Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(bootstrap): require aws:SecureTransport for staging bucket #7192

Merged
merged 3 commits into from
Apr 6, 2020

Conversation

rix0rrr
Copy link
Contributor

@rix0rrr rix0rrr commented Apr 6, 2020

Commit Message

Many of our customers are going to run the open source tool Scout2
over their AWS accounts to determine their security posture.

By default, this tool is going to report the lack of an
aws:SecureTransport restriction on S3 buckets with "medium" severity,
which will alarm users and for those in enterprise environments
require them to address the situation.

The bootstrap stack is one which users don't have a lot of control over
(without going to a full-fledged custom template), and enabling this
flag out of the box seems like a good default, so that the most common
posture-checking tool won't trip over a default CDK setup.

End Commit Message


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

Many of our customers are going to run the open source tool `Scout2`
over their AWS accounts to determine their security posture.

By default, this tool is going to report the lack of an
`aws:SecureTransport` restriction on S3 buckets with "medium" severity,
which will alarm users and for those in enterprise environments
require them to address the situation.

The bootstrap stack is one which users don't have a lot of control over
(without going to a full-fledged custom template), and enabling this
flag out of the box seems like a good default, so that the most common
posture-checking tool won't trip over a default CDK setup.
@rix0rrr rix0rrr requested a review from a team April 6, 2020 13:23
@rix0rrr rix0rrr self-assigned this Apr 6, 2020
@mergify mergify bot added the contribution/core This is a PR that came from AWS. label Apr 6, 2020
Comment on lines +143 to +145
Resource:
- { 'Fn::Sub': '${StagingBucket.Arn}' }
- { 'Fn::Sub': '${StagingBucket.Arn}/*' }
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could this not just be *? This is a Deny within a BucketPolicy, so I don't see what being so specific adds... beyond maybe a risk of inadvertently not including something?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I guess. This is just the way the recommended policy looks.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Well then! This is unironically...

@aws-cdk-automation
Copy link
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject6AEA49D1-qxepHUsryhcu
  • Commit ID: bbf55bb
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@rix0rrr rix0rrr added the pr-linter/exempt-readme The PR linter will not require README changes label Apr 6, 2020
@rix0rrr rix0rrr added the pr-linter/exempt-test The PR linter will not require test changes label Apr 6, 2020
@aws-cdk-automation
Copy link
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject6AEA49D1-qxepHUsryhcu
  • Commit ID: 1d1a191
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@aws-cdk-automation
Copy link
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject6AEA49D1-qxepHUsryhcu
  • Commit ID: 7c02ee9
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@mergify
Copy link
Contributor

mergify bot commented Apr 6, 2020

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@mergify mergify bot merged commit ed106ea into master Apr 6, 2020
@mergify mergify bot deleted the huijbers/bootstrap-securetransport branch April 6, 2020 16:03
@mergify
Copy link
Contributor

mergify bot commented Apr 6, 2020

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

horsmand pushed a commit to horsmand/aws-cdk that referenced this pull request Apr 8, 2020
…s#7192)

Many of our customers are going to run the open source tool `Scout2`
over their AWS accounts to determine their security posture.

By default, this tool is going to report the lack of an
`aws:SecureTransport` restriction on S3 buckets with "medium" severity,
which will alarm users and for those in enterprise environments
require them to address the situation.

The bootstrap stack is one which users don't have a lot of control over
(without going to a full-fledged custom template), and enabling this
flag out of the box seems like a good default, so that the most common
posture-checking tool won't trip over a default CDK setup.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
contribution/core This is a PR that came from AWS. pr-linter/exempt-readme The PR linter will not require README changes pr-linter/exempt-test The PR linter will not require test changes
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants