Skip to content
This repository has been archived by the owner on Aug 6, 2018. It is now read-only.

Latest commit

 

History

History

fullstop-unapproved-services-and-role-plugin

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

##Unapproved services and roles Plugin

###Aim of plugin Find out if someone uses an unapproved service and if someone changes roles that must not be changed. The plugin will compare the roles defined in IAM with a json file in ${FULLSTOP_UNAPPROVED_SERVICES_AND_ROLE_BUCKET_NAME}.

###Reacts on

EVENT SOURCE = "iam.amazonaws.com"
EVENT NAME = see the configuration section
POLICY NAME = the name of the files contained in s3 bucket will be used to match the role (the content will then be checked for equality)

###Configuration

You can modify the plugin configuration here: application.yml

fullstop:
    plugins:
        unapprovedServicesAndRole:
                    bucketName: ${FULLSTOP_UNAPPROVED_SERVICES_AND_ROLE_BUCKET_NAME}
                    prefix: ${FULLSTOP_UNAPPROVED_SERVICES_AND_ROLE_PREFIX}
                    # iam event names that activates the plugin
                    eventNames:
                      - 'CreateRole'
                      - 'DeleteRole'
                      - 'AttachRolePolicy'
                      - 'UpdateAssumeRolePolicy'
                      - 'PutRolePolicy'

If the list is empty, default will be used:

  • 'CreateRole'
  • 'DeleteRole'
  • 'AttachRolePolicy'
  • 'UpdateAssumeRolePolicy'
  • 'PutRolePolicy'

###Editing roles If you want to add or remove a role without creating a violation, you have to add/remove the role in the template as well. The template a be found in the S3 bucket ${FULLSTOP_UNAPPROVED_SERVICES_AND_ROLE_BUCKET_NAME}