Skip to content

Prescriptive Sentinel policies that can be used to establish secure Terraform configuration for Amazon Web Services networking infrastructure.

License

Notifications You must be signed in to change notification settings

sdrzazga-nsd/policy-library-aws-networking-terraform

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AWS Networking Sentinel Policies for Terraform

This library, provides prescriptive Terraform policies that can be used to establish secure Terraform configuration for Amazon Web Services. The policies that are contained in this library are based on the CIS Amazon Web Services Benchmarks. Terraform Cloud/Enterprise users can use the policies in this library to establish a foundational level of security for the services that they are adopting in Amazon Web Services.

NOTE:

This Policy Library is not an exhaustive list of all of possible security configurations and architecture that is available in Amazon Web Services. If you have questions, comments, or have identified ways for us to improve this library, please create a new GitHub issue.

Alternatively, We welcome any contributions that improve the quality of this library! To learn more about contributing and suggesting changes to this library, refer to the contributing guide.


Policies included

  • Ensure no security groups allow ingress from 0.0.0.0/0 to port 22 (docs | code)
  • Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 (docs | code)
  • Ensure the default security group of every VPC restricts all traffic (docs | code)

About

Prescriptive Sentinel policies that can be used to establish secure Terraform configuration for Amazon Web Services networking infrastructure.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • HCL 73.6%
  • Makefile 26.4%