diff --git a/checks/check_extra7113 b/checks/check_extra7113 new file mode 100644 index 00000000..aede9db7 --- /dev/null +++ b/checks/check_extra7113 @@ -0,0 +1,50 @@ +#!/usr/bin/env bash + +# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente +# +# Licensed under the Apache License, Version 2.0 (the "License"); you may not +# use this file except in compliance with the License. You may obtain a copy +# of the License at http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software distributed +# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR +# CONDITIONS OF ANY KIND, either express or implied. See the License for the +# specific language governing permissions and limitations under the License. + +# Remediation: +# +# https://www.cloudconformity.com/knowledge-base/aws/RDS/instance-deletion-protection.html +# https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.DBInstance.Modifying.html +# +# aws rds modify-db-instance \ +# --region us-east-1 \ +# --db-instance-identifier test-db \ +# --deletion-protection \ +# [--apply-immediately | --no-apply-immediately] + +CHECK_ID_extra7113="7.113" +CHECK_TITLE_extra7113="[extra7113] Check if RDS instances have deletion protection enabled (Not Scored) (Not part of CIS benchmark)" +CHECK_SCORED_extra7113="NOT_SCORED" +CHECK_TYPE_extra7113="EXTRA" +CHECK_SEVERITY_extra7113="Medium" +CHECK_ASFF_RESOURCE_TYPE_extra7113="AwsRdsDbInstance" +CHECK_ALTERNATE_check7113="extra7113" + +extra7113(){ + textInfo "Looking for RDS Volumes in all regions... " + for regx in $REGIONS; do + LIST_OF_RDS_INSTANCES=$($AWSCLI rds describe-db-instances $PROFILE_OPT --region $regx --query 'DBInstances[*].DBInstanceIdentifier' --output text) + if [[ $LIST_OF_RDS_INSTANCES ]];then + for rdsinstance in $LIST_OF_RDS_INSTANCES; do + IS_DELETIONPROTECTION=$($AWSCLI rds describe-db-instances $PROFILE_OPT --region $regx --db-instance-identifier $rdsinstance --query 'DBInstances[*].DeletionProtection' --output text) + if [[ $IS_DELETIONPROTECTION == "False" ]]; then + textFail "$regx: RDS instance $rdsinstance deletion protection is not enabled!" "$regx" + else + textPass "$regx: RDS instance $rdsinstance deletion protection is enabled" "$regx" + fi + done + else + textInfo "$regx: No RDS instances found" "$regx" + fi + done +} diff --git a/groups/group13_rds b/groups/group13_rds index a05971b1..bf1445b5 100644 --- a/groups/group13_rds +++ b/groups/group13_rds @@ -15,4 +15,4 @@ GROUP_ID[13]='rds' GROUP_NUMBER[13]='13.0' GROUP_TITLE[13]='RDS security checks - [rds] ***********************************' GROUP_RUN_BY_DEFAULT[13]='N' # run it when execute_all is called -GROUP_CHECKS[13]='extra78,extra723,extra735,extra739,extra747' +GROUP_CHECKS[13]='extra78,extra723,extra735,extra739,extra747,extra7113' diff --git a/groups/group7_extras b/groups/group7_extras index 9437c55f..041b56df 100644 --- a/groups/group7_extras +++ b/groups/group7_extras @@ -15,7 +15,7 @@ GROUP_ID[7]='extras' GROUP_NUMBER[7]='7.0' GROUP_TITLE[7]='Extras - all non CIS specific checks - [extras] ****************' GROUP_RUN_BY_DEFAULT[7]='Y' # run it when execute_all is called -GROUP_CHECKS[7]='extra71,extra72,extra73,extra74,extra75,extra76,extra77,extra78,extra79,extra710,extra711,extra712,extra713,extra714,extra715,extra716,extra717,extra718,extra719,extra720,extra721,extra722,extra723,extra724,extra725,extra726,extra727,extra728,extra729,extra730,extra731,extra732,extra733,extra734,extra735,extra736,extra737,extra738,extra739,extra740,extra741,extra742,extra743,extra744,extra745,extra746,extra747,extra748,extra749,extra750,extra751,extra752,extra753,extra754,extra755,extra756,extra757,extra758,extra761,extra762,extra763,extra764,extra765,extra767,extra768,extra769,extra770,extra771,extra772,extra773,extra774,extra775,extra776,extra777,extra778,extra779,extra780,extra781,extra782,extra783,extra784,extra785,extra786,extra787,extra788,extra791,extra792,extra793,extra794,extra795,extra796,extra797,extra798,extra799,extra7100,extra7101,extra7102,extra7103,extra7104,extra7105,extra7106,extra7107,extra7108,extra7109,extra7110,extra7111,extra7112' +GROUP_CHECKS[7]='extra71,extra72,extra73,extra74,extra75,extra76,extra77,extra78,extra79,extra710,extra711,extra712,extra713,extra714,extra715,extra716,extra717,extra718,extra719,extra720,extra721,extra722,extra723,extra724,extra725,extra726,extra727,extra728,extra729,extra730,extra731,extra732,extra733,extra734,extra735,extra736,extra737,extra738,extra739,extra740,extra741,extra742,extra743,extra744,extra745,extra746,extra747,extra748,extra749,extra750,extra751,extra752,extra753,extra754,extra755,extra756,extra757,extra758,extra761,extra762,extra763,extra764,extra765,extra767,extra768,extra769,extra770,extra771,extra772,extra773,extra774,extra775,extra776,extra777,extra778,extra779,extra780,extra781,extra782,extra783,extra784,extra785,extra786,extra787,extra788,extra791,extra792,extra793,extra794,extra795,extra796,extra797,extra798,extra799,extra7100,extra7101,extra7102,extra7103,extra7104,extra7105,extra7106,extra7107,extra7108,extra7109,extra7110,extra7111,extra7112,extra7113' # Extras 759 and 760 (lambda variables and code secrets finder are not included) # to run detect-secrets use `./prowler -g secrets`