-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use AWS Systems Manager Inventory with Resource Data Sync. #8360
Comments
Whilst working on #8517 to create a resource data sync in the mod platform bootstrap - I've noticed that our accounts already seem to have an inventory collection and resource data sync set up which is sending data to a bucket in the UPDATE: But there is also a resource data sync being set up on a conditional basis for some of our accounts, I think related to gathering oracle licensing data. This is being fed into a central bucket in modernisation-platform/terraform/environments/bootstrap/member-bootstrap/ssm.tf Lines 119 to 129 in eeef063
and.. I wonder if I should merge this into what I've been looking at as part of the ticket. |
After a chat today we decided the s3 bucket ought to live in the |
When rolling out the resource data sync via the bootstrap I've encountered an error 131 accounts have already got 5 resource data syncs which is an account limit. I'll look into if this limit can be raised or what the best next steps are. |
Moving this to blocked as i'm unable to deploy resource data sync to all Mod Platform accounts due to account limits being reached for at least 50% of accounts. To resolve this some more work/investigation needs to go into discovering where the existing resource data syncs originate from and whether they are still in use. The data syncs seem to have been created by the AWS license Manager service, they possibly originated form CloudFormation stacks that have been deployed both in the root and org-security accounts. I've raised a case with AWS support to see if they can provide any more insights. |
Issue #8624 has ben raised to investigate this further. I suggest we park this ticket until that work has been carried out. |
User Story
As a Mod Platform Engineer
I want to have a singular place where information is stored on each account and what is running in them
So that security can look at anything outdated if required and more.
To start we will run this monthly but with an option to run on an adhoc basis.
Value / Purpose
POC discussed, and agreed that we should begin to roll this out to all accounts
#7725
Context / Background
As a product manager I want to be able to understand what we have running on the platform and where there are vulnerabilities - for example when a component is no longer in support or if there is a security incident related to that component. We can then advise application teams of potential issues.
I also need a way to be able to provide security teams with the relevant information allowing them to contact application teams directly.
This ticket is to look to see if we can use AWS Systems Manager Inventory with Resource Data Sync as a tool to satisfy this requirement. The theory is we can gather information about software installed on all instances that have SSM agent installed/activated. We can then use Resource Data Sync to gather all inventory information for multiple accounts/regions into a central s3 bucket that can then be queried by Athena or any other visualisation tool -see https://docs.aws.amazon.com/systems-manager/latest/userguide/inventory-create-resource-data-sync.html
This way we can query what software and packages are deployed across the platform and help to identify the impact of any security vulnerabilities
Useful Contacts
Edd Proctor
Additional Information
We should make this optional but included by default
Definition of Done
organisation-security
account.What types of logs etc that are copied are not in this ticket, just setting up what is required.
The text was updated successfully, but these errors were encountered: