Skip to content

Commit 6673e6d

Browse files
committed
Upgrade to v2.1.3
1 parent 8168010 commit 6673e6d

File tree

160 files changed

+818
-666
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

160 files changed

+818
-666
lines changed

.viperlightignore

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
node_modules/
22
.venv/
33

4+
# AWS Acccount IDs expected in .nightswatch/
5+
.nightswatch/deployment/govcloud-member-roles-stack.ym
6+
.nightswatch/deployment/govcloud-member-stack.yml
7+
.nightswatch/deployment/member-roles-stack.yml
8+
.nightswatch/deployment/member-stack.yml
9+
410
[python-pipoutdated]
511
boto3=1.20.32 # Should match Lambda runtime: https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtimes.html

CHANGELOG.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,14 @@ All notable changes to this project will be documented in this file.
55
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
66
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
77

8+
## [2.1.3] - 2024-09-18
9+
10+
### Fixed
11+
- Resolved an issue in the remediation scripts for EC2.18 and EC2.19 where security group rules with IpProtocol set to "-1" were being incorrectly ignored.
12+
13+
### Changed
14+
- Upgraded all Python runtimes in remediation SSM documents from Python 3.8 to Python 3.11.
15+
816
## [2.1.2] - 2024-06-20
917

1018
### Fixed

SECURITY.md

Lines changed: 0 additions & 8 deletions
This file was deleted.

deployment/run-unit-tests.sh

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ export overrideWarningsEnabled=false
1313
echo "UPDATE MODE: CDK Snapshots will be updated. CDK UNIT TESTS WILL BE SKIPPED"
1414
} || update="false"
1515

16-
[[ ! -d .venv ]] && python3 -m venv .venv
16+
[[ ! -d .venv ]] && python3.11 -m venv .venv
1717
source ./.venv/bin/activate
18-
python3 -m pip install -U pip setuptools
18+
python3.11 -m pip install -U pip setuptools
1919

2020
echo 'Installing required Python testing modules'
2121
pip install -r ./requirements_dev.txt
@@ -39,7 +39,7 @@ run_pytest() {
3939
echo "coverage report path set to ${report_file}"
4040

4141
# Use -vv for debugging
42-
python3 -m pytest --cov --cov-report=term-missing --cov-report "xml:$report_file"
42+
python3.11 -m pytest --cov --cov-report=term-missing --cov-report "xml:$report_file"
4343
rc=$?
4444

4545
if [ "$rc" -ne "0" ]; then

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "automated_security_response_on_aws"
3-
version = "2.1.2"
3+
version = "2.1.3"
44

55
[tool.setuptools]
66
package-dir = {"" = "source"}

solution-manifest.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
id: SO0111
22
name: security-hub-automated-response-and-remediation
3-
version: 2.1.2
3+
version: 2.1.3
44
cloudformation_templates:
55
- template: aws-sharr-deploy.template
66
main_template: true

source/package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "aws-security-hub-automated-response-and-remediation",
3-
"version": "2.1.2",
3+
"version": "2.1.3",
44
"description": "Automated remediation for AWS Security Hub (SO0111)",
55
"bin": {
66
"solution_deploy": "bin/solution_deploy.js"

source/playbooks/AFSBP/ssmdocs/AFSBP_AutoScaling.1.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ mainSteps:
6565
parse_id_pattern: '^arn:(?:aws|aws-cn|aws-us-gov):autoscaling:(?:[a-z]{2}(?:-gov)?-[a-z]+-\d):\d{12}:autoScalingGroup:(?:[0-9a-fA-F]{8}-(?:[0-9a-fA-F]{4}-){3}[0-9a-fA-F]{12}):autoScalingGroupName/(.{1,255})$'
6666
expected_control_id:
6767
- 'AutoScaling.1'
68-
Runtime: python3.8
68+
Runtime: python3.11
6969
Handler: parse_event
7070
Script: |-
7171
%%SCRIPT=common/parse_input.py%%

source/playbooks/AFSBP/ssmdocs/AFSBP_CloudFormation.1.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ mainSteps:
5757
parse_id_pattern: '^(arn:(?:aws|aws-us-gov|aws-cn):cloudformation:(?:[a-z]{2}(?:-gov)?-[a-z]+-\d):\d{12}:stack/[a-zA-Z][a-zA-Z0-9-]{0,127}/[a-fA-F0-9]{8}-(?:[a-fA-F0-9]{4}-){3}[a-fA-F0-9]{12})$'
5858
expected_control_id:
5959
- 'CloudFormation.1'
60-
Runtime: 'python3.8'
60+
Runtime: 'python3.11'
6161
Handler: 'parse_event'
6262
Script: |-
6363
%%SCRIPT=common/parse_input.py%%

source/playbooks/AFSBP/ssmdocs/AFSBP_CloudFront.1.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ mainSteps:
5757
parse_id_pattern: '^(arn:(?:aws|aws-us-gov|aws-cn):cloudfront::\d{12}:distribution\/([A-Z0-9]+))$'
5858
expected_control_id:
5959
- 'CloudFront.1'
60-
Runtime: 'python3.8'
60+
Runtime: 'python3.11'
6161
Handler: 'parse_event'
6262
Script: |-
6363
%%SCRIPT=common/parse_input.py%%

0 commit comments

Comments
 (0)