-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Notify downstream consumers of new AWS Inspector scan findings #3754
Comments
I think this is the best issue to document this on, so here it goes.. Following the official AWS Inspector user guide, I was able to create an S3 Bucket to export findings from Inspector. The following steps provide a summary and highlight key obstacles:
KMS Key Policy
S3 Bucket Policy
|
Note that the above setup was a one-time process. From now on, users should be able to a navigate to the Inspector Findings page and just use the bucket and kms key that already exists. This is a manual process, so it doesn't solve this issue. It was just a workaround to get results out in a temporary fashion. This issue is still about automating the notification of new findings and reports. Note: if users are not in the Bucket and Key policies, they will not be able to download the results. |
The docs do mention a way of notifying you of AWS Inspector Findings which involves setting up an SNS topic with EventBridge which sends out emails. |
If it's possible, when you automate this, please make it possible to specify the bucket. I want to be able to direct backups, etc to the same bucket, and then also use it for restores in other clusters, so it's preferable that the bucket lifecycle not be tied to the EKS instance lifecycle. |
User Story
In order to inform downstream GSA consumers when an EKS instance has new security findings, the data.gov team wants interested parties to receive an email notifying them of the new findings.
Acceptance Criteria
[ACs should be clearly demoable/verifiable whenever possible. Try specifying them using BDD.]
WHEN new findings for the EC2 and ECR subjects that AWS Inspector watches are ingested into our logging solution
THEN the list of email addresses/Slack channels receive a notification with a summary of the things that AWS Inspector scans for
AND the notification includes a list of new findings
AND the notification includes a list of not-new findings that still exist.
Background
[Any helpful contextual notes or links to artifacts/evidence, if needed]
Security Considerations (required)
This work will make it easier to ensure that interested parties (eg the data.gov team, GSA IT) find out about security problems as they're noted in a provisioned EKS instance and the containers in the related ECR instance, without having to go look for them in the AWS Console dashboard or manually watch logs.
Sketch
Ideally this will not by done by following this AWS EventBridge example, though it's a fallback option.
Instead we want logs drained to an S3 bucket as described in #3753. The contents of that bucket are then ingested into a central logging/monitoring/alerting solution (eg New Relic Logs) alongside cloud.gov-app-generated logs. Notifications are generated when the monitored logs trigger alerts, as described in #3062.
The text was updated successfully, but these errors were encountered: