fedrampup

command module
v0.0.0-...-612153b Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jan 4, 2019 License: MIT Imports: 18 Imported by: 0

README

FedRAMPup!

How annoying is it to get an inventory of AWS resources for FedRAMP and then put that into the SSP formatted CSV? Very. fedrampup will handle all of this for you. It can be run on it's own from a Docker container or in AWS in Fargate with S3 output.

FedRAMP requires a full list of assets in the cloud and quite a bit of data around it in the form of an Excel template called the SSP. This asset identification process can be tedious and expensive especially if you have multiple cloud accounts. Fedrampup allows you to automate asset collection by running a container that can automatically update an S3 CSV file in the exact you need for FedRAMP.

Run

With Go installed

go get -u https://github.com/ScaleSec/fedrampup

# Assuming your environment variables are configured correctly just run
fedrampup

Without Go installed, but using Docker

# Example:
docker run -e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \
           -e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \
           -e "OUTPUT_FILE=s3://my-bucket/output.csv" fedrampup

Authentication

If you pass in AWS environment variables into fedrampup it will use those, otherwise it will assume you are running on an EC2 instance or ECS container (recommended) and use standard instance profile authentication.

Permissions/Setup

The example in examples/terraform-ec2 shows creating two policies: one for S3 and then attaching the AWS Managed SecurityAudit policy. Since FedRAMPup can be run either in the account where it lives, or STS into other accounts, the permissions will have to be slightly different, so we'll handle both those cases:

Single Account - Run FedRAMPup in the account that you're scanning

The policies attached to the role of the instance running FedRAMPup should be:

  1. Create a Role with the following trust relationship
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "AllowEC2RoleAssumption",
      "Action": "sts:AssumeRole",
      "Principal": {
        "Service": "ec2.amazonaws.com"
      },
      "Effect": "Allow"
    }
  ]
}
  1. Create a policy for Bucket Write permissions (only if your output is S3) and attach it to the Role created in step 1.
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "",
            "Effect": "Allow",
            "Action": "s3:PutObject",
            "Resource": [
                "[BUCKET_ARN]/*",
                "[BUCKET_ARN]"
            ]
        }
    ]
}
  1. Attach the AWS Managed SecurityAudit policy to the Role created in Step 1.
  2. Use that Role to attach to an EC2 instance, ECS Task, etc.
Multiple Accounts - Run FedRAMPup in a different account than those you are scanning
  1. Follow Steps 1 and 2 from the above section. Before you move on, you should have a Role in the account where FedRAMPup lives into other accounts that will be used for the resource (EC2 or ECS) running FedRAMPup.

  2. Create a policy in the account where FedRAMPup lives to grant AssumeRole permissions to each of the accounts you want to access.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "AllowAssumeRole",
            "Effect": "Allow",
            "Action": [
                "sts:AssumeRole"
            ],
            "Resource": [
                "arn:aws:iam::111111111111:role/security_audit",
                "arn:aws:iam::222222222222:role/security_audit",
                ...
            ]
        }
    ]
}
  1. Attach this policy to your FedRAMPup role.
  2. Create a role in each account that you want to Assume Role into that corresponds with the policy for AssumeRole you just created. This role should have the following Trust Policy
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::[FedRAMPup Account ID]:root"
      },
      "Action": "sts:AssumeRole"
    }
  ]
}
  1. With the new role created allowing FedRAMPup to AssumeRole, you'll need to give this role that same SecurityAudit permission we talked about in the "Single Account" section.
  2. Repeat step 5 and 6 for every account specified in the policy for FedRAMPup

Configuration

Everyone's environment is different. That's why fedrampup has an extensive configuration framework based in environments in keeping with a 12 factor application.

FedRAMP SSP expects the assets in a CSV with the rows:

  • Unique Asset Identifier
  • IPv4 or IPv6 Address
  • Virtual
  • Public
  • DNS Name or URL
  • NetBIOS Name
  • MAC Address
  • Authenticated Scan
  • Baseline Configuration Name
  • OS Name and Version
  • Location
  • Asset Type
  • Hardware Make/Model
  • In Latest Scan
  • Software/Database Name
  • Software/Database Version
  • Patch Level
  • Function
  • Comments
  • Serial Number/Asset Tag Number
  • VLAN/Network ID
  • System Administrator/Owner
  • Application Administrator/Owner

There are several things you can configure, mainly what tags you use to identify assets. A full table of environment variables that can be passed in is below:

Env Var Default Value Description
REGIONS us-gov-west-1 Comma separated list of AWS regions
ROLES Comma separated list of AWS Role ARNs of separate accounts that will be scanned. If empty only the account with the EC2 Role for the host this is running on will be run. If not running on EC2, it will take credentials from Env
OUTPUT_FILE output.csv Output file name. If this starts with s3:// it will be treated as an S3 URI. Output format can be one of: csv
AWS_REGION us-gov-west-1 If S3 output is desired, this is the region of the S3 bucket.
SCAN_INTERVAL 24h How often security scans are run in your organization in Go duration format (i.e. 1h10m, 5m, etc.)
TAG_NETBIOS NetBIOS EC2 tag used for NetBIOS name for Windows hosts
TAG_ASSET_TYPE AssetType EC2 tag used for Asset Type
TAG_BASELINE_CONFIG BaselineConfiguration EC2 tag used for Baseline Configuration
TAG_AUTHENTICATED_SCAN_PLANNED AuthenticatedScanPlanned EC2 tag used for if and authenticated scan is planned
TAG_LAST_SCANNED LastScanned EC2 tag used for when the last scan was run on the host. Should be in RFC822 Format: "02 Jan 06 15:04 MST" (https://www.w3.org/Protocols/rfc822/ "Date and Time Specification")
TAG_APPLICATION_VENDOR ApplicationVendor EC2 tag used for Software/Database Vendor Name
TAG_APPLICATION_NAME_VERSION ApplicationNameAndVersion EC2 tag used for Software/Database Application Name and Version
TAG_APPLICATION_PATCH_LEVEL ApplicationPatchLevel EC2 tag used for Software/Database Patch Level
TAG_APPLICATION_FUNCTION ApplicationFunction EC2 tag used for Software/Database Function
TAG_COMMENTS Comments EC2 tag used for Comments
TAG_SERIAL_NUMBER SerialNumber EC2 tag used for the asset's serial number
TAG_SYSADMIN SysAdmin EC2 tag used for the asset's sysadmin or team
TAG_APPADMIN AppAdmin EC2 tag used for the asset's appadmin or team

Development

  1. Make changes
  2. Add tests
  3. Run go tests with make test
  4. If you want to run locally, make run
  5. Push your change to a fork and open a PR

Documentation

The Go Gopher

There is no documentation for this package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL