aws_recon 0.4.0 → 0.4.5

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9647cee32c4df1624a99cf180258f43e664e7ee62b8ceee5fe00b8d6b31a2803
4
- data.tar.gz: aca9a6383263ca7add32682df25a633ad9db031a50d2f38f319f903b6dd75c45
3
+ metadata.gz: 2970ade786485b6ca81b67b96b10e70a23b2dc30b8e3ed83928bd019dc2cd00c
4
+ data.tar.gz: 1d35be082bd390129fb2b2cfaf1147946a0fa8eb80b08c364ea8b84646e527f2
5
5
  SHA512:
6
- metadata.gz: 426acf5937d26974c7a7c5bc26e84487fe8b76cc28bf0f51a7302d05897356e7007b877e26a47cc3af7b54044ac45bec23b409b1b66bef0336aaa1216d340437
7
- data.tar.gz: 790fd25c65d4fe49c2e3857f65cddb590ecfe9f481b923bcdf8def9007ddf1ccb0b16f616164e7472b43a75eebe77698146d3d2e46204af1085b276afedf2099
6
+ metadata.gz: a2b106cc04a9d4a8955794ef3bf7f6a1e79222679105f093ef9edcf2275c2744812367c79db18b55f00d195fb44b1eec4685544277bf728a44786a8812e66846
7
+ data.tar.gz: 65e41b3d482e6a5598e582c52956f78421c67ad16ea0389bb32435c2e1166f79b1300207881fe5d4a30590dffe3d1bf2eb9692cc191e1584b32482645347a0b2
data/.gitignore CHANGED
@@ -12,3 +12,5 @@ Gemfile.lock
12
12
  /pkg/
13
13
  /spec/reports/
14
14
  /tmp/
15
+ .terraform*
16
+ terraform.tfstate*
data/aws_recon.gemspec CHANGED
@@ -9,7 +9,7 @@ Gem::Specification.new do |spec|
9
9
  spec.version = AwsRecon::VERSION
10
10
  spec.authors = ['Josh Larsen', 'Darkbit']
11
11
  spec.required_ruby_version = '>= 2.5.0'
12
- spec.summary = 'A multi-threaded AWS inventory collection cli tool.'
12
+ spec.summary = 'A multi-threaded AWS security-focused inventory collection tool.'
13
13
  spec.description = 'AWS Recon is a command line tool to collect resources from an Amazon Web Services (AWS) account. The tool outputs JSON suitable for processing with other tools.'
14
14
  spec.homepage = 'https://github.com/darkbitio/aws-recon'
15
15
  spec.license = 'MIT'
@@ -65,6 +65,17 @@ module AwsRecon
65
65
  @resources.concat(collection) if @options.output_file
66
66
  end
67
67
 
68
+ #
69
+ # Format @resources as either
70
+ #
71
+ def formatted_json
72
+ if @options.jsonl
73
+ @resources.map { |r| JSON.generate(r) }.join("\n")
74
+ else
75
+ @resources.to_json
76
+ end
77
+ end
78
+
68
79
  #
69
80
  # main wrapper
70
81
  #
@@ -102,17 +113,17 @@ module AwsRecon
102
113
  rescue Interrupt # ctrl-c
103
114
  elapsed = Process.clock_gettime(Process::CLOCK_MONOTONIC) - @starting
104
115
 
105
- puts "\nStopped early after \x1b[32m#{elapsed.to_i}\x1b[0m seconds.\n"
116
+ puts "\nStopped early after #{elapsed.to_i} seconds.\n"
106
117
  ensure
107
118
  elapsed = Process.clock_gettime(Process::CLOCK_MONOTONIC) - @starting
108
119
 
109
- puts "\nFinished in \x1b[32m#{elapsed.to_i}\x1b[0m seconds.\n\n"
120
+ puts "\nFinished in #{elapsed.to_i} seconds.\n\n"
110
121
 
111
122
  # write output file
112
- if @options.output_file
113
- puts "Saving resources to \x1b[32m#{@options.output_file}\x1b[0m.\n\n"
123
+ if @options.output_file && !@options.s3
124
+ puts "Saving resources to #{@options.output_file}.\n\n"
114
125
 
115
- File.write(@options.output_file, @resources.to_json)
126
+ File.write(@options.output_file, formatted_json)
116
127
  end
117
128
 
