This project is about creating a serverless AWS pipeline where any object added to an S3 bucket is scanned with YARA rules + Sensitive information detector. If a match is found an alert will be fired, for fast incident response.
- Install dependencies:
- Install python3, pip3 and Terraform.
- Configure settings:
- Set your AWS credentials using any
method supported by Terraform.
The two simplest options are to run
aws configure
(saves~/.aws/credentials
file) or
export AWS_DEFAULT_REGION="region-name" export AWS_ACCESS_KEY_ID="access-key" export AWS_SECRET_ACCESS_KEY="secret-key"
- Set your AWS credentials using any
method supported by Terraform.
The two simplest options are to run
- Makefile guide:
- If you are initializing the tool for the first time, you should create the backend state using :
make backend
- You can deploy using :
make
- You can check the help menu using:
make help
- You can run build using :
make build
- You can generate the resources only, using :
make terraform
- You can destroy the resources using :
make destroy
- You can destroy the backend state (not recommended):
make backend-destory
- After creating the tool enviroment, you have to subscribed manually to your desired SNS Protocol, in the console.
- For testing purposes add the enviroment variable
.env
, which should containSQS_URL = "your url here"
-
We start by setting up our S3canner system to analyze various files that are collected and delivered to their S3 bucket. The files could be of different types such as executable binaries, email attachments, documents, and more.
-
As soon as any file is uploaded to the S3 bucket, it is automatically queued for analysis. A dispatching Lambda function runs every minute to group the files into batches and invoke multiple analyzers in parallel. Each analyzer scans its designated files using a pre-compiled list of YARA rules.
-
Any YARA matches found during analysis are stored in DynamoDB, and an alert is sent to an SNS topic. To dispatch these alerts, we can use emails or other supported SNS subscription methods.
-
For retroactive analysis, a batching Lambda function enqueues the entire S3 bucket for re-analysis.
-
In addition, a preconfigurable CloudWatch alarms are set up be to triggered if any component of the S3canner system behaves abnormally. These alarms will notify a different SNS topic than the one used for YARA match alerts, allowing for efficient management of any issues that arise.
This module consists of several resources, including an IAM policy document, an IAM execution role, an IAM policy attachment, a CloudWatch log group, a Lambda function, a Lambda alias, and two CloudWatch alarms.
- CloudWatch
- DynamoDB
- SQS
- SNS
- S3Buckets
- Lambda functions
For more details about the infrastructure you can check the readme in the terraform folder.
And for more info regarding the lambda functions check the readme in the lambda_functions folder.
Here are some potential future features and enhancements that could be added to the project:
- Central Yara bucket, where we should be updating (daily?) and pulling new CVE from public repos + custom rules.
- Creating report and send it via SNS instead of just a mssg.