New: Become a sponsor via GitHub Sponsors!
This template creates a Antivirus cluster for S3 buckets. You can connect as many buckets as you like by using S3 Event Notifications. The template has it's own repository: aws-s3-virusscan
The S3 VirusScan with additional integrations is available in the AWS Marketplace.
- Uses ClamAV to scan newly added files on S3 buckets
- Updates ClamAV database every 3 hours automatically
- Scales EC2 instance workers to distribute workload
- Publishes a message to SNS in case of a finding
- Can optionally delete compromised files automatically
- Logs to CloudWatch Logs
- CloudWatch Integration (Metrics and Dashboard)
- Security Hub Integration
- SSM OpsCenter Integration
The S3 VirusScan with additional integrations is available in the AWS Marketplace.
Visit the template's repository for installation instructions: aws-s3-virusscan
This template creates an account password policy for your IAM users. You can:
- set IAM user passwords to be valid for only the specified number of days.
- prevent IAM users from reusing a specified number of previous passwords.
- specify the minimum number of characters allowed in an IAM user password.
- require that IAM user passwords contain at least one lowercase character from the ISO basic Latin alphabet (a to z).
- require that IAM user passwords contain at least one uppercase character from the ISO basic Latin alphabet (A to Z).
- require that IAM user passwords contain at least one numeric character (0 to 9).
- require that IAM user passwords contain at least one nonalphanumeric character.
- permit all IAM users in your account to use the IAM console to change their own passwords.
- prevent IAM users from choosing a new password after their current password has expired.
Or just use the suggested defaults.
- Click Next to proceed with the next step of the wizard.
- Specify a name and all parameters for the stack.
- Click Next to proceed with the next step of the wizard.
- Click Next to skip the Options step of the wizard.
- Check the I acknowledge that this template might cause AWS CloudFormation to create IAM resources. checkbox.
- Click Create to start the creation of the stack.
- Wait until the stack reaches the state CREATE_COMPLETE
This template describes a highly available authentication proxy that forwards request to a upstream http(s) endpoint if the user is authenticated against your GitHub Organization.
- This template depends on one of our
vpc-*azs.yaml
templates. - Click Next to proceed with the next step of the wizard.
- Specify a name and all parameters for the stack.
- Click Next to proceed with the next step of the wizard.
- Click Next to skip the Options step of the wizard.
- Check the I acknowledge that this template might cause AWS CloudFormation to create IAM resources. checkbox.
- Click Create to start the creation of the stack.
- Wait until the stack reaches the state CREATE_COMPLETE
vpc/vpc-*azs.yaml
(required)vpc/vpc-*-bastion.yaml
(recommended)operations/alert.yaml
(recommended)
- By default, only one EC2 instance is managed by the ASG. In case of an outage the instance will be replaced within 5 minutes. You can change this in the ASG configuration!
This template enables CloudTrail to records AWS API calls across all regions in your AWS account. API calls are archived in S3 and also pushed CloudWatch Logs. If new API calls are available in S3 a SNS topic is notified.
- Click Next to proceed with the next step of the wizard.
- Specify a name and all parameters for the stack.
- Click Next to proceed with the next step of the wizard.
- Click Next to skip the Options step of the wizard.
- Check the I acknowledge that this template might cause AWS CloudFormation to create IAM resources. checkbox.
- Click Create to start the creation of the stack.
- Wait until the stack reaches the state CREATE_COMPLETE
If you want to use an external S3 bucket, the bucket needs to have the following S3 bucket policy:
{
"Version": "2012-10-17",
"Statement": [{
"Sid": "AWSCloudTrailAclCheck",
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "s3:GetBucketAcl",
"Resource": "arn:aws:s3:::$ExternalTrailBucket"
}, {
"Sid": "AWSCloudTrailWrite",
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "s3:PutObject",
"Resource": [
"arn:aws:s3:::$ExternalTrailBucket/AWSLogs/$AccountId[0]/*",
"arn:aws:s3:::$ExternalTrailBucket/AWSLogs/$AccountId[1]/*",
"arn:aws:s3:::$ExternalTrailBucket/AWSLogs/$AccountId[2]/*"
],
"Condition": {
"StringEquals": {
"s3:x-amz-acl": "bucket-owner-full-control"
}
}
}]
}
Replace $ExternalTrailBucket
with the name of your bucket, and add a row for every account you want to write from $AccountId[*]
.
This template enables AWS Config to deliver a AWS resource inventory to S3. Allowing you to keep track of infrastructure changes for compliance and debugging of your cloud infrastructure.
- Click Next to proceed with the next step of the wizard.
- Specify a name and all parameters for the stack.
- Click Next to proceed with the next step of the wizard.
- Click Next to skip the Options step of the wizard.
- Check the I acknowledge that this template might cause AWS CloudFormation to create IAM resources. checkbox.
- Click Create to start the creation of the stack.
- Wait until the stack reaches the state CREATE_COMPLETE
If you want to use an external S3 bucket, the bucket needs to have the following S3 bucket policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AWSConfigBucketPermissionsCheck",
"Effect": "Allow",
"Principal": {
"Service": [
"config.amazonaws.com"
]
},
"Action": "s3:GetBucketAcl",
"Resource": "arn:aws:s3:::$ExternalConfigBucket"
},
{
"Sid": " AWSConfigBucketDelivery",
"Effect": "Allow",
"Principal": {
"Service": [
"config.amazonaws.com"
]
},
"Action": "s3:PutObject",
"Resource": [
"arn:aws:s3:::$ExternalConfigBucket/AWSLogs/$AccountId[0]/Config/*",
"arn:aws:s3:::$ExternalConfigBucket/AWSLogs/$AccountId[0]/Config/*",
"arn:aws:s3:::$ExternalConfigBucket/AWSLogs/$AccountId[2]/Config/*"
],
"Condition": {
"StringEquals": {
"s3:x-amz-acl": "bucket-owner-full-control"
}
}
}
]
}
Replace $ExternalTrailBucket
with the name of your bucket, and add a row for every account you want to write from $AccountId[*]
.
This template provides a KMS customer managed CMK used by AWS services. Access control via IAM is also enabled. In case of a CMK deletion, a event is forwarded to the ParentAlertStack
(if specified).
ATTENTION: If you delete a stack based on this template, the KMS CMK is NOT deleted to prevent data loss! Mark the CMK for deletion if you really want to delete the CMK! All resources encrypted with the CMK (including RDS snapshots) are unusable after the deletion!
- Click Next to proceed with the next step of the wizard.
- Specify a name and all parameters for the stack.
- Click Next to proceed with the next step of the wizard.
- Click Next to skip the Options step of the wizard.
- Click Create to start the creation of the stack.
- Wait until the stack reaches the state CREATE_COMPLETE
If you have an existing KMS customer managed CMK you can wrap it into our required form using a legacy KMS customer managed CMK wrapper:
operations/alert.yaml
(recommended)