118
129
  # write output file to S3 bucket
@@ -128,7 +139,7 @@ module AwsRecon
128
139
  # build IO object and gzip it
129
140
  io = StringIO.new
130
141
  gzip_data = Zlib::GzipWriter.new(io)
131
- gzip_data.write(@resources.to_json)
142
+ gzip_data.write(formatted_json)
132
143
  gzip_data.close
133
144
 
134
145
  # send it to S3
@@ -137,9 +148,9 @@ module AwsRecon
137
148
  obj = s3_resource.bucket(s3_bucket).object(s3_full_object_path)
138
149
  obj.put(body: io.string)
139
150
 
140
- puts "Saving resources to S3 \x1b[32ms3://#{s3_bucket}/#{s3_full_object_path}\x1b[0m\n\n"
151
+ puts "Saving resources to S3 s3://#{s3_bucket}/#{s3_full_object_path}\n\n"
141
152
  rescue Aws::S3::Errors::ServiceError => e
142
- puts "\x1b[35mError!\x1b[0m - could not save output S3 bucket\n\n"
153
+ puts "Error! - could not save output S3 bucket\n\n"
143
154
  puts "#{e.message} - #{e.code}\n"
144
155
  end
145
156
  end
@@ -19,7 +19,7 @@ class Route53 < Mapper
19
19
  response.hosted_zones.each do |zone|
20
20
  struct = OpenStruct.new(zone.to_h)
21
21
  struct.type = 'zone'
22
- struct.arn = "aws:route53:#{@region}:#{@account}:zone/#{zone.name}"
22
+ struct.arn = "arn:aws:route53:#{@region}:#{@account}:zone/#{zone.name}"
23
23
  struct.logging_config = @client
24
24
  .list_query_logging_configs({ hosted_zone_id: zone.id })
25
25
  .query_logging_configs.first.to_h
@@ -73,6 +73,9 @@ class S3 < Mapper
73
73
  end
74
74
 
75
75
  resources.push(struct.to_h)
76
+
77
+ rescue Aws::S3::Errors::NoSuchBucket
78
+ # skip missing bucket
76
79
  end
77
80
  end
78
81
 
@@ -68,12 +68,12 @@ class Mapper
68
68
  def log(*msg)
69
69
  return unless @options.verbose
70
70
 
71
- puts _msg(msg).map { |x| "\x1b[32m#{x}\x1b[0m" }.join("\x1b[35m.\x1b[0m")
71
+ puts _msg(msg).map(&:to_s).join('.')
72
72
  end
73
73
 
74
74
  def log_error(*msg)
75
75
  return unless @options.verbose
76
76
 
77
- puts _msg(msg).map { |x| "\x1b[35m#{x}\x1b[0m" }.join("\x1b[32m.\x1b[0m")
77
+ puts _msg(msg).map(&:to_s).join('.')
78
78
  end
79
79
  end
@@ -20,6 +20,7 @@ class Parser
20
20
  :output_file,
21
21
  :output_format,
22
22
  :threads,
23
+ :jsonl,
23
24
  :collect_user_data,
24
25
  :skip_slow,
25
26
  :skip_credential_report,
@@ -55,6 +56,7 @@ class Parser
55
56
  false,
56
57
  false,
57
58
  false,
59
+ false,
58
60
  false
59
61
  )
60
62
 
@@ -116,6 +118,11 @@ class Parser
116
118
  args.threads = threads.to_i if (0..Parser::MAX_THREADS).include?(threads.to_i)
117
119
  end
118
120
 
121
+ # output NDJSON/JSONL format
122
+ opts.on('-l', '--json-lines', 'Output NDJSON/JSONL format (default: false)') do
123
+ args.jsonl = true
124
+ end
125
+
119
126
  # collect EC2 instance user data
120
127
  opts.on('-u', '--user-data', 'Collect EC2 instance user data (default: false)') do
121
128
  args.collect_user_data = true
@@ -1,3 +1,3 @@
1
1
  module AwsRecon
2
- VERSION = "0.4.0"
2
+ VERSION = "0.4.5"
3
3
  end
data/readme.md CHANGED
@@ -3,13 +3,13 @@
3
3
 
4
4
  # AWS Recon
5
5
 
6
- A multi-threaded AWS inventory collection tool.
6
+ A multi-threaded AWS security-focused inventory collection tool written in Ruby.
7
7
 
8
8
  This tool was created to facilitate efficient collection of a large amount of AWS resource attributes and metadata. It aims to collect nearly everything that is relevant to the security configuration and posture of an AWS environment.
9
9
 
10
- Existing tools (e.g. [AWS Config](https://aws.amazon.com/config)) that do some form of resource collection lack the coverage and specificity to accurately measure security posture (e.g. detailed attribute data and full policy documents).
10
+ Existing tools (e.g. [AWS Config](https://aws.amazon.com/config)) that do some form of resource collection lack the coverage and specificity to accurately measure security posture (e.g. detailed resource attribute data, fully parsed policy documents, and nested resource relationships).
11
11
 
12
- Enter AWS Recon, multi-threaded AWS inventory collection tool written in plain Ruby. Though Python tends to dominate the AWS tooling landscape, the [Ruby SDK](https://aws.amazon.com/sdk-for-ruby/) has a few convenient advantages over the [other](https://aws.amazon.com/sdk-for-node-js/) [AWS](https://aws.amazon.com/sdk-for-python/) [SDKs](https://aws.amazon.com/sdk-for-go/) we tested. Specifically, easy handling of automatic retries, paging of large responses, and - with some help - threading huge numbers of requests.
12
+ AWS Recon handles collection from large accounts by taking advantage of automatic retries (either due to network reliability or API throttling), automatic paging of large responses (> 100 resources per API call), and multi-threading parallel requests to speed up collection.
13
13
 
14
14
  ## Project Goals
15
15
 
@@ -31,7 +31,7 @@ Use Docker version 19.x or above to run the pre-built image without having to in
31
31
 
32
32
  #### Running locally via Ruby
33
33
 
34
- If you already have Ruby installed (2.5.x or 2.6.x), you may want to install the Ruby gem.
34
+ If you already have Ruby installed (2.6.x or 2.7.x), you may want to install the Ruby gem.
35
35
 
36
36
  ### Installation
37
37
 
@@ -276,6 +276,8 @@ Usage: aws_recon [options]
276
276
 
277
277
  Output is always some form of JSON - either JSON lines or plain JSON. The output is either written to a file (the default), or written to stdout (with `-j`).
278
278
 
279
+ When writing to an S3 bucket, the JSON output is automatically compressed with `gzip`.
280
+
279
281
  ## Support for Manually Enabled Regions
280
282
 
281
283
  If you have enabled **manually enabled regions**:
@@ -376,7 +378,7 @@ $ cd aws-recon
376
378
  Create a sticky gemset if using RVM:
377
379
 
378
380
  ```
379
- $ rvm use 2.6.5@aws_recon_dev --create --ruby-version
381
+ $ rvm use 2.7.2@aws_recon_dev --create --ruby-version
380
382
  ```
381
383
 
