Skip to content

Commit

Permalink
Merge branch 'master' into F/Azure-mysqlFlexibleServerPublicAccess
Browse files Browse the repository at this point in the history
  • Loading branch information
alphadev4 authored Jun 19, 2024
2 parents 684b1db + ad739e5 commit 18fce86
Show file tree
Hide file tree
Showing 43 changed files with 3,240 additions and 3 deletions.
20 changes: 20 additions & 0 deletions exports.js
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ module.exports = {
'customDomainTlsVersion' : require(__dirname + '/plugins/aws/apigateway/customDomainTlsVersion.js'),
'apigatewayDefaultEndpointDisabled' : require(__dirname + '/plugins/aws/apigateway/apigatewayDefaultEndpointDisabled.js'),
'apigatewayAuthorization' : require(__dirname + '/plugins/aws/apigateway/apigatewayAuthorization.js'),
'apigatewayRequestValidation' : require(__dirname + '/plugins/aws/apigateway/apigatewayRequestValidation.js'),

'restrictExternalTraffic' : require(__dirname + '/plugins/aws/appmesh/restrictExternalTraffic.js'),
'appmeshTLSRequired' : require(__dirname + '/plugins/aws/appmesh/appmeshTLSRequired.js'),
Expand Down Expand Up @@ -596,6 +597,7 @@ module.exports = {
's3ProtectionEnabled' : require(__dirname + '/plugins/aws/guardduty/s3ProtectionEnabled.js'),
'rdsProtectionEnabled' : require(__dirname + '/plugins/aws/guardduty/rdsProtectionEnabled.js'),
'exportedFindingsEncrypted' : require(__dirname + '/plugins/aws/guardduty/exportedFindingsEncrypted.js'),
'lambdaProtectionEnabled' : require(__dirname + '/plugins/aws/guardduty/lambdaProtectionEnabled.js'),

'workspacesVolumeEncryption' : require(__dirname + '/plugins/aws/workspaces/workspacesVolumeEncryption.js'),
'workSpacesHealthyInstances' : require(__dirname + '/plugins/aws/workspaces/workSpacesHealthyInstances.js'),
Expand All @@ -608,13 +610,16 @@ module.exports = {

'codebuildValidSourceProviders' : require(__dirname + '/plugins/aws/codebuild/codebuildValidSourceProviders.js'),
'projectArtifactsEncrypted' : require(__dirname + '/plugins/aws/codebuild/projectArtifactsEncrypted.js'),
'buildProjectEnvPriviligedMode' : require(__dirname + '/plugins/aws/codebuild/buildProjectEnvPriviligedMode.js'),
'codebuildProjectLoggingEnabled': require(__dirname + '/plugins/aws/codebuild/codebuildProjectLoggingEnabled.js'),

'codestarValidRepoProviders' : require(__dirname + '/plugins/aws/codestar/codestarValidRepoProviders.js'),
'codestarHasTags' : require(__dirname + '/plugins/aws/codestar/codestarHasTags.js'),

'pipelineArtifactsEncrypted' : require(__dirname + '/plugins/aws/codepipeline/pipelineArtifactsEncrypted.js'),

'dataStoreEncrypted' : require(__dirname + '/plugins/aws/healthlake/dataStoreEncrypted.js'),
'dataStoreHasTags' : require(__dirname + '/plugins/aws/healthlake/dataStoreHasTags.js'),

'codeartifactDomainEncrypted' : require(__dirname + '/plugins/aws/codeartifact/codeartifactDomainEncrypted.js'),

Expand All @@ -635,6 +640,7 @@ module.exports = {
'docDbHasTags' : require(__dirname + '/plugins/aws/documentDB/docDbHasTags.js'),
'docdbDeletionProtectionEnabled': require(__dirname + '/plugins/aws/documentDB/docdbDeletionProtectionEnabled.js'),
'docdbClusterBackupRetention' : require(__dirname + '/plugins/aws/documentDB/docdbClusterBackupRetention.js'),
'docdbClusterProfilerEnabled' : require(__dirname + '/plugins/aws/documentDB/docdbClusterProfilerEnabled.js'),

'instanceMediaStreamsEncrypted' : require(__dirname + '/plugins/aws/connect/instanceMediaStreamsEncrypted.js'),
'instanceTranscriptsEncrypted' : require(__dirname + '/plugins/aws/connect/instanceTranscriptsEncrypted.js'),
Expand Down Expand Up @@ -854,8 +860,11 @@ module.exports = {

'enforceMySQLSSLConnection' : require(__dirname + '/plugins/azure/mysqlserver/enforceMySQLSSLConnection.js'),
'mysqlFlexibleServersMinTls' : require(__dirname + '/plugins/azure/mysqlserver/mysqlFlexibleServersMinTls.js'),
'mysqlFlexibleServerVersion' : require(__dirname + '/plugins/azure/mysqlserver/mysqlFlexibleServerVersion.js'),
'mysqlServerHasTags' : require(__dirname + '/plugins/azure/mysqlserver/mysqlServerHasTags.js'),
'mysqlFlexibleServerPublicAccess': require(__dirname + '/plugins/azure/mysqlserver/mysqlFlexibleServerPublicAccess.js'),
'mysqlFlexibleServerDignosticLogs': require(__dirname + '/plugins/azure/mysqlserver/mysqlFlexibleServerDignosticLogs.js'),
'mysqlFlexibleServerIdentity' : require(__dirname + '/plugins/azure/mysqlserver/mysqlFlexibleServerIdentity.js'),

