crl.tf 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. # tfsec:ignore:aws-s3-block-public-acls
  2. # tfsec:ignore:aws-s3-specify-public-access-block
  3. # tfsec:ignore:aws-s3-block-public-policy
  4. # tfsec:ignore:aws-s3-ignore-public-acls
  5. # tfsec:ignore:aws-s3-no-public-buckets Certificate CRLs need to be publicly accessible
  6. # tfsec:ignore:aws-s3-enable-bucket-logging TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
  7. resource "aws_s3_bucket" "crl" {
  8. # checkov:skip=CKV_AWS_144: Cross-region replication TODO
  9. # checkov:skip=CKV_AWS_145: Risk is low for AES-256 encryption
  10. # checkov:skip=CKV2_AWS_6: see tfsec S3 block policy
  11. # checkov:skip=CKV_AWS_18: see tfsec S3 logging above
  12. bucket = "xdr-root-crl"
  13. tags = merge(local.standard_tags, var.tags)
  14. }
  15. # CRLs are small, but regenerated every expiration/2 days, (every 3.5 days by default), so there will be a good number of versions
  16. resource "aws_s3_bucket_versioning" "s3_version_crl" {
  17. bucket = aws_s3_bucket.crl.id
  18. versioning_configuration {
  19. status = "Enabled"
  20. }
  21. }
  22. # TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
  23. # resource "aws_s3_bucket_logging" "log_bucket_audit_reports" {
  24. # target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
  25. # target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
  26. #}
  27. resource "aws_s3_bucket_lifecycle_configuration" "s3_lifecyle_crl" {
  28. bucket = aws_s3_bucket.crl.id
  29. rule {
  30. id = "CleanUp"
  31. status = "Enabled"
  32. abort_incomplete_multipart_upload {
  33. days_after_initiation = 7
  34. }
  35. noncurrent_version_expiration {
  36. noncurrent_days = 365
  37. }
  38. }
  39. }
  40. # tfsec:ignore:aws-s3-encryption-customer-key Risk is low for AES-256 encryption
  41. resource "aws_s3_bucket_server_side_encryption_configuration" "s3_sse_crl" {
  42. bucket = aws_s3_bucket.crl.id
  43. rule {
  44. apply_server_side_encryption_by_default {
  45. sse_algorithm = "AES256"
  46. }
  47. }
  48. }
  49. data "aws_iam_policy_document" "acmpca_bucket_access" {
  50. statement {
  51. actions = [
  52. "s3:GetBucketAcl",
  53. "s3:GetBucketLocation",
  54. "s3:PutObject",
  55. "s3:PutObjectAcl",
  56. ]
  57. resources = [
  58. aws_s3_bucket.crl.arn,
  59. "${aws_s3_bucket.crl.arn}/*",
  60. ]
  61. principals {
  62. identifiers = ["acm-pca.amazonaws.com"]
  63. type = "Service"
  64. }
  65. # TODO: Consider restricting this to the account, but may need to add Get permissions?
  66. # "Condition":{
  67. # "StringEquals":{
  68. # "aws:SourceAccount":"account",
  69. # "aws:SourceArn":"arn:partition:acm-pca:region:account:certificate-authority/CA-ID"
  70. # }
  71. # }
  72. }
  73. }
  74. resource "aws_s3_bucket_policy" "crl" {
  75. bucket = aws_s3_bucket.crl.id
  76. policy = data.aws_iam_policy_document.acmpca_bucket_access.json
  77. }
  78. # We want the CRL publicly accessible for zero trust websites and such.
  79. # resource "aws_s3_bucket_public_access_block" "crl_bucket_block_public_access" {
  80. # bucket = aws_s3_bucket.crl.id
  81. # block_public_acls = false # Not supported for CRLs, see https://aws.amazon.com/premiumsupport/knowledge-center/s3-bucket-error-crl-acm-ca/
  82. # block_public_policy = true
  83. # ignore_public_acls = true
  84. # restrict_public_buckets = true
  85. # depends_on = [ aws_s3_bucket.crl ]
  86. #}
  87. //AWS Provider outdated arguments <4.4.0
  88. /*resource "aws_s3_bucket" "crl" {
  89. bucket = "xdr-root-crl"
  90. # CRLs are small, but regenerated every expiration/2 days, (every 3.5 days by default), so there will be a good number of versions
  91. versioning {
  92. enabled = true
  93. }
  94. # TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
  95. #logging {
  96. # target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
  97. # target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
  98. #}
  99. lifecycle_rule {
  100. id = "CleanUp"
  101. enabled = true
  102. abort_incomplete_multipart_upload_days = 7
  103. # Clean up old versions after a year
  104. noncurrent_version_expiration {
  105. days = 365
  106. }
  107. }
  108. server_side_encryption_configuration {
  109. rule {
  110. apply_server_side_encryption_by_default {
  111. sse_algorithm = "AES256" # Default keys are fine. We don't really need encryption here.
  112. }
  113. }
  114. }
  115. tags = merge(local.standard_tags, var.tags)
  116. }
  117. */