Remediate AWS Guard Duty Alerts
Automate AWS SNS notifications from Guard Duty Findings triggering Jira issue creation, execute actions in AWS for identified issues, and update issue state to "done" upon resolution.AWS GuardDuty alerts based on different event types triggered.
Requirements
Docker daemon must be installed and running. Please see Install Docker Engine for more information.
Installation
Download and install Flowpipe (https://flowpipe.io/downloads). Or use Brew:
brew tap turbot/tapbrew install flowpipe
Clone:
git clone https://github.com/turbot/flowpipe-samples.gitcd public_cloud/remediate_aws_guardduty_alerts
flowpipe mod install
Connections
By default, the following environment variables will be used for authentication:
JIRA_API_TOKEN
JIRA_URL
JIRA_USER
AWS_PROFILE
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
You can also create connection
resources in configuration files:
vi ~/.flowpipe/config/jira.fpc
connection "jira" "jira_conn" { base_url = "https://test.atlassian.net/" api_token = "ATATT3........." username = "abc@email.com"}
vi ~/.flowpipe/config/aws.fpc
connection "aws" "aws_profile" { profile = "my-profile"}
connection "aws" "aws_access_key_pair" { access_key = "AKIA..." secret_key = "dP+C+J..."}
connection "aws" "aws_session_token" { access_key = "AKIA..." secret_key = "dP+C+J..." session_token = "AQoDX..."}
For more information on connections in Flowpipe, please see Managing Connections.
Usage
To get AWS Guard Duty alerts and remediate them, run:
flowpipe server
Once started, Flowpipe will run the pipeline automatically whenever a webhook event is received.
Configuration
To run the pipeline automatically whenever a webhook event is received, you can create a AWS GuardDuty Findings webhook subscription.
To configure the webhook subscription in AWS:
- Get the trigger details:flowpipe trigger show http.pagerduty_webhook_incident_events
- Copy the
Url
, e.g.,/hook/remediate_aws_guardduty_alerts.trigger.http.remediate_aws_guardduty_alerts/92ffeda03426754f2c79dfaa
- Use a tool like ngrok with a custom domain to expose your localhost server to the internet:ngrok http 7103 --domain=yellow-neutral-lab.ngrok-free.app
- Form the full webhook URL with the public endpoint from ngrok and the trigger URL using the format
https://{ngrok_domain}.ngrok-free.app/api/v0/{hook_url}
, e.g.,https://yellow-neutral-lab.ngrok-free.app/api/v0/hook/remediate_aws_guardduty_alerts.trigger.http.remediate_aws_guardduty_alerts/92ffeda03426754f2c79dfaa
- Create AWS SNS topic and subscribe to the topic with the webhook URL.
- Create AWS EventBridge rule to trigger the SNS topic on GuardDuty Finding event.
To avoid entering variable values when running the pipeline or starting the server, you can set variable values:
cp flowpipe.fpvars.example flowpipe.fpvarsvi flowpipe.fpvars
# Jira project_keyjira_project_key="QWR"issue_type="Bug"
# AWS regionaws_region = "us-east-1"