1616
1717CIS_mappings = {
1818 "3.1" : {
19- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_1 " ,
20- "filter_pattern" : '{$.errorCode = "AccessDenied" || $.errorCode = "UnauthorizedOperation" }' ,
21- "metric_name" : "SHARR_CIS_1_2_Finding_3_1_UnauthorizedAPICalls " ,
19+ "filter_name" : "UnauthorizedAPICalls " ,
20+ "filter_pattern" : '{( $.errorCode="*UnauthorizedOperation") || ( $.errorCode="AccessDenied*") }' ,
21+ "metric_name" : "UnauthorizedAPICalls " ,
2222 "metric_value" : 1 ,
23- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_1_UnauthorizedAPICalls " ,
24- "alarm_desc" : "Alarm for CIS finding 3.1-UnauthorizedAPICalls " ,
23+ "alarm_name" : "UnauthorizedAPICalls " ,
24+ "alarm_desc" : "Alarm for UnauthorizedAPICalls > 0 " ,
2525 "alarm_threshold" : 1
2626 },
2727 "3.2" : {
28- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_2_ConsoleSigninWithoutMFA " ,
28+ "filter_name" : "ConsoleSigninWithoutMFA " ,
2929 "filter_pattern" : '{($.eventName="ConsoleLogin") && ($.additionalEventData.MFAUsed !="Yes")}' ,
30- "metric_name" : "SHARR_CIS_1_2_Finding_3_2_ConsoleSigninWithoutMFA " ,
30+ "metric_name" : "ConsoleSigninWithoutMFA " ,
3131 "metric_value" : 1 ,
32- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_2_ConsoleSigninWithoutMFA " ,
33- "alarm_desc" : "Alarm for CIS finding 3.2 ConsoleSigninWithoutMFA " ,
32+ "alarm_name" : "ConsoleSigninWithoutMFA " ,
33+ "alarm_desc" : "Alarm for ConsoleSigninWithoutMFA > 0 " ,
3434 "alarm_threshold" : 1
3535 },
3636 "3.3" : {
37- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_3_RootAccountUsage " ,
37+ "filter_name" : "RootAccountUsage " ,
3838 "filter_pattern" : '{$.userIdentity.type="Root" && $.userIdentity.invokedBy NOT EXISTS && $.eventType !="AwsServiceEvent"}' ,
39- "metric_name" : "SHARR_CIS_1_2_Finding_3_3_RootAccountUsage " ,
39+ "metric_name" : "RootAccountUsage " ,
4040 "metric_value" : 1 ,
41- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_3_RootAccountUsage " ,
42- "alarm_desc" : "Alarm for CIS finding 3.3 RootAccountUsage " ,
41+ "alarm_name" : "RootAccountUsage " ,
42+ "alarm_desc" : "Alarm for RootAccountUsage > 0 " ,
4343 "alarm_threshold" : 1
44-
4544 },
4645 "3.4" : {
47- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_4_IAMPolicyChanges " ,
46+ "filter_name" : "IAMPolicyChanges " ,
4847 "filter_pattern" : '{($.eventName=DeleteGroupPolicy) || ($.eventName=DeleteRolePolicy) || ($.eventName=DeleteUserPolicy) || ($.eventName=PutGroupPolicy) || ($.eventName=PutRolePolicy) || ($.eventName=PutUserPolicy) || ($.eventName=CreatePolicy) || ($.eventName=DeletePolicy) || ($.eventName=CreatePolicyVersion) || ($.eventName=DeletePolicyVersion) || ($.eventName=AttachRolePolicy) || ($.eventName=DetachRolePolicy) || ($.eventName=AttachUserPolicy) || ($.eventName=DetachUserPolicy) || ($.eventName=AttachGroupPolicy) || ($.eventName=DetachGroupPolicy)}' ,
49- "metric_name" : "SHARR_CIS_1_2_Finding_3_4_IAMPolicyChanges " ,
48+ "metric_name" : "IAMPolicyChanges " ,
5049 "metric_value" : 1 ,
51- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_4_IAMPolicyChanges " ,
52- "alarm_desc" : "Alarm for CIS finding 3.4 IAMPolicyChanges " ,
50+ "alarm_name" : "IAMPolicyChanges " ,
51+ "alarm_desc" : "Alarm for IAMPolicyChanges > 0 " ,
5352 "alarm_threshold" : 1
5453 },
5554 "3.5" : {
56- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_5_CloudTrailChanges " ,
55+ "filter_name" : "CloudTrailChanges " ,
5756 "filter_pattern" : '{($.eventName=CreateTrail) || ($.eventName=UpdateTrail) || ($.eventName=DeleteTrail) || ($.eventName=StartLogging) || ($.eventName=StopLogging)}' ,
58- "metric_name" : "SHARR_CIS_1_2_Finding_3_5_CloudTrailChanges " ,
57+ "metric_name" : "CloudTrailChanges " ,
5958 "metric_value" : 1 ,
60- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_5_CloudTrailChanges " ,
61- "alarm_desc" : "Alarm for CIS finding 3.5 CloudTrailChanges " ,
59+ "alarm_name" : "CloudTrailChanges " ,
60+ "alarm_desc" : "Alarm for CloudTrailChanges > 0 " ,
6261 "alarm_threshold" : 1
6362 },
6463 "3.6" : {
65- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_6_ConsoleAuthenticationFailure " ,
64+ "filter_name" : "ConsoleAuthenticationFailure " ,
6665 "filter_pattern" : '{($.eventName=ConsoleLogin) && ($.errorMessage="Failed authentication")}' ,
67- "metric_name" : "SHARR_CIS_1_2_Finding_3_6_ConsoleAuthenticationFailure " ,
66+ "metric_name" : "ConsoleAuthenticationFailure " ,
6867 "metric_value" : 1 ,
69- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_6_ConsoleAuthenticationFailure " ,
70- "alarm_desc" : "Alarm for CIS finding 3.6 ConsoleAuthenticationFailure " ,
68+ "alarm_name" : "ConsoleAuthenticationFailure " ,
69+ "alarm_desc" : "Alarm for ConsoleAuthenticationFailure > 0 " ,
7170 "alarm_threshold" : 1
7271 },
7372 "3.7" : {
74- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_7_DisableOrDeleteCMK " ,
73+ "filter_name" : "DisableOrDeleteCMK " ,
7574 "filter_pattern" : '{($.eventSource=kms.amazonaws.com) && (($.eventName=DisableKey) || ($.eventName=ScheduleKeyDeletion))}' ,
76- "metric_name" : "SHARR_CIS_1_2_Finding_3_7_DisableOrDeleteCMK " ,
75+ "metric_name" : "DisableOrDeleteCMK " ,
7776 "metric_value" : 1 ,
78- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_7_DisableOrDeleteCMK " ,
79- "alarm_desc" : "Alarm for CIS finding 3.7 DisableOrDeleteCMK " ,
77+ "alarm_name" : "DisableOrDeleteCMK " ,
78+ "alarm_desc" : "Alarm for DisableOrDeleteCMK > 0 " ,
8079 "alarm_threshold" : 1
8180 },
8281 "3.8" : {
83- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_8_S3BucketPolicyChanges " ,
82+ "filter_name" : "S3BucketPolicyChanges " ,
8483 "filter_pattern" : '{($.eventSource=s3.amazonaws.com) && (($.eventName=PutBucketAcl) || ($.eventName=PutBucketPolicy) || ($.eventName=PutBucketCors) || ($.eventName=PutBucketLifecycle) || ($.eventName=PutBucketReplication) || ($.eventName=DeleteBucketPolicy) || ($.eventName=DeleteBucketCors) || ($.eventName=DeleteBucketLifecycle) || ($.eventName=DeleteBucketReplication))}' ,
85- "metric_name" : "SHARR_CIS_1_2_Finding_3_8_S3BucketPolicyChanges " ,
84+ "metric_name" : "S3BucketPolicyChanges " ,
8685 "metric_value" : 1 ,
87- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_8_S3BucketPolicyChanges " ,
88- "alarm_desc" : "Alarm for CIS finding 3.8 S3BucketPolicyChanges " ,
86+ "alarm_name" : "S3BucketPolicyChanges " ,
87+ "alarm_desc" : "Alarm for S3BucketPolicyChanges > 0 " ,
8988 "alarm_threshold" : 1
9089 },
9190 "3.9" : {
92- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_9_AWSConfigChanges " ,
91+ "filter_name" : "AWSConfigChanges " ,
9392 "filter_pattern" : '{($.eventSource=config.amazonaws.com) && (($.eventName=StopConfigurationRecorder) || ($.eventName=DeleteDeliveryChannel) || ($.eventName=PutDeliveryChannel) || ($.eventName=PutConfigurationRecorder))}' ,
94- "metric_name" : "SHARR_CIS_1_2_Finding_3_9_AWSConfigChanges " ,
93+ "metric_name" : "AWSConfigChanges " ,
9594 "metric_value" : 1 ,
96- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_9_AWSConfigChanges " ,
97- "alarm_desc" : "Alarm for CIS finding 3.9 AWSConfigChanges " ,
95+ "alarm_name" : "AWSConfigChanges " ,
96+ "alarm_desc" : "Alarm for AWSConfigChanges > 0 " ,
9897 "alarm_threshold" : 1
9998 },
10099 "3.10" : {
101- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_10_SecurityGroupChanges " ,
100+ "filter_name" : "SecurityGroupChanges " ,
102101 "filter_pattern" : '{($.eventName=AuthorizeSecurityGroupIngress) || ($.eventName=AuthorizeSecurityGroupEgress) || ($.eventName=RevokeSecurityGroupIngress) || ($.eventName=RevokeSecurityGroupEgress) || ($.eventName=CreateSecurityGroup) || ($.eventName=DeleteSecurityGroup)}' ,
103- "metric_name" : "SHARR_CIS_1_2_Finding_3_10_SecurityGroupChanges " ,
102+ "metric_name" : "SecurityGroupChanges " ,
104103 "metric_value" : 1 ,
105- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_10_SecurityGroupChanges " ,
