cfn-nag 0.5.16 → 0.5.17

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f54fefb56a9075ff84e6c296efce0af7e61af28c1a401994e3f9d231701b8cb9
4
- data.tar.gz: 89e772cf489875f245bd7a26fe0b4fb7f2429c042fffe76e09f42f243c03076a
3
+ metadata.gz: a2aef8ca978e7bec7da91b72542b6ce2a71d5b892ea68742e8ec354a6378baf7
4
+ data.tar.gz: aac3bcd3d7655b5482df715cd596b2e92d466b121d64c2e427687e1bf816d72e
5
5
  SHA512:
6
- metadata.gz: 81580a8f9ef1cd1c9f004d55ce7dc9ff6f0e8ccd5e6e3d0082bc40dc5e813e8fd125828a351000936cc5afd930a80da9266627bb9db6cb3cd9799aaef20abf88
7
- data.tar.gz: ca919585b93bb22a75337fd0f56a1e0b7067e6d9822160c6b4c4c3d77790cc438db65bdbf84892a3173bd34f15808a96de335ae56f370c332bf85c339af483cf
6
+ metadata.gz: a32ace894c95bd5ff075a0de2cdb3ba62aa6e749d52ea3395985d0c71c86ba8deebd983ea5783dbe4994f9697da2e882f0361a222b0533ad61fb7e656d821b35
7
+ data.tar.gz: 4defeed8e3cef607919e4964dbc08a36c54b502ed19decaa5b95cc544c374d7aec6d897bc9f8b62f3fa67ec43705b31b2f3a3836000d12b1c75dcefed67d6287
@@ -0,0 +1,27 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'cfn-nag/violation'
4
+ require_relative 'base'
5
+
6
+ class EMRClusterSecurityConfigurationAttachedRule < BaseRule
7
+ def rule_text
8
+ 'EMR Cluster should specify SecurityConfiguration.'
9
+ end
10
+
11
+ def rule_type
12
+ Violation::WARNING
13
+ end
14
+
15
+ def rule_id
16
+ 'W63'
17
+ end
18
+
19
+ def audit_impl(cfn_model)
20
+ violating_emr_clusters = cfn_model.resources_by_type('AWS::EMR::Cluster').select do |cluster|
21
+ # Warn if SecurityConfiguration property is not set or does not exist in this template
22
+ cluster.securityConfiguration.nil? || cfn_model.resource_by_ref(cluster.securityConfiguration, 'Arn').nil?
23
+ end
24
+
25
+ violating_emr_clusters.map(&:logical_resource_id)
26
+ end
27
+ end
@@ -0,0 +1,66 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'cfn-nag/violation'
4
+ require_relative 'base'
5
+
6
+ class EMRSecurityConfigurationEncryptionsEnabledAndConfiguredRule < BaseRule
7
+ def rule_text
8
+ 'EMR SecurityConfiguration should enable and properly configure encryption at rest and in transit.'
9
+ end
10
+
11
+ def rule_type
12
+ Violation::WARNING
13
+ end
14
+
15
+ def rule_id
16
+ 'W61'
17
+ end
18
+
19
+ def audit_impl(cfn_model)
20
+ violating_emr_sec_configs = cfn_model.resources_by_type('AWS::EMR::SecurityConfiguration').select do |sec_config|
21
+ bad_security_config?(sec_config)
22
+ end
23
+
24
+ violating_emr_sec_configs.map(&:logical_resource_id)
25
+ end
26
+
27
+ private
28
+
29
+ def bad_security_config?(security_config_object)
30
+ # Poorly formatted SecurityConfiguration
31
+ return true unless security_config_object.securityConfiguration['EncryptionConfiguration']
32
+
33
+ encryption_config = security_config_object.securityConfiguration['EncryptionConfiguration']
34
+
35
+ # Either encryption type disabled
36
+ return true unless encryption_config['EnableAtRestEncryption'] && encryption_config['EnableInTransitEncryption']
37
+
38
+ bad_at_rest_encryption?(encryption_config) || bad_in_transit_encryption?(encryption_config)
39
+ end
40
+
41
+ def bad_at_rest_encryption?(config)
42
+ # Missing AtRestEncryptionConfiguration
43
+ return true unless config.key?('AtRestEncryptionConfiguration')
44
+
45
+ # AtRest encryptions misconfigured
46
+ return true unless \
47
+ (config['AtRestEncryptionConfiguration'].key?('LocalDiskEncryptionConfiguration') &&
48
+ config['AtRestEncryptionConfiguration']['LocalDiskEncryptionConfiguration'].key?('EncryptionKeyProviderType')) ||
49
+ (config['AtRestEncryptionConfiguration'].key?('S3EncryptionConfiguration') &&
50
+ config['AtRestEncryptionConfiguration']['S3EncryptionConfiguration'].key?('EncryptionMode'))
51
+
52
+ false
53
+ end
54
+
55
+ def bad_in_transit_encryption?(config)
56
+ # Missing InTransitEncryptionConfiguration
57
+ return true unless config.key?('InTransitEncryptionConfiguration')
58
+
59
+ # InTransit encryptions misconfigured
60
+ return true unless \
61
+ config['InTransitEncryptionConfiguration'].key?('TLSCertificateConfiguration') &&
62
+ config['InTransitEncryptionConfiguration']['TLSCertificateConfiguration'].key?('CertificateProviderType')
63
+
64
+ false
65
+ end
66
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: cfn-nag
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.16
4
+ version: 0.5.17
5
5
  platform: ruby
6
6
  authors:
7
7
  - Eric Kascic
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-03-02 00:00:00.000000000 Z
11
+ date: 2020-03-03 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: rake
@@ -202,6 +202,8 @@ files:
202
202
  - lib/cfn-nag/custom_rules/EMRClusterKerberosAttributesADDomainJoinPasswordRule.rb
203
203
  - lib/cfn-nag/custom_rules/EMRClusterKerberosAttributesCrossRealmTrustPrincipalPasswordRule.rb
204
204
  - lib/cfn-nag/custom_rules/EMRClusterKerberosAttributesKdcAdminPasswordRule.rb
205
+ - lib/cfn-nag/custom_rules/EMRClusterSecurityConfigurationAttachedRule.rb
206
+ - lib/cfn-nag/custom_rules/EMRSecurityConfigurationEncryptionsEnabledAndConfiguredRule.rb
205
207
  - lib/cfn-nag/custom_rules/EbsVolumeEncryptionKeyRule.rb
206
208
  - lib/cfn-nag/custom_rules/EbsVolumeHasSseRule.rb
207
209
  - lib/cfn-nag/custom_rules/ElastiCacheReplicationGroupAtRestEncryptionRule.rb