Skip to content
This repository was archived by the owner on May 21, 2021. It is now read-only.

johnbarney/securitas-lambda

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Securitas

A basic set of Lambdas for AWS that covers User security. AWS Config can alert admins, but does not cover enforcement/encouragement. Built using the Serverless Framework

Assumptions:

This Lambda makes some assumptions about your setup.

  • You are using IAM Users
  • Your IAM Usernames are valid email addresses. (Others will be ignored completely)
  • You want to go with the standard best practice of 90 day expiration on API key pairs
  • You strongly want users to have MFA devices
  • You have set up a distribution group for your AWS Administrators
  • You have a verified the AWS Administrators distribution group within AWS SES

How to Install:

To install without cloning, you can install from this repo.

npm install -g serverless

sls install -u https://github.com/johnbarney/securitas-lambda

cd securitas-lambda

sls deploy --awsadmin (AWS Administrators distribution group)

What to Expect:

  • Users will be notified DAILY if they do not have a MFA Device associated with their account.
  • Users will be notified at 60, 85, and 89 days that their AWS key pair will expire.
  • Key pairs over 90 days old and ACTIVE will be automatically deleted and users will be informed that the key as been deleted.

Contributing

Standard fork/pull request contributions are welcome with the caveat that I may politely decline for any reason.

About

A basic set of Lambdas for AWS that cover user security.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages