Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Verify that all services used are support in selected set of compliance programs #2565

Open
2 tasks
phene opened this issue Jan 23, 2023 · 2 comments
Labels
enhancement New feature or request

Comments

@phene
Copy link

phene commented Jan 23, 2023

Is this feature request related to a new rule or cfn-lint capabilities?

rules

Describe the feature you'd like to request

As some products are making their journey to compliance programs like FedRAMP, it would be good to have a rule/validator that verifies that any resources you intended to add to your templates are supported in the compliance programs you are responsible for staying in line with.

Describe the solution you'd like

Given a list of compliance programs the product should support. Validates that those resources are in scope for that compliance program.

For example, if I need to deploy to environments that are targeted for FedRAMP High, I should see a failure if I try to use AWS Shield or CloudFront resources. This failure would not occur if I only chose FedRAMP Moderate (east/west).

Additional context

No response

Is this something that you'd be interested in working on?

  • 👋 I may be able to implement this feature request

Would this feature include a breaking change?

  • ⚠️ This feature might incur a breaking change
@PatMyron
Copy link
Contributor

See https://github.com/salesforce/aws-allowlister for how to do this immediately with IAM policies (note their data's out of date: salesforce/aws-allowlister#108)


I'd rather not duplicate their scraping efforts. I'd prefer someone shore up their scraping or convince AWS to vend machine-readable lists. Manually mapping service names, IAM prefixes, CloudFormation namespaces seems like the least sustainable part: https://github.com/salesforce/aws-allowlister/blob/main/aws_allowlister/data/overrides.yml

@kddejong kddejong added the enhancement New feature or request label Feb 10, 2023
@kddejong
Copy link
Contributor

You can provide an override --override-spec with ExcludeResourceTypes to exclude certain resource types from the spec.

https://github.com/aws-cloudformation/cfn-lint/blob/main/docs/customize_specifications.md#features

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants