Skip to content

Releases: cloudposse/terraform-aws-cloudtrail-s3-bucket

v0.16.1

05 Feb 03:08
cb7fc68
Compare
Choose a tag to compare

🤖 Automatic Updates

Update context.tf @cloudpossebot (#38)

what

This is an auto-generated PR that updates the context.tf file to the latest version from cloudposse/terraform-null-label

why

To support all the features of the context interface.

v0.16.0

04 Feb 07:29
f976e1b
Compare
Choose a tag to compare
minimum required Terraform version bumped to 0.13.0, context.tf updated, readme updated @maximmi (#40)

what

  • update context.tf to v0.23.0
  • minimum required Terraform version bumped to 0.13.0
  • readme updated, Bridgecrew compliance badges added

why

  • It allows for setting the letter case of tag names and labels
  • we have dropped support for Terraform 0.12
  • To be able see and fix the recommendations from Bridgecrew so we can position our modules as standards compliant

v0.15.1

03 Feb 04:12
294cb2f
Compare
Choose a tag to compare

🤖 Automatic Updates

Update README.md and docs @cloudpossebot (#39)

what

This is an auto-generated PR that updates the README.md and docs

why

To have most recent changes of README.md and doc from origin templates

v0.15.0

21 Jan 23:53
407158d
Compare
Choose a tag to compare
add optional access log bucket creation @mcalhoun (#35)

what

  • add the ability to optionally create an S3 bucket for access logging

why

  • AWS security best practices call for Access Logging to be enabled on CloudTrail buckets

references

CIS AWS Foundations Benchmark controls
2.6 – Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket
Severity: Low
AWS Config rule: s3-bucket-logging-enabled

Amazon S3 bucket access logging generates a log that contains access records for each request made
to your S3 bucket. An access log record contains details about the request, such as the request type, the resources specified in the request worked, and the time and date the request was processed.

Security Hub recommends that you enable bucket access logging on the CloudTrail S3 bucket. By enabling S3 bucket logging on target S3 buckets, you can capture all events that might affect objects in a target bucket. Configuring logs to be placed in a separate bucket enables access to log information,
which can be useful in security and incident response workflows.

To run this check, Security Hub first uses custom logic to look for the bucket where your CloudTrail logs are stored and then uses the AWS Config managed rule to check if logging is enabled.

If you aggregate your logs into a single centralized S3 bucket, then Security Hub only runs the check
against the account and Region where the centralized S3 bucket is located. For other accounts and
Regions, the control status is No data. If the bucket is publicly accessible, the check generates a failed finding.

v0.14.0

18 Jan 16:27
220c557
Compare
Choose a tag to compare
Tf14 dependency fix @maximmi (#34)

what

  • Update S3 log storage dependency for 0.14 readiness.
  • workflows updated

why

  • Module is not 0.14 ready yet

supersedes and closes #33

v0.13.0

06 Jan 16:36
4618d42
Compare
Choose a tag to compare
Terraform 0.14 upgrade @maximmi (#32)

what

  • Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard

why

  • Support Terraform 0.14

v0.12.0

02 Sep 00:21
0f52a85
Compare
Choose a tag to compare
Update to `context.tf`. Update Terratest to Golang modules. Allow TF 0.13 @aknysh (#29)

what

  • Update to context.tf
  • Update Terratest to Golang modules
  • Allow TF 0.13

why

  • Standardization and interoperability
  • Keep the module up to date

v0.11.0

18 Aug 16:11
681e630
Compare
Choose a tag to compare
Additional TF 0.13 Fixes @osterman (#28)

what

  • upgrade chatops
  • add automatic releasing
  • upgrade to go modules
  • update any version pinning
  • (locally verififed) no terraform init errors using cli

why

  • Support Terraform 0.13

0.10.1: [AUTOMATED] Update Version Pinning for Terraform to support 0.13 (#25)

18 Aug 07:10
5810057
Compare
Choose a tag to compare
## What

1. Update Version Pinning for Terraform to support 0.13

## Why

1. This is a relatively minor update that the CloudPosse module already likely supports.
1. This allows module consumers to not individually update our Terraform module to support Terraform 0.13.

0.10.0

18 Aug 07:09
0eddc40
Compare
Choose a tag to compare
[AUTOMATED] Update terraform-null-label versions to support Terraform…