30
  12. abort_incomplete_multipart_upload_days = 7
  13. })
  14. tags = merge(var.standard_tags, var.tags)
  15. versioning_enabled = true
  16. }
  17. resource "aws_s3_bucket" "xdr_config_bucket" {
  18. bucket = "xdr-config-${var.environment}"
  19. acl = "private"
  20. tags = merge(var.standard_tags, var.tags)
  21. versioning {
  22. enabled = true
  23. }
  24. logging {
  25. target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
  26. target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
  27. }
  28. server_side_encryption_configuration {
  29. rule {
  30. apply_server_side_encryption_by_default {
  31. sse_algorithm = "aws:kms"
  32. kms_master_key_id = aws_kms_key.config_encryption.arn
  33. }
  34. }
  35. }
  36. }
  37. resource "aws_s3_bucket_public_access_block" "awsconfig_bucket_block_public_access" {
  38. block_public_acls = true
  39. block_public_policy = true
  40. bucket = aws_s3_bucket.xdr_config_bucket.id
  41. ignore_public_acls = true
  42. restrict_public_buckets = true
  43. }
  44. data "aws_iam_policy_document" "awsconfig_bucket_policy" {
  45. statement {
  46. sid = "AWSConfigBucketPermissionsCheck"
  47. effect = "Allow"
  48. principals {
  49. type = "Service"
  50. identifiers = [ "config.amazonaws.com" ]
  51. }
  52. actions = [ "s3:GetBucketAcl" ]
  53. resources = [ aws_s3_bucket.xdr_config_bucket.arn ]
  54. }
  55. statement {
  56. sid = "AWSConfigBucketExistenceCheck"
  57. effect = "Allow"
  58. principals {
  59. type = "Service"
  60. identifiers = [ "config.amazonaws.com" ]
  61. }
  62. actions = [ "s3:ListBucket" ]
  63. resources = [ aws_s3_bucket.xdr_config_bucket.arn ]
  64. }
  65. statement {
  66. sid = "AWSConfigBucketDelivery"
  67. effect = "Allow"
  68. principals {
  69. type = "Service"
  70. identifiers = [ "config.amazonaws.com" ]
  71. }
  72. actions = [ "s3:PutObject" ]
  73. resources = [ "${aws_s3_bucket.xdr_config_bucket.arn}/AWSLogs/*" ]
  74. condition {
  75. test = "StringEquals"
  76. variable = "s3:x-amz-acl"
  77. values = [ "bucket-owner-full-control" ]
  78. }
  79. }
  80. }
  81. resource "aws_s3_bucket_policy" "awsconfig_bucket_policy" {
  82. bucket = aws_s3_bucket.xdr_config_bucket.id
  83. policy = data.aws_iam_policy_document.awsconfig_bucket_policy.json
  84. }
  85. resource "aws_kms_key" "config_encryption" {
  86. description = "This key is used to encrypt AWS config"
  87. deletion_window_in_days = 30
  88. policy = data.aws_iam_policy_document.config_encryption_key_policy.json
  89. enable_key_rotation = true
  90. tags = merge(var.standard_tags, var.tags)
  91. }
  92. resource "aws_kms_alias" "config_encryption" {
  93. name = "alias/aws_config"
  94. target_key_id = aws_kms_key.config_encryption.key_id
  95. }
  96. data "aws_iam_policy_document" "config_encryption_key_policy" {
  97. statement {
  98. actions = ["kms:*"]
  99. effect = "Allow"
  100. resources = ["*"]
  101. principals {
  102. type = "AWS"
  103. identifiers = ["arn:${var.aws_partition}:iam::${var.aws_account_id}:root"]
  104. }
  105. }
  106. statement {
  107. actions = ["kms:GenerateDataKey*"]
  108. effect = "Allow"
  109. resources = ["*"]
  110. principals {
  111. type = "Service"
  112. identifiers = ["config.amazonaws.com"]
  113. }
  114. }
  115. statement {
  116. actions = [
  117. "kms:Encrypt*",
  118. "kms:Decrypt*",
  119. "kms:ReEncrypt*",
  120. "kms:GenerateDataKey*",
  121. "kms:Describe*",
  122. ]
  123. effect = "Allow"
  124. resources = ["*"]
  125. principals {
  126. type = "Service"
  127. identifiers = ["config.amazonaws.com"]
  128. }
  129. }
  130. statement {
  131. actions = ["kms:Describe*"]
  132. effect = "Allow"
  133. resources = ["*"]
  134. principals {
  135. type = "Service"
  136. identifiers = ["config.amazonaws.com"]
  137. }
  138. }
  139. }