Skip to content

Commit

Permalink
First commit
Browse files Browse the repository at this point in the history
  • Loading branch information
Chris Gilmer committed Jul 23, 2019
0 parents commit f0bfebb
Show file tree
Hide file tree
Showing 9 changed files with 292 additions and 0 deletions.
23 changes: 23 additions & 0 deletions .circleci/config.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
version: 2
jobs:
validate:
docker:
- image: trussworks/circleci-docker-primary:a18ba9987556eec2e48354848a3c9fb4d5b69ac8
steps:
- checkout
- restore_cache:
keys:
- pre-commit-dot-cache-{{ checksum ".pre-commit-config.yaml" }}
- run:
name: Run pre-commit tests
command: pre-commit run --all-files
- save_cache:
key: pre-commit-dot-cache-{{ checksum ".pre-commit-config.yaml" }}
paths:
- ~/.cache/pre-commit

workflows:
version: 2
validate:
jobs:
- validate
4 changes: 4 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
.terraform
terraform.tfstate
*.tfstate*
terraform.tfvars
7 changes: 7 additions & 0 deletions .markdownlintrc
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
{
"default": true,
"first-header-h1": false,
"first-line-h1": false,
"line_length": false,
"no-multiple-blanks": false
}
24 changes: 24 additions & 0 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
repos:
- repo: git://github.com/pre-commit/pre-commit-hooks
rev: v2.2.3
hooks:
- id: check-json
- id: check-merge-conflict
- id: check-yaml
- id: detect-private-key
- id: pretty-format-json
args:
- --autofix
- id: trailing-whitespace

- repo: git://github.com/igorshubovych/markdownlint-cli
rev: v0.17.0
hooks:
- id: markdownlint

- repo: git://github.com/antonbabenko/pre-commit-terraform
rev: v1.12.0
hooks:
- id: terraform_docs
- id: terraform_fmt
- id: terraform_validate_no_variables
29 changes: 29 additions & 0 deletions LICENSE
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
BSD 3-Clause License

Copyright (c) 2019, TrussWorks, Inc.
All rights reserved.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:

* Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.

* Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.

* Neither the name of the copyright holder nor the names of its
contributors may be used to endorse or promote products derived from
this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 changes: 28 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
Configures IAM policy to enforce MFA when accessing the AWS API.

Creates the following resources:

* IAM policy requiring a valid MFA security token for all API calls except those needed for managing a user's own IAM user.
* IAM group policy attachment for defining which IAM groups to enforce MFA on.
* IAM user policy attachment for defining which IAM users to enforce MFA on.

## Usage

```hcl
module "aws_mfa" {
source = "trussworks/logs/mfa"
iam_groups = ["engineers"]
iam_users = ["joe"]
}
```

## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|:----:|:-----:|:-----:|
| iam\_groups | List of IAM groups to enforce MFA when accessing the AWS API. | list | `[]` | no |
| iam\_users | List of IAM users to enforce MFA when accessing the AWS API. | list | `[]` | no |

<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
165 changes: 165 additions & 0 deletions main.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,165 @@
/**
* Configures IAM policy to enforce MFA when accessing the AWS API.
*
* Creates the following resources:
*
* * IAM policy requiring a valid MFA security token for all API calls except those needed for managing a user's own IAM user.
* * IAM group policy attachment for defining which IAM groups to enforce MFA on.
* * IAM user policy attachment for defining which IAM users to enforce MFA on.
*
* ## Usage
*
* ```hcl
* module "aws_mfa" {
* source = "trussworks/logs/mfa"
*
* iam_groups = ["engineers"]
* iam_users = ["joe"]
* }
* ```
*/

data "aws_iam_policy_document" "main" {
statement {
sid = "AllowAllUsersToListAccounts"
effect = "Allow"

actions = [
"iam:ListAccountAliases",
"iam:ListUsers",
"iam:ListVirtualMFADevices",
"iam:GetAccountPasswordPolicy",
"iam:GetAccountSummary",
]

