Skip to content

Commit 31fbccc

Browse files
authored
Merge pull request #89 from Ontotext-AD/GDB-11618
Add restrictions on ec2:CreateTags, ec2:CreateVolume and ec2:AttachVolume. Add deploy_tag variable
2 parents 4b91b20 + 01f80a1 commit 31fbccc

File tree

9 files changed

+111
-10
lines changed

9 files changed

+111
-10
lines changed

CHANGELOG.md

+5-2
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@
88
* Removed the provisioning of Route53 Hosted zone when deploying a single node.
99
* Added ability to use custom principal for EBS Admin Role and Param Store Admin role via assume_role_principal_arn variable
1010
* Updated graphdb_instance_ssm policy in iam.tf - added restrictions on ssm:DescribeParameters to only allow usage on graphdb-related resources.
11-
* Updated graphdb_instance_ssm polict in iam.tf - restricted kms actions to Decrypt only
12-
* Changed owner of /etc/prometheus to cwagent:cwagent. Removed rw permissions for /etc/prometheus/prometheus.yaml for other an group users
11+
* Updated graphdb_instance_ssm policy in iam.tf - restricted kms actions to Decrypt only
12+
* Changed owner of /etc/prometheus to cwagent:cwagent. Removed rw permissions for /etc/prometheus/prometheus.yaml for other an group users
1313
* Removed access to aws cli for users other than root
1414
* Added a toggle for enabling/disabling the availability tests in CloudWatch
15+
* Added new variable, deployment_restriction_tag to be used for tagging resources as part of the deployment. This allows for stricter IAM policies on certain (dangerous) actions
16+
* Changed graphdb_instance_volume policy to restrict ec2:AttachVolume and ec2:CreateVolume for only specifically tagged volumes
17+
* Extended graphdb_instance_volume_tagging by adding an additional constraint on ec2:CreateTags to allow instances that are already tagged with deployment_restriction_tag to be tagged with a Name
1518

1619
## 1.3.3
1720

README.md

+1
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,7 @@ Before you begin using this Terraform module, ensure you meet the following prer
8989

9090
| Name | Description | Type | Default | Required |
9191
|------|-------------|------|---------|:--------:|
92+
| deployment\_restriction\_tag | Deployment tag used to restrict access via IAM policies | `string` | `"deploymentTag"` | no |
9293
| common\_tags | (Optional) Map of common tags for all taggable AWS resources. | `map(string)` | `{}` | no |
9394
| resource\_name\_prefix | Resource name prefix used for tagging and naming AWS resources | `string` | n/a | yes |
9495
| aws\_region | AWS region to deploy resources into | `string` | n/a | yes |

main.tf

+5-4
Original file line numberDiff line numberDiff line change
@@ -240,10 +240,11 @@ module "monitoring" {
240240
module "graphdb" {
241241
source = "./modules/graphdb"
242242

243-
resource_name_prefix = var.resource_name_prefix
244-
aws_region = data.aws_region.current.name
245-
aws_subscription_id = data.aws_caller_identity.current.account_id
246-
assume_role_principal_arn = var.assume_role_principal_arn
243+
resource_name_prefix = var.resource_name_prefix
244+
deployment_restriction_tag = var.deployment_restriction_tag
245+
aws_region = data.aws_region.current.name
246+
aws_subscription_id = data.aws_caller_identity.current.account_id
247+
assume_role_principal_arn = var.assume_role_principal_arn
247248