'logRetentionDays' : require(__dirname + '/plugins/azure/postgresqlserver/logRetentionDays.js'),
'connectionThrottlingEnabled' : require(__dirname + '/plugins/azure/postgresqlserver/connectionThrottlingEnabled.js'),
Expand Down Expand Up @@ -1110,6 +1119,7 @@ module.exports = {

'eventHubMinimumTLSversion' : require(__dirname + '/plugins/azure/eventhub/eventHubMinimumTLSversion.js'),
'eventHubNamespaceHasTags' : require(__dirname + '/plugins/azure/eventhub/eventHubNamespaceHasTags.js'),
'eventHubNamespaceAutoInflate' : require(__dirname + '/plugins/azure/eventhub/eventHubNamespaceAutoInflate.js'),
'eventHubLocalAuthDisabled' : require(__dirname + '/plugins/azure/eventhub/eventHubLocalAuthDisabled.js'),
'eventHubPublicAccess' : require(__dirname + '/plugins/azure/eventhub/eventHubPublicAccess.js'),
'eventHubNamespaceCmkEncrypted' : require(__dirname + '/plugins/azure/eventhub/eventHubNamespaceCmkEncrypted.js'),
Expand Down Expand Up @@ -1182,6 +1192,9 @@ module.exports = {

'batchAccountCmkEncrypted' : require(__dirname + '/plugins/azure/batchAccounts/batchAccountCmkEncrypted.js'),
'batchAccountDiagnosticLogs' : require(__dirname + '/plugins/azure/batchAccounts/batchAccountDiagnosticLogs.js'),
'batchAccountsAADEnabled' : require(__dirname + '/plugins/azure/batchAccounts/batchAccountsAADEnabled.js'),
'batchAccountsHasTags' : require(__dirname + '/plugins/azure/batchAccounts/batchAccountsHasTags.js'),
'batchAccountsPublicAccess' : require(__dirname + '/plugins/azure/batchAccounts/batchAccountsPublicAccess.js'),

'accountCMKEncrypted' : require(__dirname + '/plugins/azure/openai/accountCMKEncrypted.js'),
'accountManagedIdentity' : require(__dirname + '/plugins/azure/openai/accountManagedIdentity.js'),
Expand All @@ -1195,6 +1208,13 @@ module.exports = {
'workspaceManagedServicesCmk' : require(__dirname + '/plugins/azure/databricks/workspaceManagedServicesCmk.js'),
'workspaceManagedDiskCmk' : require(__dirname + '/plugins/azure/databricks/workspaceManagedDiskCmk.js'),
'workspaceHasTags' : require(__dirname + '/plugins/azure/databricks/workspaceHasTags.js'),

'workspaceManagedIdentity' : require(__dirname + '/plugins/azure/synapse/workspaceManagedIdentity.js'),
'synapseWorkspaceAdAuthEnabled' : require(__dirname + '/plugins/azure/synapse/synapseWorkspaceAdAuthEnabled.js'),
'synapseWorkspacPrivateEndpoint': require(__dirname + '/plugins/azure/synapse/synapseWorkspacPrivateEndpoint.js'),

'apiInstanceManagedIdentity' : require(__dirname + '/plugins/azure/apiManagement/apiInstanceManagedIdentity.js'),
'apiInstanceHasTags' : require(__dirname + '/plugins/azure/apiManagement/apiInstanceHasTags.js'),

},
github: {
Expand Down
6 changes: 6 additions & 0 deletions helpers/aws/api.js
Original file line number Diff line number Diff line change
Expand Up @@ -1842,6 +1842,12 @@ var postcalls = [
reliesOnCall: 'getRestApis',
filterKey: 'restApiId',
filterValue: 'id'
},
getRequestValidators: {
reliesOnService: 'apigateway',
reliesOnCall: 'getRestApis',
filterKey: 'restApiId',
filterValue: 'id'
}
},
AppConfig: {
Expand Down
6 changes: 6 additions & 0 deletions helpers/aws/api_multipart.js
Original file line number Diff line number Diff line change
Expand Up @@ -1199,6 +1199,12 @@ var postcalls = [
reliesOnCall: 'getRestApis',
filterKey: 'restApiId',
filterValue: 'id'
},
getRequestValidators: {
reliesOnService: 'apigateway',
reliesOnCall: 'getRestApis',
filterKey: 'restApiId',
filterValue: 'id'
}
},
AppConfig: {
Expand Down
17 changes: 16 additions & 1 deletion helpers/azure/api.js
Original file line number Diff line number Diff line change
Expand Up @@ -530,6 +530,11 @@ var calls = {
url: 'https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.Databricks/workspaces?api-version=2023-02-01'
}
},
apiManagementService: {
list: {
url: 'https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.ApiManagement/service?api-version=2022-08-01'
}
},
// For CIEM
aad: {
listRoleAssignments: {
Expand Down Expand Up @@ -564,6 +569,11 @@ var calls = {

