Self-Service Security Assessment too l
Cybersecurity remains a very important topic and point of concern for many CIOs, CISOs, and their customers. To meet these important concerns, AWS has developed a primary set of services customers should use to aid in protecting their accounts. Amazon GuardDuty, AWS Security Hub, AWS Config, and AWS Well-Architected reviews help customers maintain a strong security posture over their AWS accounts. As more organizations deploy to the cloud, especially if they are doing so quickly, and they have not yet implemented the recommended AWS Services, there may be a need to conduct a rapid security assessment of the cloud environment.
With that in mind, we have worked to develop an inexpensive, easy to deploy, secure, and fast solution to provide our customers two (2) security assessment reports. These security assessments are from the open source projects “Prowler” and “ScoutSuite.” Each of these projects conduct an assessment based on AWS best practices and can help quickly identify any potential risk areas in a customer’s deployed environment. If you are interested in conducting these assessments on a continuous basis, AWS recommends enabling Security Hub’s Foundational Security Best P ractices standard. If you are interested in integrating your Prowler assessment results with Security Hub, you can also do that from Prowler natively following instructions here.
In addition, we have developed custom modules that speak to customer concerns around threats and misconfigurations of those issues, currently this includes checks for ransomware specific findings.
Overview – Open Source project checks
The architecture we deploy is a very simple VPC with two (2) subnets, one (1) NAT Gateway, one (1) EC2 instance, and one (1) S3 Bucket. The EC2 instance is using Amazon Linux 2 (the latest published AMI), that is patched on boot, pulls down the two projects (Prowler and ScoutSuite), runs the assessments and then delivers the reports to the S3 Bucket. The EC2 instances does not deploy with any EC2 Key Pair, does not have any open ingress rules on its Security Group, and is placed in the Private Subnet so it does not have direct internet access. After completion of the assessment and the delivery of the reports the system can be terminated.
The deployment is accomplished through the use of CloudFormation. A single CloudFormation template is used to launch a few other templates (in a modular approach). No parameters (user input) is required and the automated build out of the environment will take on average less than 10 minutes to complete. These templates are provided for review in this Github repository.
Once the EC2 Instance has been created and begins, the two assessments it will take somewhere around 40 minutes to complete. At the end of the assessments and after the two reports are delivered to the S3 Bucket the Instance will automatically shutdown, You may at this time safely terminate the Instance.
How to deploy this tool
How do I read the reports?
Here is a diagram of the architecture.
What will be created
Open source security Assessments
These security assessments are from the open source projects “Prowler” and “ScoutSuite.” Each of these projects conduct an assessment based on AWS best practices and can help quickly identify any potential risk areas in a customer’s deployed environment.
The first assessment is from Prowler.
- Prowler follows guidelines of the CIS Amazon Web Services Foundations Benchmark (49 checks) and has 40 additional checks including related to GDPR and HIPAA, in total Prowler offers over 160 checks.
The second assessment is from ScoutSuite
- ScoutSuite has been around since 2012, originally a Scout, then Scout2, and now ScoutSuite. This will provide a set of files that can be viewed in your browser and conducts a wide range of checks
Overiew of optional modules
► Check for Common Security Mistakes module
When enabled, this module will deploy a lambda function that checks for common security mistakes highlighted in https://www.youtube.com/watch?v=tmuClE3nWlk.
What will be created
A Lambda function that will perform the checks. Some of the checks include:
- GuardDuty set to alert on findings
- GuardDuty enabled across all regions
- Prevent accidental key deletion
- Existence of a Multi-region CloudTrail
- CloudTrail validation enabled
- No local IAM users
- Roles tuned for least privilege in last 90 days
- Alerting for root account use
- Alerting for local IAM user create/delete
- Use of Managed Prefix Lists in Security Groups
- Public S3 Buckets
► Ransomware modules
When enabled, this module will deploy separate functions that can help customers with evaluating their environment for ransomware infection and susceptibility to ransomware damage.
What will be created
- AWS Core security services enabled
- Checks for AWS security service enablement in all regions where applicable (GuardDuty, SecurityHub)
- Data protection checks
- Checks for EBS volumes with no snapshot
- Checks for outdated OS running
- Checks for S3 bucket replication JobStatus
- Checks for EC2 instances that can not be managed with SSM
- Checks for Stale IAM roles that have been granted S3 access but have not used them in the last 60 days
- Checks for S3 deny public access enablement
- Checks to see if DNSSEC is enabled for public hosted zones in Amazon Route 53
- Checks to see if logging is enabled for services relevant to ransomware (i.e. CloudFront, Lambda, Route53 Query Logging, and Route 53 Resolver Logging).
- Checks to see if Route 53 Resolver DNS Firewall is enabled across all relevant regions
- Checks to see if there are any Access Keys that have not been used in last 90 days
► SolarWinds module
When enabled, this module will deploy separate functions that can help customers with evaluating their environment for SolarWinds vulnerability. The checks are based on CISA Alert AA20-352A from Appendix A & B.
Note: Prior to enablement of this module, please read the module documentation which reviews the steps that need to be completed prior to using this module.
Note: This module MUST be run separately as its own stack, select the S3 URL SelfServiceSecSolar.yml to deploy
What will be created
- Athena query – AA20352A IP IOC
- This Athena query will scan your VPC flow logs for IP addresses from the CISA AA20-352A.
- SSM Automation document – SolorWindsAA20-352AAutomatedScanner
- This is a systems manager automation document that will scan Windows EC2 instances for impacted .dll files from CISA AA20-352A.
- Route53 DNS resolver query – AA20352A DNS IOC
- This Athena query will scan your DNS logs for customers that have enabled DNS query logging
- Is there a cost?
- Yes. This should normally cost less than $1 for an hour of use.
- Is this a continuous monitoring and reporting tool?
- No. This is a one-time assessment, we urge customers to leverage tooling like AWS SecurityHub for Ongoing assessments.
- Why does the CloudFormation service error when deleting the stack?
- You must remove the objects (reports) out of the S3 bucket first
- Does this integrate with GuardDuty, Security Hub, CloudWatch, etc.?
- Not at this time. In a future sprint we plan to incorporate integration with AWS services like Security Hub and GuardDuty. However, you can follow the instructions in this blog to integrate Prowler and Security Hub.
- How do I remediate the issues in the reports?
- Generally, the issues should be described in the report with readily identifiable corrections. Please follow up with the public documentation for each tool (Prowler and ScoutSuite) as well. If this is insufficient, please reach out to your AWS Account team and we will be more than happy to help you understand the reports and work towards remediating issues.
See CONTRIBUTING for more information.
This project is licensed under the Apache-2.0 License.