|
1 | 1 | { |
2 | 2 | "Provider": "aws", |
3 | 3 | "CheckID": "config_recorder_using_aws_service_role", |
4 | | - "CheckTitle": "Ensure Config Recorder is using service-linked AWS Config role", |
| 4 | + "CheckTitle": "AWS Config recorder uses the AWSServiceRoleForConfig service-linked role", |
5 | 5 | "CheckType": [ |
6 | | - "Software and Configuration Checks/AWS Security Best Practices/AWS Foundational Security Best Practices" |
| 6 | + "Software and Configuration Checks/AWS Security Best Practices", |
| 7 | + "Software and Configuration Checks/Industry and Regulatory Standards/AWS Foundational Security Best Practices" |
7 | 8 | ], |
8 | 9 | "ServiceName": "config", |
9 | 10 | "SubServiceName": "", |
10 | | - "ResourceIdTemplate": "arn:partition:access-recorder:region:account-id:recorder/resource-id", |
| 11 | + "ResourceIdTemplate": "", |
11 | 12 | "Severity": "medium", |
12 | 13 | "ResourceType": "Other", |
13 | | - "Description": "AWS Config uses an IAM role to access other AWS services. This role should be AWSServiceRoleForConfig, not a custom role. Using AWSServiceRoleForConfig ensures that the Config recorder has the necessary permissions to record configuration changes and that the role is managed by AWS, reducing the risk of misconfiguration.", |
14 | | - "Risk": "If the Config recorder is not using AWSServiceRoleForConfig, it may not have the necessary permissions to record configuration changes, which could lead in not following the principle of least privilege, which could lead to misconfiguration and potential security vulnerabilities.", |
15 | | - "RelatedUrl": "https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html", |
| 14 | + "Description": "**AWS Config recorders** are evaluated for use of the service‑linked IAM role `AWSServiceRoleForConfig` linked to `config.amazonaws.com` rather than a custom role.\n\nThe evaluation inspects active recorders and their role ARN to confirm the AWS‑managed service‑linked role is in use.", |
| 15 | + "Risk": "Using a custom or incorrect role can break recording or create blind spots, undermining the **integrity** and **availability** of configuration history. Over‑privileged roles weaken **least privilege**, increasing risk of unauthorized access, stealthy changes, and delayed incident response.", |
| 16 | + "RelatedUrl": "", |
| 17 | + "AdditionalURLs": [ |
| 18 | + "https://docs.aws.amazon.com/securityhub/latest/userguide/config-controls.html#config-1", |
| 19 | + "https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html" |
| 20 | + ], |
16 | 21 | "Remediation": { |
17 | 22 | "Code": { |
18 | | - "CLI": "aws configservice put-configuration-recorder --configuration-recorder- name=<recorder-name>,roleARN=arn:<audited_partition>:iam::<account_number>:role/aws-service-role/config.amazonaws.com/AWSServiceRoleForConfig", |
19 | | - "NativeIaC": "", |
20 | | - "Other": "https://docs.aws.amazon.com/securityhub/latest/userguide/config-controls.html#config-1", |
21 | | - "Terraform": "" |
| 23 | + "CLI": "aws configservice put-configuration-recorder --configuration-recorder name=<RECORDER_NAME>,roleARN=arn:<PARTITION>:iam::<ACCOUNT_ID>:role/aws-service-role/config.amazonaws.com/AWSServiceRoleForConfig", |
| 24 | + "NativeIaC": "```yaml\nResources:\n example_resource:\n Type: AWS::Config::ConfigurationRecorder\n Properties:\n Name: example_resource\n RoleARN: arn:<PARTITION>:iam::<ACCOUNT_ID>:role/aws-service-role/config.amazonaws.com/AWSServiceRoleForConfig # This line fixes the security issue\n```", |
| 25 | + "Other": "1. Open the AWS Console and go to AWS Config\n2. Choose Settings (or Recording) and click Edit\n3. For IAM role, select Use service-linked role (AWSServiceRoleForConfig)\n4. Save changes", |
| 26 | + "Terraform": "```hcl\nresource \"aws_config_configuration_recorder\" \"example_resource\" {\n name = \"example_resource\"\n role_arn = \"arn:<PARTITION>:iam::<ACCOUNT_ID>:role/aws-service-role/config.amazonaws.com/AWSServiceRoleForConfig\" # This line fixes the security issue\n}\n```" |
22 | 27 | }, |
23 | 28 | "Recommendation": { |
24 | | - "Text": "Use service-linked role AWSServiceRoleForConfig for AWS Config recorders.", |
25 | | - "Url": "https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html" |
| 29 | + "Text": "Use the AWS‑managed service‑linked role `AWSServiceRoleForConfig` for all recorders to enforce **least privilege** and consistent trust.\n\nAvoid custom roles; restrict who can modify the recorder or role; monitor for drift and ensure recording remains enabled as part of **defense in depth**.", |
| 30 | + "Url": "https://hub.prowler.com/check/config_recorder_using_aws_service_role" |
26 | 31 | } |
27 | 32 | }, |
28 | | - "Categories": [], |
| 33 | + "Categories": [ |
| 34 | + "identity-access" |
| 35 | + ], |
29 | 36 | "DependsOn": [], |
30 | 37 | "RelatedTo": [], |
31 | 38 | "Notes": "" |
|
0 commit comments