You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+11-4Lines changed: 11 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -104,10 +104,17 @@ To configure Pritunl VPN:
104
104
105
105
Security scanning is graciously provided by Prowler. Prowler is the leading fully hosted, cloud-native solution providing continuous cluster security and compliance.
106
106
107
-
| Benchmark | Description |
108
-
|--------|---------------|
109
-
| Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 3389 | No Security Groups open to 0.0.0.0/0 |
110
-
| Ensure the default security group of every VPC restricts all traffic | No Default Security Groups open to 0.0.0.0/0 |
107
+
In this module, we have implemented the following CIS Compliance checks for VPC:
108
+
109
+
| Benchmark | Description | Status |
110
+
|-----------|-------------|--------|
111
+
| Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 3389 | No Security Groups open to 0.0.0.0/0 |✔|
112
+
| Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports | For all VPCs created using this module |✔|
113
+
| Ensure the default security group of every VPC restricts all traffic | For all VPCs created using this module |✔|
114
+
| Ensure VPC flow logging is enabled in all VPCs | No Default Security Groups open to 0.0.0.0/0 |✔|
115
+
| Ensure IAM instance roles are used for AWS resource access from instances |For VPN server created using this module |✓|
116
+
| Ensure EBS volume encryption is enabled | For VPN server created using this module |✓|
117
+
111
118
112
119
113
120
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
Copy file name to clipboardExpand all lines: examples/simple-vpc/README.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
Configuration in this directory creates set of VPC resources which may be sufficient for development environment.
4
4
5
-
There is a public and private subnet created per availability zone in addition to single NAT Gateway shared between all availability zones.
5
+
There is a public subnet created per availability zone with Internet Gateway and route tables.
6
6
7
7
[Read more about AWS regions, availability zones and local zones](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html#concepts-regions-availability-zones).
Copy file name to clipboardExpand all lines: examples/vpc-with-peering/README.md
+18-6Lines changed: 18 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -4,13 +4,25 @@ Configuration in this directory creates a VPC peering connection between two VPC
4
4
5
5
## Usage
6
6
7
-
To run this example you need to execute:
7
+
To run this example you need to execute this module in two parts :
8
8
9
-
```bash
10
-
$ terraform init
11
-
$ terraform plan
12
-
$ terraform apply
13
-
```
9
+
1. Execute the below command to deploy accepter and requester VPC:
10
+
11
+
```bash
12
+
$ cd vpc-requester-accepter
13
+
$ terraform init
14
+
$ terraform plan
15
+
$ terraform apply
16
+
```
17
+
2. Copy the VPC id from the output and update in root (peering) main.tf locals block.
18
+
19
+
3. Execute the below commandfor peering of created VPC:
20
+
21
+
```bash
22
+
$ terraform init
23
+
$ terraform plan
24
+
$ terraform apply
25
+
```
14
26
15
27
Note that this example may create resources which can cost money (AWS Elastic IP, for example). Run `terraform destroy` when you don't need these resources.
0 commit comments