Skip to content

Commit a500181

Browse files
authored
chore: Limit permissions to ECS services for Cloud Connector and Scanning (#34)
1 parent 5fd212b commit a500181

File tree

3 files changed

+24
-25
lines changed

3 files changed

+24
-25
lines changed

.github/PULL_REQUEST_TEMPLATE.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
> PR template
2-
>
2+
>
33
> * for a cleaner PR, **delete whatever is not required**
44
> * use pull-request **drafts for visiblity on WIP branches**
55
> * unless a revision is desired in order to validate, or gather some feedback, **you are free to merge it as long as**
@@ -14,10 +14,9 @@
1414
- [ ] Sysdig docs
1515
- [ ] **input/output** variables have been modified?
1616
- [ ] terraform-docs has been updated acordingly
17-
- [ ] if these inputs are mandatory, they've been changed on
17+
- [ ] if these inputs are mandatory, they've been changed on
1818
- [ ] examples
1919
- [ ] testing use-cases
2020
- [ ] snippets on README's
2121
- [ ] snippets on Secure Platform onboarding
2222
- [ ] had any problems developing this PR? add it to the readme **troubleshooting** list! may come handy to someone
23-

modules/services/cloud-connector/ecs-service-security.tf

Lines changed: 13 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -46,30 +46,27 @@ data "aws_iam_policy_document" "iam_role_task_policy" {
4646
statement {
4747
effect = "Allow"
4848
actions = [
49-
"s3:*", # FIXME. refine only for Get and List
49+
"s3:GetObject",
50+
"s3:ListBucket",
51+
]
52+
resources = ["*"]
53+
}
54+
statement {
55+
effect = "Allow"
56+
actions = [
5057
"sts:AssumeRole",
51-
52-
"logs:DescribeLogStreams",
53-
"logs:GetLogEvents",
54-
"logs:FilterLogEvents",
55-
"logs:PutLogEvents",
56-
57-
# FIXME. this should be done over the specific resource
58-
"sqs:DeleteMessage",
59-
"sqs:DeleteMessageBatch",
60-
"sqs:ReceiveMessage"
6158
]
62-
resources = ["*"] # FIXME. make more specific?
59+
resources = ["*"]
6360
}
6461

6562
statement {
66-
sid = "AllowSecurityHub"
6763
effect = "Allow"
6864
actions = [
69-
"securityhub:GetFindings",
70-
"securityhub:BatchImportFindings",
65+
"sqs:DeleteMessage",
66+
"sqs:DeleteMessageBatch",
67+
"sqs:ReceiveMessage"
7168
]
72-
resources = ["arn:aws:securityhub:${data.aws_region.current.name}::product/sysdig/sysdig-cloud-connector"]
69+
resources = [module.cloud_connector_sqs.cloudtrail_sns_subscribed_sqs_arn]
7370
}
7471
}
7572

modules/services/cloud-scanning/ecs-service-security.tf

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -45,16 +45,19 @@ data "aws_iam_policy_document" "iam_role_task_role_policy" {
4545
statement {
4646
effect = "Allow"
4747
actions = [
48-
"s3:Get*",
49-
"s3:List",
50-
"s3:Put*",
51-
"s3:Head",
52-
48+
"s3:GetObject",
49+
"s3:ListBucket",
50+
]
51+
resources = ["*"]
52+
}
53+
statement {
54+
effect = "Allow"
55+
actions = [
5356
"sqs:DeleteMessage",
5457
"sqs:DeleteMessageBatch",
5558
"sqs:ReceiveMessage"
5659
]
57-
resources = ["*"]
60+
resources = [module.cloud_scanning_sqs.cloudtrail_sns_subscribed_sqs_arn]
5861
}
5962
}
6063

0 commit comments

Comments
 (0)