resources = [
"*",
]
}

statement {
sid = "AllowIndividualUserToSeeAndManageOnlyTheirOwnAccountInformation"
effect = "Allow"

actions = [
"iam:CreateAccessKey",
"iam:DeleteAccessKey",
"iam:DeleteLoginProfile",
"iam:GetLoginProfile",
"iam:ListAccessKeys",
"iam:UpdateAccessKey",
"iam:ListSigningCertificates",
"iam:DeleteSigningCertificate",
"iam:UpdateSigningCertificate",
"iam:UploadSigningCertificate",
]

resources = [
"arn:aws:iam::*:user/&{aws:username}",
]
}

statement {
sid = "AllowIndividualUserToListOnlyTheirOwnMFA"
effect = "Allow"

actions = [
"iam:ListMFADevices",
]

resources = [
"arn:aws:iam::*:mfa/*",
"arn:aws:iam::*:user/&{aws:username}",
]
}

statement {
sid = "AllowIndividualUserToManageTheirOwnMFA"
effect = "Allow"

actions = [
"iam:CreateVirtualMFADevice",
"iam:DeleteVirtualMFADevice",
"iam:EnableMFADevice",
"iam:ResyncMFADevice",
]

resources = [
"arn:aws:iam::*:mfa/&{aws:username}",
"arn:aws:iam::*:user/&{aws:username}",
]
}

statement {
sid = "AllowIndividualUserToDeactivateOnlyTheirOwnMFAOnlyWhenUsingMFA"
effect = "Allow"

actions = [
"iam:DeactivateMFADevice",
]

resources = [
"arn:aws:iam::*:mfa/&{aws:username}",
"arn:aws:iam::*:user/&{aws:username}",
]

condition {
test = "Bool"
variable = "aws:MultiFactorAuthPresent"
values = ["true"]
}
}

statement {
sid = "BlockMostAccessUnlessSignedInWithMFA"
effect = "Deny"

not_actions = [
"iam:ChangePassword",
"iam:CreateLoginProfile",
"iam:CreateVirtualMFADevice",
"iam:DeleteVirtualMFADevice",
"iam:ListVirtualMFADevices",
"iam:EnableMFADevice",
"iam:ResyncMFADevice",
"iam:ListAccountAliases",
"iam:ListUsers",
"iam:ListSSHPublicKeys",
"iam:ListAccessKeys",
"iam:ListServiceSpecificCredentials",
"iam:ListMFADevices",
"iam:GetAccountSummary",
"sts:GetSessionToken",
]

resources = [
"*",
]

condition {
test = "BoolIfExists"
variable = "aws:MultiFactorAuthPresent"
values = ["false"]
}
}
}

resource "aws_iam_policy" "main" {
#Use alphanumeric and '+=,.@-_' characters. Maximum 128 characters.
name = "enforce-mfa"
path = "/"
description = "Requires valid MFA security token for all API calls except those needed for managing a user's own IAM user."
policy = "${data.aws_iam_policy_document.main.json}"
}

resource "aws_iam_group_policy_attachment" "main" {
count = "${length(var.iam_groups)}"
group = "${element(var.iam_groups, count.index)}"
policy_arn = "${aws_iam_policy.main.arn}"
}

resource "aws_iam_user_policy_attachment" "main" {
count = "${length(var.iam_users)}"
user = "${element(var.iam_users, count.index)}"
policy_arn = "${aws_iam_policy.main.arn}"
}
1 change: 1 addition & 0 deletions outputs.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@

11 changes: 11 additions & 0 deletions variables.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
variable "iam_groups" {
description = "List of IAM groups to enforce MFA when accessing the AWS API."
type = "list"
default = []
}

variable "iam_users" {
description = "List of IAM users to enforce MFA when accessing the AWS API."
type = "list"
default = []
}

0 comments on commit f0bfebb

Please sign in to comment.