Skip to content

Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.

License

Notifications You must be signed in to change notification settings

adanalvarez/TrailGuard

Repository files navigation

TrailGuard

TrailGuard

Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.

Introduction

CloudTrail is a valuable service provided by AWS that enables the logging and tracking of API calls in the AWS platform. It is crucial for security and compliance purposes. However, it's essential to ensure that CloudTrail configuration is set up correctly to avoid logging interruptions and maintain the logs' integrity. But the security of CloudTrail does not stop only with the CloudTrail setup.

Because Cloudtrail configuration usually is well monitored, any attempt to stop logging, delete trail, or update won't be allowed and might trigger a security alert. Adversaries might try to disturb the logs by attacking other services that are equally important in many configurations, such as the S3 bucket and its notifications or Cloudwatch log groups and its subscription filters.

TrailGuard provides a simple and efficient way to get better visibility of the services where the logs are being sent, checking if logs are sent to S3 and CloudWatch and if the S3 has any Bucket notifications or if Cloudwatch has any Subscription filters. The tool prints the information on the console and generates a DOT file with the diagram.

Usage

Configure your AWS access keys and also set up the region.

export AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE
export AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
export AWS_DEFAULT_REGION=us-west-2

The ReadOnlyAccess or SecurityAudit are enought for the script to work.

Once the AWS credentials are configured just run:

go run trailguard.go

Or download the binary and execute it:

./TrailGuard

To transform the DOT file into a PNG, you need Graphviz. You can use the DOT file to create a PNG.

dot -T png cloudtrail.dot > cloudtrail.png

Example

Console output:

ConsoleOutput

Graph visualization:

GraphVisualization

About

Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages