forked from aws-ia/cfn-abi-crowdstrike-fcs
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy patheks-protection-stack.yml
543 lines (518 loc) · 16.6 KB
/
eks-protection-stack.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
---
AWSTemplateFormatVersion: '2010-09-09'
Parameters:
StagingS3Bucket:
Type: String
Backend:
Type: String
Description: kernel or bpf for Daemonset Sensor
AllowedValues:
- 'kernel'
- 'bpf'
Default: 'kernel'
Registry:
Type: String
Description: Source Falcon Image from CrowdStrike or mirror to ECR
AllowedValues:
- 'crowdstrike'
- 'ecr'
Default: 'crowdstrike'
EnableKAC:
Type: String
Description: Deploy Kubernetes Admission Controller (KAC). For more info see https://falcon.crowdstrike.com/documentation/page/aa4fccee/container-security#s41cbec3
AllowedValues:
- 'true'
- 'false'
Default: 'true'
CrowdStrikeCloud:
Type: String
Description: Cloud for your Falcon CID (eg. us-1, us-2 or eu-1)
AllowedValues:
- 'us-1'
- 'us-2'
- 'eu-1'
Default: 'us-1'
EventBusName:
Type: String
Default: "crowdstrike-eks-eventbus"
OrganizationId:
Type: String
FalconClientId:
Type: String
NoEcho: true
FalconClientSecret:
Type: String
NoEcho: true
KubernetesUserName:
Type: String
Default: crowdstrike-eks
FalconCID:
Type: String
DockerAPIToken:
Type: String
NoEcho: true
EKSExecutionRoleName:
Type: String
Default: crowdstrike-eks-execution-role
CodeBuildProjectName:
Type: String
Default: crowdstrike-eks-codebuild
CodeBuildRoleName:
Type: String
Default: crowdstrike-eks-codebuild-role
EnvironmentName:
Description: An environment name that is prefixed to resource names
Type: String
Default: crowdstrike-eks
VpcCIDR:
Description: Please enter the IP range (CIDR notation) for this VPC
Type: String
Default: 10.192.0.0/16
PublicSubnet1CIDR:
Description: Please enter the IP range (CIDR notation) for the public subnet in the first Availability Zone
Type: String
Default: 10.192.10.0/24
PublicSubnet2CIDR:
Description: Please enter the IP range (CIDR notation) for the public subnet in the second Availability Zone
Type: String
Default: 10.192.11.0/24
PrivateSubnet1CIDR:
Description: Please enter the IP range (CIDR notation) for the private subnet in the first Availability Zone
Type: String
Default: 10.192.20.0/24
PrivateSubnet2CIDR:
Description: Please enter the IP range (CIDR notation) for the private subnet in the second Availability Zone
Type: String
Default: 10.192.21.0/24
SourceS3BucketNamePrefix:
Description:
Staging S3 bucket name prefix for the artifacts relevant to the solutions. (e.g., lambda zips, CloudFormation templates). The account
and region are added to the prefix <bucket-name-prefix>-<account-id>-<region>. Example = staging-123456789012-us-east-1.
Type: String
Conditions:
UseECR: !Equals [ !Ref 'Registry', 'ecr' ]
Resources:
# EventBridge Resources to Invoke Lambda
EKSEventBus:
Type: AWS::Events::EventBus
Properties:
Name: !Ref EventBusName
Policy: !Sub |
{
"Version": "2012-10-17",
"Statement": [{
"Sid": "AllowAllAccountsFromOrganizationToPutEvents",
"Effect": "Allow",
"Principal": "*",
"Action": "events:PutEvents",
"Resource": "arn:aws:events:${AWS::Region}:${AWS::AccountId}:event-bus/${EventBusName}",
"Condition": {
"StringEquals": {
"aws:PrincipalOrgID": "${OrganizationId}"
}
}
}]
}
EKSRule:
Type: AWS::Events::Rule
Properties:
Description: "EventRule"
EventBusName: !GetAtt EKSEventBus.Arn
EventPattern:
source:
- "aws.eks"
detail-type:
- "AWS API Call via CloudTrail"
detail:
eventSource:
- "eks.amazonaws.com"
eventName:
- "CreateCluster"
- "CreateFargateProfile"
State: "ENABLED"
Name: crowdstrike-eks-rule
Targets:
- Arn: !GetAtt EKSLambda.Arn
Id: "CrowdStrikeEKSFunction"
# Lambda Function to process event, check for EKS API Access and StartBuild
EKSLambda:
Type: AWS::Lambda::Function
Metadata:
cfn_nag:
rules_to_suppress:
- id: W89
reason: Lambda custom resource only run during stack lifecycle events.
- id: W92
reason: Lambda custom resource only run during stack lifecycle events.
checkov:
skip:
- id: CKV_AWS_115
comment: Lambda does not need reserved concurrent executions.
- id: CKV_AWS_116
comment: DLQ not needed, as Lambda function only triggered by CloudFormation events.
- id: CKV_AWS_117
comment: Lambda does not need to communicate with VPC resources.
- id: CKV_AWS_173
comment: Environment variables are not sensitive.
Properties:
Environment:
Variables:
project_name: !Ref CodeBuildProjectName
artifact_bucket: !Ref StagingS3Bucket
lambda_switch_role: !Ref EKSExecutionRoleName
Handler: lambda.lambda_handler
MemorySize: 128
Role: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${EKSExecutionRoleName}
Runtime: python3.11
Timeout: 300
FunctionName: crowdstrike-abi-eks-events-function
Code:
S3Bucket: !Ref StagingS3Bucket
S3Key: !Sub ${SourceS3BucketNamePrefix}/lambda_functions/packages/eks-new-clusters/lambda.zip
EKSInvokeLambdaPermission:
Type: AWS::Lambda::Permission
Properties:
FunctionName: !Ref EKSLambda
Action: "lambda:InvokeFunction"
Principal: "events.amazonaws.com"
SourceArn: !GetAtt EKSRule.Arn
ExistingEKSLambda:
Type: AWS::Lambda::Function
Metadata:
cfn_nag:
rules_to_suppress:
- id: W89
reason: Lambda custom resource only run during stack lifecycle events.
- id: W92
reason: Lambda custom resource only run during stack lifecycle events.
checkov:
skip:
- id: CKV_AWS_115
comment: Lambda does not need reserved concurrent executions.
- id: CKV_AWS_116
comment: DLQ not needed, as Lambda function only triggered by CloudFormation events.
- id: CKV_AWS_117
comment: Lambda does not need to communicate with VPC resources.
- id: CKV_AWS_173
comment: Environment variables are not sensitive.
Properties:
Environment:
Variables:
project_name: !Ref CodeBuildProjectName
artifact_bucket: !Ref StagingS3Bucket
lambda_switch_role: !Ref EKSExecutionRoleName
Handler: lambda.lambda_handler
MemorySize: 128
Role: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${EKSExecutionRoleName}
Runtime: python3.11
Timeout: 300
FunctionName: crowdstrike-abi-eks-init-function
Code:
S3Bucket: !Ref StagingS3Bucket
S3Key: !Sub ${SourceS3BucketNamePrefix}/lambda_functions/packages/eks-existing-clusters/lambda.zip
# Trigger Lambda Function
TriggerExistingEKSLambda:
Type: 'Custom::TriggerLambda'
DependsOn:
- SMFalconAPIKey
Properties:
ServiceToken: !GetAtt
- ExistingEKSLambda
- Arn
# CodeBuild Project to deploy Falcon Operator and Sensor
EKSCodeBuild:
Type: AWS::CodeBuild::Project
Properties:
Description: "Triggered by CrowdStrike EKS Lambda to provision Falcon Operator and Sensor"
Environment:
ComputeType: BUILD_GENERAL1_SMALL
EnvironmentVariables:
- Name: FALCON_CLIENT_ID
Value: !Sub
- '${arn}:client_id'
- { arn: !Ref SMFalconAPIKey }
Type: SECRETS_MANAGER
- Name: FALCON_CLIENT_SECRET
Value: !Sub
- '${arn}:client_secret'
- { arn: !Ref SMFalconAPIKey }
Type: SECRETS_MANAGER
- Name: CS_CLOUD
Value: !Sub
- '${arn}:cs_cloud'
- { arn: !Ref SMFalconAPIKey }
Type: SECRETS_MANAGER
- Name: DOCKER_API_TOKEN
Value: !Sub
- '${arn}:docker_api_token'
- { arn: !Ref SMFalconAPIKey }
Type: SECRETS_MANAGER
- Name: PRINCIPAL_ARN
Type: PLAINTEXT
Value: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${CodeBuildRoleName}
