From 5f67461a71675ed815cbe19af0d5f94c6ce2b421 Mon Sep 17 00:00:00 2001 From: devopsdymyr <41105507+devopsdymyr@users.noreply.github.com> Date: Tue, 30 Apr 2019 16:32:54 +0530 Subject: [PATCH] AWS Rotate IAM Keys --- 300-Security-Account-Breached/README.MD | 17 +++++++++++++++-- 1 file changed, 15 insertions(+), 2 deletions(-) diff --git a/300-Security-Account-Breached/README.MD b/300-Security-Account-Breached/README.MD index bd0a479..282299f 100644 --- a/300-Security-Account-Breached/README.MD +++ b/300-Security-Account-Breached/README.MD @@ -17,5 +17,18 @@ You are getting an email from AWS about your AWS account billing is $XXXX(_You r - we can help ensure full coverage while making it harder for a misconfiguration or an ingenious attacker to change that. When we detect something interesting, we generate a security finding and deliver it to you through the GuardDuty console and AWS CloudWatch Events. This makes it possible to simply view findings in GuardDuty or push them to an existing SIEM or workflow system. We’ve already seen customers take it a step further using AWS Lambda to automate actions such as changing security groups, isolating instances, or rotating credentials. - we should enable CloudTrail logging so you are alerted whenever instances are spun up - - + ## AWS Rotate IAM Keys + + 3. How about access keys for other IAM Users.? + AWS Rotate IAM Keys can rotate keys for multiple profiles, but it can also replace multiple profiles with the same keys. + ###AWS Rotate IAM Keys (https://aws-rotate-iam-keys.com/) +
+ wget -q https://github.com/rhyeal/aws-rotate-iam-keys/blob/master/aws-rotate-iam-keys_0.9.1.deb -o aws-rotate-iam-keys.deb + sudo dpkg -i aws-rotate-iam-keys.deb + sudo apt-get install -f + rm aws-rotate-iam-keys.deb # optional file clean up ++ + ## To rotate a specific profile in your ~/.aws/credentials file: + + aws-rotate-iam-keys --profile myProfile