Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS Rotate IAM Keys #4

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 15 additions & 2 deletions 300-Security-Account-Breached/README.MD
Original file line number Diff line number Diff line change
Expand Up @@ -17,5 +17,18 @@ You are getting an email from AWS about your AWS account billing is $XXXX(_You r
- we can help ensure full coverage while making it harder for a misconfiguration or an ingenious attacker to change that. When we detect something interesting, we generate a security finding and deliver it to you through the GuardDuty console and AWS CloudWatch Events. This makes it possible to simply view findings in GuardDuty or push them to an existing SIEM or workflow system. We’ve already seen customers take it a step further using AWS Lambda to automate actions such as changing security groups, isolating instances, or rotating credentials.
- we should enable CloudTrail logging so you are alerted whenever instances are spun up



## AWS Rotate IAM Keys

3. How about access keys for other IAM Users.?
AWS Rotate IAM Keys can rotate keys for multiple profiles, but it can also replace multiple profiles with the same keys.
###AWS Rotate IAM Keys (https://aws-rotate-iam-keys.com/)
<pre>
wget -q https://github.com/rhyeal/aws-rotate-iam-keys/blob/master/aws-rotate-iam-keys_0.9.1.deb -o aws-rotate-iam-keys.deb
sudo dpkg -i aws-rotate-iam-keys.deb
sudo apt-get install -f
rm aws-rotate-iam-keys.deb # optional file clean up
<pre>

## To rotate a specific profile in your ~/.aws/credentials file:

aws-rotate-iam-keys --profile myProfile