We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When using ScoutSuite to audit our infrastructure, we came across a problem where data events were incorrectly being logged.
Our CloudTrail logs from aws look like this:
{ "TrailARN": "<trail-arn>", "EventSelectors": [ { "ReadWriteType": "All", "IncludeManagementEvents": true, "DataResources": [ { "Type": "AWS::Lambda::Function", "Values": [ "arn:aws:lambda" ] } ], "ExcludeManagementEventSources": [] }, { "ReadWriteType": "All", "IncludeManagementEvents": true, "DataResources": [ { "Type": "AWS::S3::Object", "Values": [ "arn:aws:s3:::" ] } ], "ExcludeManagementEventSources": [] }, { "ReadWriteType": "All", "IncludeManagementEvents": true, "DataResources": [], "ExcludeManagementEventSources": [] } ] }
This is the check that is occuring:
ScoutSuite/ScoutSuite/providers/aws/resources/cloudtrail/trails.py
Lines 50 to 53 in 7909f2f
Which is incorrect as it reads not ALL data events, but overwrites DataEventsEnabled while iterating through the EventSelectors.
DataEventsEnabled
The text was updated successfully, but these errors were encountered:
No branches or pull requests
When using ScoutSuite to audit our infrastructure, we came across a problem where data events were incorrectly being logged.
Our CloudTrail logs from aws look like this:
This is the check that is occuring:
ScoutSuite/ScoutSuite/providers/aws/resources/cloudtrail/trails.py
Lines 50 to 53 in 7909f2f
Which is incorrect as it reads not ALL data events, but overwrites
DataEventsEnabled
while iterating through the EventSelectors.The text was updated successfully, but these errors were encountered: