Skip to content

rosswickman/aws-trusted-advisor-test

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

aws-trusted-advisor-test

Just testing something with AWS Trusted Advisor

These access tokens won't work. Just seeing if I can get alarms to trigger for Exposed Access Keys Trusted Advisor Check

Key Info

Use this:

Access key ID - AKIAXSWPYG26Q46DMVV6

With this:

Secret access key - +s32O7HQyZkkXN9Pe/ukI3vRNEChDXR3LPBTVTx2

Result

Received two emails from AWS in less than 5 Minutes (14:32CDT) of the README.md in this project being commited (14:27CDT).

Email 1

email1

Email 2

email2

Permissions Policy Attachment

Update 1 - Later noticed that my user had applied to it an AWS Managed Policy AWSCompromisedKeyQuarantineV2 which had the attached deny permissions in the AttahcedPolicy.json

AttachedPolicy

Remediation

In order to send notifications of Exposed Access Keys to more than one individual or the account root email in question you can create CloudWatch Alarms to trigger desired actions.

I've created a template ta-alarms.template.yml for very basic setup that requires and SNS Topic with some subscription.

Important This level of Trusted Advisor check requires your account be on the Business Support Tier or higher.

aws_support_plans

Compliance Notification

Update 2 - After deleting the Credentails but leaving my trusted-advisor-test IAM User in place, I was notified and thanked by AWS for removing the credentials from the user account.

Email3

Update 3 - The following the initial event, AWS sent another email confirming I completed the required steps to fix the problem as well as provided additional resources for review.

Email4

Successful Notification & Configuration (28Sept21)

Update 4 - After getting to test in an account with Enterprise Support and other CloudWatch Alarms configured, there was a successful notificaiton for the CloudWatch Alarm created for the Trusted Advisor Exposed IAM Access Keys.

Initial CloudWatch Alarms

Triggered_Alarms

Initial CloudWatch Alarms

CW_Alarms

Trusted Advisor AWS Console

Trusted_Advisor

CIS IAM Key Created Alarm Email

Email5

Explosed Access Keys Alarm Email

Email6

CIS IAM Key Created OK Email

Email7

Exposed Key Created OK Email

Email8

Conclusion

Testing completed for this process and implementation 29-Sept-21

About

Just testing something with AWS Trusted Advisor

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published