Skip to content

Commit

Permalink
Initial commit
Browse files Browse the repository at this point in the history
  • Loading branch information
guillermo-ampie committed Nov 24, 2021
0 parents commit 20f99d4
Show file tree
Hide file tree
Showing 24 changed files with 1,593 additions and 0 deletions.
55 changes: 55 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
# File created using '.gitignore Generator' for Visual Studio Code: https://bit.ly/vscode-gig

# Created by https://www.toptal.com/developers/gitignore/api/visualstudiocode,macos
# Edit at https://www.toptal.com/developers/gitignore?templates=visualstudiocode,macos

### macOS ###
# General
.DS_Store
.AppleDouble
.LSOverride

# Icon must end with two \r
Icon

# Thumbnails
._*

# Files that might appear in the root of a volume
.DocumentRevisions-V100
.fseventsd
.Spotlight-V100
.TemporaryItems
.Trashes
.VolumeIcon.icns
.com.apple.timemachine.donotpresent

# Directories potentially created on remote AFP share
.AppleDB
.AppleDesktop
Network Trash Folder
Temporary Items
.apdisk

### VisualStudioCode ###
.vscode/*
!.vscode/settings.json
!.vscode/tasks.json
!.vscode/launch.json
!.vscode/extensions.json
*.code-workspace

# Local History for Visual Studio Code
.history/

### VisualStudioCode Patch ###
# Ignore all local history of files
.history
.ionide

# Support for Project snippet scope
!.vscode/*.code-snippets

# End of https://www.toptal.com/developers/gitignore/api/visualstudiocode,macos

# Custom rules (everything added below won't be overriden by 'Generate .gitignore File' if you use 'Update' option)
481 changes: 481 additions & 0 deletions README.md

Large diffs are not rendered by default.

Binary file added starter/AWS-WebServiceDiagram-v1-insecure.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added starter/DevOpsPipeline.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
5 changes: 5 additions & 0 deletions starter/E1T5.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
Based on the architecture diagram, and the steps you have taken so far to upload data and access the application web service, identify at least 2 obvious poor practices as it relates to security. Include justification.

# Poor practice 1

# Poor practice 2
3 changes: 3 additions & 0 deletions starter/E2T2.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Research and analyze which of the vulnerabilities appear to be related to the code that was deployed for the environment in this project.

Bonus - provide recommendations on how to remediate the vulnerabilities.
3 changes: 3 additions & 0 deletions starter/E3T1.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
# Describe GuardDuty findings that were detected related to the brute force attack

# Research the AWS Guard Duty documentation page and explain how GuardDuty may have detected this attack - i.e. what was its source of information.
5 changes: 5 additions & 0 deletions starter/E4T1.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@


# Identify 2-3 changes that can be made to our environment to prevent an ssh brute force attack from the internet.

# Neither instance should have had access to the secret recipes bucket, in the even that instance API credentials were compromised how could we have prevented access to sensitive data.
8 changes: 8 additions & 0 deletions starter/E4T4.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@

# What additional architectural change can be made to reduce the internet facing attack surface of the web application instance.

# Assuming the IAM permissions for the S3 bucket are still insecure, would creating VPC private endpoints for S3 prevent the unauthorized access to the secrets bucket.

# Will applying default encryption setting to the s3 buckets encrypt the data that already exists?

# What would happen if the original cloud formation templates are applied to this environment.
13 changes: 13 additions & 0 deletions starter/E5T2.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# Identify tools that will allow you to do the following:

## Scan infrastructure as code templates

### Example vulnerability

##Scan AMI’s or containers for OS vulnerabilities

### Example vulnerability

##Scan an AWS environment for cloud configuration vulnerabilities

### Example vulnerability
Loading

0 comments on commit 20f99d4

Please sign in to comment.