248249
# Networking
249250

modules/graphdb/iam.tf

+80-3
Original file line numberDiff line numberDiff line change
@@ -107,12 +107,10 @@ data "aws_iam_policy_document" "graphdb_describe_resources" {
107107
data "aws_iam_policy_document" "graphdb_instance_volume" {
108108
statement {
109109
effect = "Allow"
110+
110111
actions = [
111-
"ec2:CreateVolume",
112-
"ec2:AttachVolume",
113112
"ec2:DescribeVolumes",
114113
"ec2:MonitorInstances",
115-
"ec2:CreateTags",
116114
"kms:Encrypt",
117115
"kms:Decrypt",
118116
"kms:GenerateDataKey",
@@ -131,12 +129,63 @@ data "aws_iam_policy_document" "graphdb_instance_volume" {
131129
"kms:EnableKey",
132130
"kms:DisableKey"
133131
]
132+
134133
resources = [
135134
"arn:aws:ec2:${var.aws_region}:${data.aws_caller_identity.current.account_id}:volume/*",
136135
"arn:aws:ec2:${var.aws_region}:${data.aws_caller_identity.current.account_id}:instance/*",
137136
"arn:aws:ec2:${var.aws_region}:${data.aws_caller_identity.current.account_id}:network-interface/*",
138137
"arn:aws:kms:${var.aws_region}:${data.aws_caller_identity.current.account_id}:key/*"
139138
]
139+
140+
}
141+
statement {
142+
effect = "Allow"
143+
144+
actions = [
145+
"ec2:CreateVolume"
146+
]
147+
148+
resources = [
149+
"arn:aws:ec2:${var.aws_region}:${data.aws_caller_identity.current.account_id}:volume/*"
150+
]
151+
152+
condition {
153+
test = "StringEquals"
154+
values = [var.deployment_restriction_tag]
155+
variable = "aws:RequestTag/DeployTag"
156+
}
157+
158+
condition {
159+
test = "StringEquals"
160+
values = ["${var.resource_name_prefix}-graphdb-data"]
161+
variable = "aws:RequestTag/Name"
162+
}
163+
164+
condition {
165+
test = "ForAllValues:StringEquals"
166+
values = ["Name", "DeployTag"]
167+
variable = "aws:TagKeys"
168+
}
169+
170+
}
171+
172+
statement {
173+
effect = "Allow"
174+
175+
actions = [
176+
"ec2:AttachVolume",
177+
]
178+
179+
resources = [
180+
"arn:aws:ec2:${var.aws_region}:${data.aws_caller_identity.current.account_id}:volume/*",
181+
"arn:aws:ec2:${var.aws_region}:${data.aws_caller_identity.current.account_id}:instance/*"
182+
]
183+
184+
condition {
185+
test = "StringEquals"
186+
values = [var.deployment_restriction_tag]
187+
variable = "aws:ResourceTag/DeployTag"
188+
}
140189
}
141190
}
142191

@@ -162,6 +211,34 @@ data "aws_iam_policy_document" "graphdb_instance_volume_tagging" {
162211
]
163212
}
164213
}
214+
215+
statement {
216+
effect = "Allow"
217+
218+
actions = [
219+
"ec2:CreateTags"
220+
]
221+
222+
resources = [
223+
"arn:aws:ec2:${var.aws_region}:${data.aws_caller_identity.current.account_id}:instance/*"
224+
]
225+
226+
condition {
227+
test = "StringEquals"
228+
variable = "aws:ResourceTag/DeployTag"
229+
values = [
230+
var.deployment_restriction_tag
231+
]
232+
}
233+
234+
condition {
235+
test = "StringLike"
236+
variable = "aws:RequestTag/Name"
237+
values = [
238+
"${var.resource_name_prefix}:*"
239+
]
240+
}
241+
}
165242
}
166243
resource "aws_iam_role_policy" "graphdb_route53_instance_registration" {
167244
count = var.graphdb_node_count > 1 ? 1 : 0

modules/graphdb/main.tf

+6
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,12 @@ resource "aws_autoscaling_group" "graphdb_auto_scaling_group" {
115115
}
116116
}
117117

118+
tag {
119+
key = "DeployTag"
120+
value = var.deployment_restriction_tag
121+
propagate_at_launch = true
122+
}
123+
118124
dynamic "tag" {
119125
for_each = data.aws_default_tags.current.tags
120126
content {

modules/graphdb/templates/02_disk_management.sh.tpl

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ create_volume() {
3737
--size "${ebs_volume_size}" \
3838
--iops "${ebs_volume_iops}" \
3939
--throughput "${ebs_volume_throughput}" \
40-
--tag-specifications "ResourceType=volume,Tags=[{Key=Name,Value=${name}-graphdb-data}]" \
40+
--tag-specifications "ResourceType=volume,Tags=[{Key=Name,Value=${name}-graphdb-data},{Key=DeployTag,Value=${deployment_tag}}]" \
4141
--query "VolumeId" --output text)
4242
AVAILABLE_VOLUMES+=("$VOLUME_ID")
4343

modules/graphdb/user_data.tf

+1
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ data "cloudinit_config" "graphdb_user_data" {
4242
ebs_volume_size : var.ebs_volume_size
4343
ebs_volume_iops : var.ebs_volume_iops
4444
ebs_volume_throughput : var.ebs_volume_throughput
45+
deployment_tag : var.deployment_restriction_tag
4546
device_name : var.device_name
4647
ebs_kms_key_arn : var.ebs_key_arn
4748
})

modules/graphdb/variables.tf

+5
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# Common parameters
2+
variable "deployment_restriction_tag" {
3+
description = "Deployment tag used to restrict access via IAM policies"
4+
type = string
5+
default = "deploymentTag"
6+
}
27

38
variable "resource_name_prefix" {
49
description = "Resource name prefix used for tagging and naming AWS resources."

variables.tf

+7
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
# Common configurations
22

3+
4+
variable "deployment_restriction_tag" {
5+
description = "Deployment tag used to restrict access via IAM policies"
6+
type = string
7+
default = "deploymentTag"
8+
}
9+
310
variable "common_tags" {
411
description = "(Optional) Map of common tags for all taggable AWS resources."
512
type = map(string)

0 commit comments

Comments
 (0)