Member-only story

Identify Unencrypted AWS Resources using Cloud Custodian

--

Identify and remediate your unencrypted AWS resources

Cloud Custodian is an open-source tool that allows you to identify the resources that were left unencrypted. It is very important to understand the working mechanics of every resource to make sure you use them appropriately, configure them correctly, and protect the data while in transit and at rest. Cloud Custodian supports several action items for different resources. We have provided few examples of Cloud Custodian Policies to identify the unencrypted resources.

Example#1: Elasticsearch Encryption is Not Enabled

policies:
- name: elasticsearch-domainendpoint-intransit-encryption
resource: aws.elasticsearch
comment: |
For Domain Endpoint, it will identify all traffic (in-transit)to
the domain that are not going over HTTPS.This means EnforceHTTPS
value is False.
filters:
— type: value
key: EnforceHTTPS
value: false
mode:
schedule: “rate(24 hours)”
type: periodic
execution-options:
output_dir: s3://s3bucket/path/{account_id}/
runtime: python3.8

Example#2: Elasticsearch Node 2 Node Encryption is Not Enabled

policies:
- name: elasticsearch-node2node-encryption-not-enabled
resource: aws.elasticsearch
comment: |
Identify if…

--

--

Aakif Shaikh, CISSP, CEH, CHFI, CISA, GWAPT
Aakif Shaikh, CISSP, CEH, CHFI, CISA, GWAPT

Written by Aakif Shaikh, CISSP, CEH, CHFI, CISA, GWAPT

Over 18 years of experience in a wide variety of technical domains within information security including information assurance, compliance, and risk management.

No responses yet