382
384
  Run `bin/setup` to install dependencies. Then, run `rake test` to run the tests. You can also run `bin/console` for an interactive prompt that will allow you to experiment.
@@ -0,0 +1,151 @@
1
+ AWSTemplateFormatVersion: '2010-09-09'
2
+ Description: 'Deploys AWS Recon inventory collection resources, scheduled ECS task and corresponding IAM roles and policies.'
3
+ Resources:
4
+ AWSReconVPC:
5
+ Type: AWS::EC2::VPC
6
+ Properties:
7
+ CidrBlock: '10.75.0.0/27'
8
+ Tags:
9
+ - Key: Name
10
+ Value: aws-recon-CFN
11
+ AWSReconSubnet:
12
+ Type: AWS::EC2::Subnet
13
+ Properties:
14
+ CidrBlock: '10.75.0.0/28'
15
+ VpcId: !Ref AWSReconVPC
16
+ Tags:
17
+ - Key: Name
18
+ Value: aws-recon-CFN
19
+ DependsOn: AWSReconVPC
20
+ AWSReconSecurityGroup:
21
+ Type: AWS::EC2::SecurityGroup
22
+ Properties:
23
+ GroupDescription: AWS Recon collection egress
24
+ VpcId: !Ref AWSReconVPC
25
+ SecurityGroupEgress:
26
+ - IpProtocol: -1
27
+ FromPort: 0
28
+ ToPort: 0
29
+ CidrIp: 0.0.0.0/0
30
+ Tags:
31
+ - Key: Name
32
+ Value: aws-recon-CFN
33
+ AWSReconInternetGateway:
34
+ Type: AWS::EC2::InternetGateway
35
+ Properties:
36
+ Tags:
37
+ - Key: Name
38
+ Value: aws-recon-CFN
39
+ AWSReconInternetGatewayAttachment:
40
+ Type: AWS::EC2::VPCGatewayAttachment
41
+ Properties:
42
+ InternetGatewayId: !Ref AWSReconInternetGateway
43
+ VpcId: !Ref AWSReconVPC
44
+ AWSReconEgressRouteTable:
45
+ Type: AWS::EC2::RouteTable
46
+ Properties:
47
+ VpcId: !Ref AWSReconVPC
48
+ Tags:
49
+ - Key: Name
50
+ Value: aws-recon-CFN
51
+ AWSReconSubnetRouteTableAssociation:
52
+ Type: AWS::EC2::SubnetRouteTableAssociation
53
+ Properties:
54
+ SubnetId: !Ref AWSReconSubnet
55
+ RouteTableId: !Ref AWSReconEgressRouteTable
56
+ AWSReconEgressRoute:
57
+ Type: AWS::EC2::Route
58
+ Properties:
59
+ DestinationCidrBlock: '0.0.0.0/0'
60
+ GatewayId: !Ref AWSReconInternetGateway
61
+ RouteTableId: !Ref AWSReconEgressRouteTable
62
+ AWSReconECSCluster:
63
+ Type: AWS::ECS::Cluster
64
+ Properties:
65
+ ClusterName: aws-recon-CFN
66
+ CapacityProviders:
67
+ - FARGATE
68
+ Tags:
69
+ - Key: Name
70
+ Value: aws-recon-CFN
71
+ DependsOn: AWSReconSubnet
72
+ AWSReconECSTask:
73
+ Type: AWS::ECS::TaskDefinition
74
+ Properties:
75
+ Family: aws-recon-CFN
76
+ RequiresCompatibilities:
77
+ - FARGATE
78
+ NetworkMode: awsvpc
79
+ Cpu: 1024
80
+ Memory: 2048
81
+ TaskRoleArn: !Ref AWSReconECSTaskRole
82
+ ExecutionRoleArn: !Ref AWSReconECSExecutionRole
83
+ ContainerDefinitions:
84
+ - Name: aws-recon-CFN
85
+ Image: 'darkbitio/aws_recon:latest'
86
+ EntryPoint:
87
+ - 'aws_recon'
88
+ - '--verbose'
89
+ - '--format'
90
+ - 'custom'
91
+ AWSReconECSTaskRole:
92
+ Type: AWS::IAM::Role
93
+ Properties:
94
+ RoleName: aws-recon-ecs-task-role
95
+ ManagedPolicyArns:
96
+ - 'arn:aws:iam::aws:policy/ReadOnlyAccess'
97
+ Policies:
98
+ - PolicyName: AWSReconECSTaskRole
99
+ PolicyDocument:
100
+ Version: '2012-10-17'
101
+ Statement:
102
+ - Effect: Allow
103
+ Action: 's3:PutObject'
104
+ Resource: 'arn:aws:s3:::CHANGEME/*'
105
+ AssumeRolePolicyDocument:
106
+ Version: '2012-10-17'
107
+ Statement:
108
+ - Effect: Allow
109
+ Principal:
110
+ Service:
111
+ - ecs.amazonaws.com
112
+ - ecs-tasks.amazonaws.com
113
+ Action: 'sts:AssumeRole'
114
+ AWSReconECSExecutionRole:
115
+ Type: AWS::IAM::Role
116
+ Properties:
117
+ RoleName: aws-recon-ecs-execution-role
118
+ Policies:
119
+ - PolicyName: AWSReconECSTaskExecutionPolicy