}
},
synapse: {
listWorkspaces: {
url: 'https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.Synapse/workspaces?api-version=2021-06-01'
}
}

};

Expand Down Expand Up @@ -1261,7 +1271,12 @@ var tertiarycalls = {
reliesOnPath: 'batchAccounts.list',
properties: ['id'],
url: 'https://management.azure.com/{id}/providers/microsoft.insights/diagnosticSettings?api-version=2021-05-01-preview'
}
},
listByMysqlFlexibleServer: {
reliesOnPath: 'servers.listMysqlFlexibleServer',
properties: ['id'],
url: 'https://management.azure.com/{id}/providers/microsoft.insights/diagnosticSettings?api-version=2021-05-01-preview'
},
},
backupShortTermRetentionPolicies: {
listByDatabase: {
Expand Down
4 changes: 3 additions & 1 deletion helpers/azure/locations.js
Original file line number Diff line number Diff line change
Expand Up @@ -134,5 +134,7 @@ module.exports = {
databricks: locations,
containerApps: locations,
batchAccounts: locations,
machineLearning: locations
machineLearning: locations,
apiManagementService: locations,
synapse: locations
};
4 changes: 3 additions & 1 deletion helpers/azure/locations_gov.js
Original file line number Diff line number Diff line change
Expand Up @@ -84,5 +84,7 @@ module.exports = {
publicIpAddresses: locations,
computeGalleries: locations,
databricks: locations,
containerApps: locations
containerApps: locations,
apiManagementService: locations,
synapse: locations
};
3 changes: 3 additions & 0 deletions helpers/azure/resources.js
Original file line number Diff line number Diff line change
Expand Up @@ -306,5 +306,8 @@ module.exports = {
},
machineLearning: {
listWorkspaces: 'id'
},
apiManagementService: {
list: 'id'
}
};
72 changes: 72 additions & 0 deletions plugins/aws/apigateway/apigatewayRequestValidation.js
Original file line number Diff line number Diff line change
@@ -0,0 +1,72 @@
var async = require('async');
var helpers = require('../../../helpers/aws');

module.exports = {
title: 'API Gateway Request Validation',
category: 'API Gateway',
domain: 'Availability',
severity: 'Medium',
description: 'Ensures that Amazon API Gateway method has request validation enabled.',
more_info: 'Enabling request validation for API Gateway allows to perform basic validation of an API request before proceeding with the integration request and publishes the validation results in CloudWatch Logs. When request validation fails, API Gateway immediately fails the request reducing unnecessary calls to the backend.',
recommended_action: 'Modify API Gateway configuration and ensure that appropriate request validators are set for each API.',
link: 'https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-method-request-validation.html',
apis: ['APIGateway:getRestApis', 'APIGateway:getRequestValidators'],
realtime_triggers: ['apigateway:CreateRestApi','apigateway:DeleteRestApi','apigateway:ImportRestApi','apigateway:CreateRequestValidator','apigateway:UpdateRequestValidator','apigateway:DeleteRequestValidator'],

run: function(cache, settings, callback) {
var results = [];
var source = {};
var regions = helpers.regions(settings);
var awsOrGov = helpers.defaultPartition(settings);

async.each(regions.apigateway, function(region, rcb){
var getRestApis = helpers.addSource(cache, source,
['apigateway', 'getRestApis', region]);

if (!getRestApis) return rcb();

if (getRestApis.err || !getRestApis.data) {
helpers.addResult(results, 3,
`Unable to query for API Gateway Rest APIs: ${helpers.addError(getRestApis)}`, region);
return rcb();
}

if (!getRestApis.data.length) {
helpers.addResult(results, 0, 'No API Gateway Rest APIs found', region);
return rcb();
}

getRestApis.data.forEach(api => {
if (!api.id) return;

var apiArn = `arn:${awsOrGov}:apigateway:${region}::/restapis/${api.id}`;

var getRequestValidators = helpers.addSource(cache, source,
['apigateway', 'getRequestValidators', region, api.id]);

if (!getRequestValidators || getRequestValidators.err || !getRequestValidators.data || !getRequestValidators.data.items) {
helpers.addResult(results, 3,
`Unable to query for API Gateway Request Validators: ${helpers.addError(getRequestValidators)}`,
region, apiArn);
return;
}

if (!getRequestValidators.data.items.length) {
helpers.addResult(results, 2,
'No request validators found for API Gateway Rest API',
region, apiArn);
} else {
helpers.addResult(results, 0,
'Request validators found for API Gateway Rest API',
region, apiArn);
}
});

rcb();
}, function() {
callback(null, results, source);
});
}
};


Loading

0 comments on commit 18fce86

Please sign in to comment.