pages-core
pages-core copied to clipboard
Automate the bi-weekly S3 Cloudtrail audit.
Every 2 weeks we receive an audit of all S3 bucket activity via email in json format. We then run the audit.rb Ruby script to identify any activity not performed by the system, and manually audit any exceptions.
We should look at insitutionalizing/automating this process to accept the json and run the audit, as well as maintaining a list of already audited entries such that future reports with the same data can be expedited.
We may also want to confirm the necessity of this task with Peter post-SCR.
Background
Cloud.gov runs a task in their concourse to collect the initial CloudTrail events for the federalist buckets. See https://github.com/cloud-gov/cg-report-federalist-s3
Acceptance Criteria
- [ ] Add the filtering script to the concourse task which identifies any unexpected entries/updates to the S3 bucket from outside the system
- [ ] Change timeframe for CloudTrail queries from last 90days to last 2 weeks