- Name: S3_BUCKET
Type: PLAINTEXT
Value: !Ref StagingS3Bucket
- Name: USERNAME
Type: PLAINTEXT
Value: !Ref KubernetesUserName
- Name: CLUSTER
Type: PLAINTEXT
Value: lambda
- Name: CLUSTER_ARN
Type: PLAINTEXT
Value: lambda
- Name: NODE_TYPE
Type: PLAINTEXT
Value: lambda
- Name: CID
Type: PLAINTEXT
Value: !Ref FalconCID
- Name: ENABLE_KAC
Type: PLAINTEXT
Value: !Ref EnableKAC
- Name: REGISTRY
Type: PLAINTEXT
Value: !Ref Registry
- Name: CROWDSTRIKE_CLOUD
Type: PLAINTEXT
Value: !Ref CrowdStrikeCloud
- Name: BACKEND
Type: PLAINTEXT
Value: !Ref Backend
- Name: IMAGE_REGION
Type: PLAINTEXT
Value: !If [ UseECR, !Ref AWS::Region, 'CrowdStrike' ]
- Name: NODE_SENSOR_REPO
Type: PLAINTEXT
Value: !If [ UseECR, !Ref NodeSensorRepo, 'CrowdStrike' ]
- Name: NODE_SENSOR_URI
Type: PLAINTEXT
Value: !If [ UseECR, !GetAtt NodeSensorRepo.RepositoryUri, 'CrowdStrike' ]
- Name: ACCOUNT_ID
Type: PLAINTEXT
Value: lambda
- Name: REGION
Type: PLAINTEXT
Value: lambda
- Name: SWITCH_ROLE
Type: PLAINTEXT
Value: !Ref EKSExecutionRoleName
- Name: NAT_IP
Type: PLAINTEXT
Value: !GetAtt NatGatewayEIP.PublicIp
Image: aws/codebuild/standard:7.0
PrivilegedMode: true
Type: LINUX_CONTAINER
VpcConfig:
SecurityGroupIds:
- !GetAtt NoIngressSecurityGroup.GroupId
Subnets:
- !GetAtt PrivateSubnet1.SubnetId
VpcId: !GetAtt PrivateSubnet1.VpcId
Artifacts:
Type: NO_ARTIFACTS
Name: !Ref CodeBuildProjectName
ServiceRole: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${CodeBuildRoleName}
Source:
Location: !Sub '${StagingS3Bucket}/${SourceS3BucketNamePrefix}/lambda_functions/packages/codebuild/lambda.zip'
Type: S3
TimeoutInMinutes: 90
Visibility: PRIVATE
# Secret
SMFalconAPIKey:
Type: AWS::SecretsManager::Secret
Metadata:
checkov:
skip:
- id: CKV_AWS_149
comment: The default key aws/secretsmanager is sufficient to secure this resource
Properties:
Name: crowdstrike-eks-secret
Description: 'Client ID and Secret for the Falcon API'
SecretString: !Sub |
{
"client_id": "${FalconClientId}",
"client_secret": "${FalconClientSecret}",
"cid": "${FalconCID}",
"cs_cloud":"${CrowdStrikeCloud}",
"docker_api_token":"${DockerAPIToken}"
}
# Create ECR Repositories for Falcon Images
NodeSensorRepo:
Type: AWS::ECR::Repository
Condition: UseECR
Properties:
ImageScanningConfiguration:
ScanOnPush: true
EmptyOnDelete: true
RepositoryName: crowdstrike/falcon-sensor
RepositoryPolicyText:
Version: "2012-10-17"
Statement:
-
Sid: AllowPushPull
Effect: Allow
Principal:
AWS:
- !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${CodeBuildRoleName}
Action:
- "ecr:GetDownloadUrlForLayer"
- "ecr:BatchGetImage"
- "ecr:BatchCheckLayerAvailability"
- "ecr:PutImage"
- "ecr:InitiateLayerUpload"
- "ecr:UploadLayerPart"
- "ecr:CompleteLayerUpload"
KPAgentRepo:
Type: AWS::ECR::Repository
Condition: UseECR
Properties:
ImageScanningConfiguration:
ScanOnPush: true
EmptyOnDelete: true
RepositoryName: crowdstrike/kpagent
RepositoryPolicyText:
Version: "2012-10-17"
Statement:
-
Sid: AllowPushPull
Effect: Allow
Principal:
AWS:
- !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${CodeBuildRoleName}
Action:
- "ecr:GetDownloadUrlForLayer"
- "ecr:BatchGetImage"
- "ecr:BatchCheckLayerAvailability"
- "ecr:PutImage"
- "ecr:InitiateLayerUpload"
- "ecr:UploadLayerPart"
- "ecr:CompleteLayerUpload"
# Network
VPC:
Type: AWS::EC2::VPC
Properties:
CidrBlock: !Ref VpcCIDR
EnableDnsSupport: true
EnableDnsHostnames: true
Tags:
- Key: Name
Value: !Ref EnvironmentName
InternetGateway:
Type: AWS::EC2::InternetGateway
Properties:
Tags:
- Key: Name
Value: !Ref EnvironmentName
InternetGatewayAttachment:
Type: AWS::EC2::VPCGatewayAttachment
Properties:
InternetGatewayId: !Ref InternetGateway
VpcId: !Ref VPC
PublicSubnet1:
Type: AWS::EC2::Subnet
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select [ 0, !GetAZs '' ]
CidrBlock: !Ref PublicSubnet1CIDR
MapPublicIpOnLaunch: false
Tags:
- Key: Name
Value: !Sub ${EnvironmentName} Public Subnet (AZ1)
PublicSubnet2:
Type: AWS::EC2::Subnet
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select [ 1, !GetAZs '' ]
CidrBlock: !Ref PublicSubnet2CIDR
MapPublicIpOnLaunch: false
Tags:
- Key: Name
Value: !Sub ${EnvironmentName} Public Subnet (AZ2)
PrivateSubnet1:
Type: AWS::EC2::Subnet
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select [ 0, !GetAZs '' ]
CidrBlock: !Ref PrivateSubnet1CIDR
MapPublicIpOnLaunch: false
Tags:
- Key: Name
Value: !Sub ${EnvironmentName} Private Subnet (AZ1)
PrivateSubnet2:
Type: AWS::EC2::Subnet
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select [ 1, !GetAZs '' ]
CidrBlock: !Ref PrivateSubnet2CIDR
MapPublicIpOnLaunch: false
Tags:
- Key: Name
Value: !Sub ${EnvironmentName} Private Subnet (AZ2)
NatGatewayEIP:
Type: AWS::EC2::EIP
DependsOn: InternetGatewayAttachment
Properties:
Domain: vpc
NatGateway:
Type: AWS::EC2::NatGateway
Properties:
AllocationId: !GetAtt NatGatewayEIP.AllocationId
SubnetId: !Ref PublicSubnet1
PublicRouteTable:
Type: AWS::EC2::RouteTable
Properties:
VpcId: !Ref VPC
Tags:
- Key: Name
Value: !Sub ${EnvironmentName} Public Routes
DefaultPublicRoute:
Type: AWS::EC2::Route
DependsOn: InternetGatewayAttachment
Properties:
RouteTableId: !Ref PublicRouteTable
DestinationCidrBlock: 0.0.0.0/0
GatewayId: !Ref InternetGateway
PublicSubnet1RouteTableAssociation:
Type: AWS::EC2::SubnetRouteTableAssociation
Properties:
RouteTableId: !Ref PublicRouteTable
SubnetId: !Ref PublicSubnet1
PublicSubnet2RouteTableAssociation:
Type: AWS::EC2::SubnetRouteTableAssociation
Properties:
RouteTableId: !Ref PublicRouteTable
SubnetId: !Ref PublicSubnet2
PrivateRouteTable:
Type: AWS::EC2::RouteTable
Properties:
VpcId: !Ref VPC
Tags:
- Key: Name
Value: !Sub ${EnvironmentName} Private Routes (AZ1)
DefaultPrivateRoute:
Type: AWS::EC2::Route
Properties:
RouteTableId: !Ref PrivateRouteTable
DestinationCidrBlock: 0.0.0.0/0
NatGatewayId: !Ref NatGateway
PrivateSubnet1RouteTableAssociation:
Type: AWS::EC2::SubnetRouteTableAssociation
Properties:
RouteTableId: !Ref PrivateRouteTable
SubnetId: !Ref PrivateSubnet1
PrivateSubnet2RouteTableAssociation:
Type: AWS::EC2::SubnetRouteTableAssociation
Properties:
RouteTableId: !Ref PrivateRouteTable
SubnetId: !Ref PrivateSubnet2
NoIngressSecurityGroup:
Type: AWS::EC2::SecurityGroup
Properties:
GroupDescription: "Security group with no ingress rule"
VpcId: !Ref VPC
SecurityGroupEgress:
- IpProtocol: -1
CidrIp: 0.0.0.0/0
Description: "Allow all egress"