Tflint rules for CIS AWS Foundations Benchmark compliance checks. These rules work in addition to the recommendations from Gruntwork's CIS Service Catalog.
⚠️ This repository is a WIP. It only contains one single rule so far, to validate Security Groups, that is hard to enforce in any other way (see Rules section). In the future, we may add other CIS AWS Foundations Benchmark rules.
- TFLint v0.40+
- Go v1.19
You can install the plugin with tflint --init
. Declare a config in .tflint.hcl
as follows:
plugin "aws-cis" {
enabled = true
version = "<VERSION>"
source = "github.com/gruntwork-io/tflint-ruleset-aws-cis"
}
Name | Description | Severity | Enabled | CIS Recommendation |
---|---|---|---|---|
aws_security_group_rule_invalid_cidr_block | Ensure that SG rules do not allow public access to remote administration ports | ERROR | ✔ | 5.2 and 5.3 |
An effective way to enforce these rules is to add them to your Terragrunt configuration using Before Hooks.
terraform {
before_hook "before_hook" {
commands = ["apply", "plan"]
execute = ["tflint"]
}
}
In the root of the Terragrunt project, add a .tflint.hcl
file, replacing <VERSION>
below with the latest version from the releases page:
plugin "aws" {
enabled = true
version = "<VERSION>"
source = "github.com/gruntwork-io/tflint-ruleset-aws-cis"
}
Clone the repository locally and run the following command:
$ make
You can easily install the built plugin with the following:
$ make install
You can run the built plugin like the following:
$ cat << EOS > .tflint.hcl
plugin "aws-cis" {
enabled = true
}
EOS
$ tflint
NOTE: This project doesn't have automated releases at the moment (due to limitations of our GitHub org with GitHub actions) and does not sign the binaries (as tflint
doesn't currently check signatures for plugins). See this Slack thread for more info.
In order to release the binaries, this project uses goreleaser (install instructions).
Export the variable GITHUB_TOKEN
so the binaries can be uploaded to GitHub. The release should run locally from the tag that will have the release.
git checkout <TAG FOR THE RELEASE, e.g. v0.40.0>
export GITHUB_TOKEN=<TOKEN>
goreleaser release