120
+ PolicyDocument:
121
+ Version: '2012-10-17'
122
+ Statement:
123
+ - Effect: Allow
124
+ Action:
125
+ - 'ecr:GetAuthorizationToken'
126
+ - 'ecr:BatchCheckLayerAvailability'
127
+ - 'ecr:GetDownloadUrlForLayer'
128
+ - 'ecr:BatchGetImage'
129
+ - 'logs:CreateLogStream'
130
+ - 'logs:PutLogEvents'
131
+ Resource: '*'
132
+ AssumeRolePolicyDocument:
133
+ Version: '2012-10-17'
134
+ Statement:
135
+ - Effect: Allow
136
+ Principal:
137
+ Service:
138
+ - ecs-tasks.amazonaws.com
139
+ Action: 'sts:AssumeRole'
140
+ AWSReconCloudWatchEventsRole:
141
+ Type: AWS::IAM::Role
142
+ Properties:
143
+ RoleName: aws-recon-events-role
144
+ AssumeRolePolicyDocument:
145
+ Version: '2012-10-17'
146
+ Statement:
147
+ - Effect: Allow
148
+ Principal:
149
+ Service:
150
+ - events.amazonaws.com
151
+ Action: 'sts:AssumeRole'
@@ -0,0 +1,26 @@
1
+ # https://www.terraform.io/docs/providers/aws/r/cloudwatch_event_rule.html
2
+ resource "aws_cloudwatch_event_rule" "default" {
3
+ name = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
4
+ description = "AWS Recon scheduled task"
5
+ schedule_expression = var.schedule_expression
6
+ }
7
+
8
+ # https://www.terraform.io/docs/providers/aws/r/cloudwatch_event_target.html
9
+ resource "aws_cloudwatch_event_target" "default" {
10
+ target_id = aws_ecs_task_definition.aws_recon_task.id
11
+ arn = aws_ecs_cluster.aws_recon.arn
12
+ rule = aws_cloudwatch_event_rule.default.name
13
+ role_arn = aws_iam_role.cw_events.arn
14
+
15
+ ecs_target {
16
+ launch_type = "FARGATE"
17
+ task_definition_arn = aws_ecs_task_definition.aws_recon_task.arn
18
+ platform_version = "LATEST"
19
+
20
+ network_configuration {
21
+ assign_public_ip = true
22
+ security_groups = [aws_security_group.sg.id]
23
+ subnets = [aws_subnet.subnet.id]
24
+ }
25
+ }
26
+ }
@@ -0,0 +1,49 @@
1
+ resource "aws_ecs_cluster" "aws_recon" {
2
+ name = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
3
+ capacity_providers = [local.ecs_task_provider]
4
+ }
5
+
6
+ resource "aws_ecs_task_definition" "aws_recon_task" {
7
+ family = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
8
+ task_role_arn = aws_iam_role.aws_recon_role.arn
9
+ execution_role_arn = aws_iam_role.ecs_task_execution.arn
10
+ requires_compatibilities = [local.ecs_task_provider]
11
+ network_mode = "awsvpc"
12
+ cpu = 1024
13
+ memory = 2048
14
+
15
+ container_definitions = jsonencode([
16
+ {
17
+ name = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
18
+ image = "${var.aws_recon_container_name}:${var.aws_recon_container_version}"
19
+ assign_public_ip = true
20
+ entryPoint = [
21
+ "aws_recon",
22
+ "--verbose",
23
+ "--format",
24
+ "custom",
25
+ "--s3-bucket",
26
+ "${aws_s3_bucket.aws_recon.bucket}:${data.aws_region.current.name}",
27
+ "--regions",
28
+ join(",", var.aws_regions)
29
+ ]
30
+ logConfiguration = {
31
+ logDriver = "awslogs"
32
+ options = {
33
+ awslogs-group = aws_cloudwatch_log_group.aws_recon.name,
34
+ awslogs-region = data.aws_region.current.name,
35
+ awslogs-stream-prefix = "ecs"
36
+ }
37
+ }
38
+ }
39
+ ])
40
+ }
41
+
42
+ resource "aws_cloudwatch_log_group" "aws_recon" {
43
+ name = "/ecs/${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
44
+ retention_in_days = var.retention_period
45
+ }
46
+
47
+ locals {
48
+ ecs_task_provider = "FARGATE"
49
+ }
@@ -0,0 +1,125 @@
1
+ #
2
+ # IAM policies and roles for ECS and CloudWatch execution
3
+ #
4
+ resource "aws_iam_role" "aws_recon_role" {
5
+ name = local.aws_recon_task_role_name
6
+ assume_role_policy = data.aws_iam_policy_document.aws_recon_task_execution_assume_role_policy.json
7
+ }
8
+
9
+ data "aws_iam_policy_document" "aws_recon_task_execution_assume_role_policy" {
10
+ statement {
11
+ actions = ["sts:AssumeRole"]
12
+
13
+ principals {
14
+ type = "Service"
15
+ identifiers = [
16
+ "ecs.amazonaws.com",
17
+ "ecs-tasks.amazonaws.com"
18
+ ]
19
+ }
20
+ }
21
+ }
22
+
23
+ resource "aws_iam_role_policy_attachment" "aws_recon_task_execution" {
24
+ role = aws_iam_role.aws_recon_role.name
25
+ policy_arn = data.aws_iam_policy.aws_recon_task_execution.arn
26
+ }
27
+
28
+ resource "aws_iam_role_policy" "aws_recon" {
29
+ name = local.bucket_write_policy_name
30
+ role = aws_iam_role.aws_recon_role.id
31
+
32
+ policy = jsonencode({
33
+ Version = "2012-10-17"
34
+ Id = "${var.aws_recon_base_name}-bucket-write"
35
+ Statement = [
36
+ {
37
+ Sid = "AWSReconS3PutObject"
38
+ Effect = "Allow"
39
+ Action = "s3:PutObject"
40
+ Resource = [
41
+ "${aws_s3_bucket.aws_recon.arn}/*"
42
+ ]
43
+ }
44
+ ]
45
+ })
46
+ }
47
+
48
+ data "aws_iam_policy" "aws_recon_task_execution" {
49
+ arn = "arn:aws:iam::aws:policy/ReadOnlyAccess"
50
+ }
51
+
52
+ resource "aws_iam_role" "ecs_task_execution" {
53
+ name = local.ecs_task_execution_role_name
54
+ assume_role_policy = data.aws_iam_policy_document.ecs_task_execution_assume_role_policy.json
55
+
56
+ tags = {
57
+ Name = local.ecs_task_execution_role_name
58
+ }
59
+ }
60
+
61
+ data "aws_iam_policy_document" "ecs_task_execution_assume_role_policy" {
62
+ statement {
63
+ actions = ["sts:AssumeRole"]
64
+
65
+ principals {
66
+ type = "Service"
67
+ identifiers = ["ecs-tasks.amazonaws.com"]
68
+ }
69
+ }
70
+ }
71
+
72
+ # ECS task execution
73
+ resource "aws_iam_policy" "ecs_task_execution" {
74
+ name = local.ecs_task_execution_policy_name
75
+ policy = data.aws_iam_policy.ecs_task_execution.policy
76
+ }
77
+
78
+ resource "aws_iam_role_policy_attachment" "ecs_task_execution" {
79
+ role = aws_iam_role.ecs_task_execution.name
80
+ policy_arn = aws_iam_policy.ecs_task_execution.arn
81
+ }
82
+
83
+ data "aws_iam_policy" "ecs_task_execution" {
84
+ arn = "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
85
+ }
86
+
87
+ # CloudWatch Events
88
+ resource "aws_iam_role" "cw_events" {
89
+ name = local.cw_events_role_name
90
+ assume_role_policy = data.aws_iam_policy_document.cw_events_assume_role_policy.json
91
+ }
92
+
93
+ data "aws_iam_policy_document" "cw_events_assume_role_policy" {
94
+ statement {
95
+ actions = ["sts:AssumeRole"]
96
+
97
+ principals {
98
+ type = "Service"
99
+ identifiers = ["events.amazonaws.com"]
100
+ }
101
+ }
102
+ }
103
+
104
+ resource "aws_iam_policy" "cw_events" {
105
+ name = local.cw_events_policy_name
106
+ policy = data.aws_iam_policy.cw_events.policy
107
+ }
108
+
109
+ resource "aws_iam_role_policy_attachment" "cw_events" {
110
+ role = aws_iam_role.cw_events.name
111
+ policy_arn = aws_iam_policy.cw_events.arn
112
+ }
113
+
114
+ data "aws_iam_policy" "cw_events" {
115
+ arn = "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceEventsRole"
116
+ }
117
+
118
+ locals {
119
+ bucket_write_policy_name = "${var.aws_recon_base_name}-bucket-write-policy"
120
+ ecs_task_execution_role_name = "${var.aws_recon_base_name}-ecs-task-execution-role"
121
+ ecs_task_execution_policy_name = "${var.aws_recon_base_name}-ecs-task-execution-policy"
122
+ cw_events_policy_name = "${var.aws_recon_base_name}-cw-events-policy"
123
+ cw_events_role_name = "${var.aws_recon_base_name}-cw-events-role"
124
+ aws_recon_task_role_name = "${var.aws_recon_base_name}-exec-role"
125
+ }
@@ -0,0 +1,13 @@
1
+ terraform {
2
+ required_providers {
3
+ aws = {
4
+ source = "hashicorp/aws"
5
+ version = "~> 3.0"
6
+ }
7
+ }
8
+ }
9
+
10
+ # Configure the AWS Provider
11
+ provider "aws" {
12
+ region = "us-east-2"
13
+ }
@@ -0,0 +1,15 @@
1
+ output "aws_recon_ecs_cluster" {
2
+ value = aws_ecs_cluster.aws_recon.name
3
+ }
4
+
5
+ output "aws_recon_ecs_scheduled_task" {
6
+ value = aws_cloudwatch_event_rule.default.name
7
+ }
8
+
9
+ output "aws_recon_s3_bucket" {
10
+ value = aws_s3_bucket.aws_recon.bucket
11
+ }
12
+
13
+ output "aws_recon_task_manual_run_command" {
14
+ value = "\nOne-off task run command:\n\naws ecs run-task --task-definition ${aws_ecs_task_definition.aws_recon_task.family} --cluster ${aws_ecs_cluster.aws_recon.name} --launch-type FARGATE --network-configuration \"awsvpcConfiguration={subnets=[${aws_subnet.subnet.id}],securityGroups=[${aws_security_group.sg.id}],assignPublicIp=ENABLED}\"\n"
15
+ }
@@ -0,0 +1,20 @@
1
+ ## Terraform Setup
2
+
3
+ This is an example module that can be used in its current form or modified for your specific environment. It builds the minimum components necessary to collect inventory on a schedule running AWS Recon as a Fargate scheduled task.
4
+
5
+ ### Requirements
6
+
7
+ Before running this Terraform module, adjust your region accordingly in `main.tf`.
8
+
9
+ ### What is created?
10
+
11
+ This Terraform example will deploy the following resources:
12
+
13
+ - an S3 bucket to store compressed JSON output files
14
+ - an IAM role for ECS task execution
15
+ - a Security Group for the ECS cluster/task
16
+ - a VPC and NGW for the ECS cluster/task
17
+ - an ECS/Fargate cluster
18
+ - an ECS task definition to run AWS Recon collection
19
+ - a CloudWatch event rule to trigger the ECS task
20
+ - a CloudTrail log group for ECS task logs
@@ -0,0 +1,20 @@
1
+ resource "aws_s3_bucket" "aws_recon" {
2
+ bucket = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}-${data.aws_iam_account_alias.current.id}"
3
+ acl = "private"
4
+ force_destroy = true
5
+
6
+ lifecycle_rule {
7
+ id = "expire-after-${var.retention_period}-days"
8
+ enabled = true
9
+
10
+ expiration {
11
+ days = var.retention_period
12
+ }
13
+ }
14
+ }
15
+
16
+ resource "random_id" "aws_recon" {
17
+ byte_length = 6
18
+ }
19
+
20
+ data "aws_iam_account_alias" "current" {}
@@ -0,0 +1,58 @@
1
+ variable "aws_recon_base_name" {
2
+ type = string
3
+ default = "aws-recon"
4
+ }
5
+
6
+ variable "aws_recon_container_name" {
7
+ type = string
8
+ default = "darkbitio/aws_recon"
9
+ }
10
+
11
+ variable "aws_recon_container_version" {
12
+ type = string
13
+ default = "latest"
14
+ }
15
+
16
+ variable "aws_regions" {
17
+ type = list(any)
18
+ default = [
19
+ "global",
20
+ # "af-south-1",
21
+ # "ap-east-1",
22
+ # "ap-northeast-1",
23
+ # "ap-northeast-2",
24
+ # "ap-northeast-3",
25
+ # "ap-south-1",
26
+ # "ap-southeast-1",
27
+ # "ap-southeast-2",
28
+ # "ca-central-1",
29
+ # "eu-central-1",
30
+ # "eu-north-1",
31
+ # "eu-south-1",
32
+ # "eu-west-1",
33
+ # "eu-west-2",
34
+ # "eu-west-3",
35
+ # "me-south-1",
36
+ # "sa-east-1",
37
+ "us-east-1",
38
+ "us-east-2",
39
+ "us-west-1",
40
+ "us-west-2",
41
+ ]
42
+ }
43
+
44
+ # must be one of: 0, 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365
45
+ variable "retention_period" {
46
+ type = number
47
+ default = 30
48
+ }
49
+
50
+ variable "schedule_expression" {
51
+ type = string
52
+ default = "cron(4 * * * ? *)"
53
+ }
54
+
55
+ variable "base_subnet_cidr" {
56
+ type = string
57
+ default = "10.76.0.0/16"
58
+ }
@@ -0,0 +1,73 @@
1
+
2
+ # Create a VPC
3
+ resource "aws_vpc" "vpc" {
4
+ cidr_block = local.cidr_block
5
+ tags = {
6
+ Name = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
7
+ }
8
+ }
9
+
10
+ # Create subnet
11
+ resource "aws_subnet" "subnet" {
12
+ vpc_id = aws_vpc.vpc.id
13
+ cidr_block = local.subnet_cidr_block
14
+ availability_zone = data.aws_availability_zones.available.names[0]
15
+
16
+ tags = {
17
+ Name = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}-public"
18
+ }
19
+ }
20
+
21
+ resource "aws_security_group" "sg" {
22
+ name = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
23
+ description = "Allow AWS Recon collection egress"
24
+ vpc_id = aws_vpc.vpc.id
25
+
26
+ egress {
27
+ from_port = 0
28
+ to_port = 0
29
+ protocol = "-1"
30
+ cidr_blocks = ["0.0.0.0/0"]
31
+ }
32
+
33
+ tags = {
34
+ Name = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
35
+ }
36
+ }
37
+
38
+ resource "aws_internet_gateway" "igw" {
39
+ vpc_id = aws_vpc.vpc.id
40
+
41
+ tags = {
42
+ Name = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
43
+ }
44
+ }
45
+
46
+ resource "aws_route_table" "rt" {
47
+ vpc_id = aws_vpc.vpc.id
48
+
49
+ route {
50
+ cidr_block = "0.0.0.0/0"
51
+ gateway_id = aws_internet_gateway.igw.id
52
+ }
53
+
54
+ tags = {
55
+ Name = "${var.aws_recon_base_name}-${random_id.aws_recon.hex}"
56
+ }
57
+ }
58
+
59
+ resource "aws_route_table_association" "rt_association" {
60
+ subnet_id = aws_subnet.subnet.id
61
+ route_table_id = aws_route_table.rt.id
62
+ }
63
+
64
+ locals {
65
+ cidr_block = var.base_subnet_cidr
66
+ subnet_cidr_block = cidrsubnet(local.cidr_block, 8, 0)
67
+ }
68
+
69
+ data "aws_region" "current" {}
70
+
71
+ data "aws_availability_zones" "available" {
72
+ state = "available"
73
+ }
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws_recon
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.0
4
+ version: 0.4.5
5
5
  platform: ruby
6
6
  authors:
7
7
  - Josh Larsen
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2021-03-30 00:00:00.000000000 Z
12
+ date: 2021-04-06 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: aws-sdk
@@ -244,6 +244,16 @@ files:
244
244
  - lib/aws_recon/services.yaml
245
245
  - lib/aws_recon/version.rb
246
246
  - readme.md
247
+ - utils/cloudformation/aws-recon-cfn-template.yml
248
+ - utils/terraform/cloudwatch.tf
249
+ - utils/terraform/ecs.tf
250
+ - utils/terraform/iam.tf
251
+ - utils/terraform/main.tf
252
+ - utils/terraform/output.tf
253
+ - utils/terraform/readme.md
254
+ - utils/terraform/s3.tf
255
+ - utils/terraform/vars.tf
256
+ - utils/terraform/vpc.tf
247
257
  homepage: https://github.com/darkbitio/aws-recon
248
258
  licenses:
249
259
  - MIT
@@ -266,5 +276,5 @@ requirements: []
266
276
  rubygems_version: 3.0.8
267
277
  signing_key:
268
278
  specification_version: 4
269
- summary: A multi-threaded AWS inventory collection cli tool.
279
+ summary: A multi-threaded AWS security-focused inventory collection tool.
270
280
  test_files: []