106- "alarm_desc" : "Alarm for CIS finding 3.10 SecurityGroupChanges " ,
104+ "alarm_name" : "SecurityGroupChanges " ,
105+ "alarm_desc" : "Alarm for SecurityGroupChanges > 0 " ,
107106 "alarm_threshold" : 1
108107 },
109108 "3.11" : {
110- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_11_NetworkACLChanges " ,
109+ "filter_name" : "NetworkACLChanges " ,
111110 "filter_pattern" : '{($.eventName=CreateNetworkAcl) || ($.eventName=CreateNetworkAclEntry) || ($.eventName=DeleteNetworkAcl) || ($.eventName=DeleteNetworkAclEntry) || ($.eventName=ReplaceNetworkAclEntry) || ($.eventName=ReplaceNetworkAclAssociation)}' ,
112- "metric_name" : "SHARR_CIS_1_2_Finding_3_11_NetworkACLChanges " ,
111+ "metric_name" : "NetworkACLChanges " ,
113112 "metric_value" : 1 ,
114- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_11_NetworkACLChanges " ,
115- "alarm_desc" : "Alarm for CIS finding 3.11 NetworkACLChanges " ,
113+ "alarm_name" : "NetworkACLChanges " ,
114+ "alarm_desc" : "Alarm for NetworkACLChanges > 0 " ,
116115 "alarm_threshold" : 1
117116 },
118117 "3.12" : {
119- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_12_NetworkGatewayChanges " ,
118+ "filter_name" : "NetworkGatewayChanges " ,
120119 "filter_pattern" : '{($.eventName=CreateCustomerGateway) || ($.eventName=DeleteCustomerGateway) || ($.eventName=AttachInternetGateway) || ($.eventName=CreateInternetGateway) || ($.eventName=DeleteInternetGateway) || ($.eventName=DetachInternetGateway)}' ,
121- "metric_name" : "SHARR_CIS_1_2_Finding_3_12_NetworkGatewayChanges " ,
120+ "metric_name" : "NetworkGatewayChanges " ,
122121 "metric_value" : 1 ,
123- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_12_NetworkGatewayChanges " ,
124- "alarm_desc" : "Alarm for CIS finding 3.12 NetworkGatewayChanges " ,
122+ "alarm_name" : "NetworkGatewayChanges " ,
123+ "alarm_desc" : "Alarm for NetworkGatewayChanges > 0 " ,
125124 "alarm_threshold" : 1
126125 },
127126 "3.13" : {
128- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_13_RouteTableChanges " ,
127+ "filter_name" : "RouteTableChanges " ,
129128 "filter_pattern" : '{($.eventName=CreateRoute) || ($.eventName=CreateRouteTable) || ($.eventName=ReplaceRoute) || ($.eventName=ReplaceRouteTableAssociation) || ($.eventName=DeleteRouteTable) || ($.eventName=DeleteRoute) || ($.eventName=DisassociateRouteTable)}' ,
130- "metric_name" : "SHARR_CIS_1_2_Finding_3_13_RouteTableChanges " ,
129+ "metric_name" : "RouteTableChanges " ,
131130 "metric_value" : 1 ,
132- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_13_RouteTableChanges " ,
133- "alarm_desc" : "Alarm for CIS finding 3.13 RouteTableChanges " ,
131+ "alarm_name" : "RouteTableChanges " ,
132+ "alarm_desc" : "Alarm for RouteTableChanges > 0 " ,
134133 "alarm_threshold" : 1
135134 },
136135 "3.14" : {
137- "filter_name" : "SHARR_Filter_CIS_1_2_Finding_3_14_VPCChanges " ,
136+ "filter_name" : "VPCChanges " ,
138137 "filter_pattern" : '{($.eventName=CreateVpc) || ($.eventName=DeleteVpc) || ($.eventName=ModifyVpcAttribute) || ($.eventName=AcceptVpcPeeringConnection) || ($.eventName=CreateVpcPeeringConnection) || ($.eventName=DeleteVpcPeeringConnection) || ($.eventName=RejectVpcPeeringConnection) || ($.eventName=AttachClassicLinkVpc) || ($.eventName=DetachClassicLinkVpc) || ($.eventName=DisableVpcClassicLink) || ($.eventName=EnableVpcClassicLink)}' ,
139- "metric_name" : "SHARR_CIS_1_2_Finding_3_14_VPCChanges " ,
138+ "metric_name" : "VPCChanges " ,
140139 "metric_value" : 1 ,
141- "alarm_name" : "SHARR_Alarm_CIS_1_2_Finding_3_14_VPCChanges " ,
142- "alarm_desc" : "Alarm for CIS finding 3.14 VPCChanges " ,
140+ "alarm_name" : "VPCChanges " ,
141+ "alarm_desc" : "Alarm for VPCChanges > 0 " ,
143142 "alarm_threshold" : 1
144143 }
145144}
146145
147146
148147def verify (event , context ):
149148
150- return CIS_mappings .get (event ['ControlId' ], None )
149+ return CIS_mappings .get (event ['ControlId' ], None )
0 commit comments