CheckConfiguration
- class aws_cdk.aws_iot_alpha.CheckConfiguration(*, authenticated_cognito_role_overly_permissive_check=None, ca_certificate_expiring_check=None, ca_certificate_key_quality_check=None, conflicting_client_ids_check=None, device_certificate_expiring_check=None, device_certificate_key_quality_check=None, device_certificate_shared_check=None, intermediate_ca_revoked_for_active_device_certificates_check=None, iot_policy_overly_permissive_check=None, io_t_policy_potential_mis_configuration_check=None, iot_role_alias_allows_access_to_unused_services_check=None, iot_role_alias_overly_permissive_check=None, logging_disabled_check=None, revoked_ca_certificate_still_active_check=None, revoked_device_certificate_still_active_check=None, unauthenticated_cognito_role_overly_permissive_check=None)
Bases:
object
(experimental) The types of audit checks.
- Parameters:
authenticated_cognito_role_overly_permissive_check (
Optional
[bool
]) – (experimental) Checks the permissiveness of an authenticated Amazon Cognito identity pool role. For this check, AWS IoT Device Defender audits all Amazon Cognito identity pools that have been used to connect to the AWS IoT message broker during the 31 days before the audit is performed. Default: trueca_certificate_expiring_check (
Optional
[bool
]) – (experimental) Checks if a CA certificate is expiring. This check applies to CA certificates expiring within 30 days or that have expired. Default: trueca_certificate_key_quality_check (
Optional
[bool
]) – (experimental) Checks the quality of the CA certificate key. The quality checks if the key is in a valid format, not expired, and if the key meets a minimum required size. This check applies to CA certificates that are ACTIVE or PENDING_TRANSFER. Default: trueconflicting_client_ids_check (
Optional
[bool
]) – (experimental) Checks if multiple devices connect using the same client ID. Default: truedevice_certificate_expiring_check (
Optional
[bool
]) – (experimental) Checks if a device certificate is expiring. This check applies to device certificates expiring within 30 days or that have expired. Default: truedevice_certificate_key_quality_check (
Optional
[bool
]) – (experimental) Checks the quality of the device certificate key. The quality checks if the key is in a valid format, not expired, signed by a registered certificate authority, and if the key meets a minimum required size. Default: truedevice_certificate_shared_check (
Optional
[bool
]) – (experimental) Checks if multiple concurrent connections use the same X.509 certificate to authenticate with AWS IoT. Default: trueintermediate_ca_revoked_for_active_device_certificates_check (
Optional
[bool
]) – (experimental) Checks if device certificates are still active despite being revoked by an intermediate CA. Default: trueiot_policy_overly_permissive_check (
Optional
[bool
]) – (experimental) Checks the permissiveness of a policy attached to an authenticated Amazon Cognito identity pool role. Default: trueio_t_policy_potential_mis_configuration_check (
Optional
[bool
]) – (experimental) Checks if an AWS IoT policy is potentially misconfigured. Misconfigured policies, including overly permissive policies, can cause security incidents like allowing devices access to unintended resources. This check is a warning for you to make sure that only intended actions are allowed before updating the policy. Default: trueiot_role_alias_allows_access_to_unused_services_check (
Optional
[bool
]) – (experimental) Checks if a role alias has access to services that haven’t been used for the AWS IoT device in the last year. Default: trueiot_role_alias_overly_permissive_check (
Optional
[bool
]) – (experimental) Checks if the temporary credentials provided by AWS IoT role aliases are overly permissive. Default: truelogging_disabled_check (
Optional
[bool
]) – (experimental) Checks if AWS IoT logs are disabled. Default: truerevoked_ca_certificate_still_active_check (
Optional
[bool
]) – (experimental) Checks if a revoked CA certificate is still active. Default: truerevoked_device_certificate_still_active_check (
Optional
[bool
]) – (experimental) Checks if a revoked device certificate is still active. Default: trueunauthenticated_cognito_role_overly_permissive_check (
Optional
[bool
]) – (experimental) Checks if policy attached to an unauthenticated Amazon Cognito identity pool role is too permissive. Default: true
- See:
- Stability:
experimental
- ExampleMetadata:
infused
Example:
iot.AccountAuditConfiguration(self, "AuditConfiguration", check_configuration=iot.CheckConfiguration( # enabled authenticated_cognito_role_overly_permissive_check=True, # enabled by default ca_certificate_expiring_check=undefined, # disabled ca_certificate_key_quality_check=False, conflicting_client_ids_check=False, device_certificate_expiring_check=False, device_certificate_key_quality_check=False, device_certificate_shared_check=False, intermediate_ca_revoked_for_active_device_certificates_check=False, io_tPolicy_potential_mis_configuration_check=False, iot_policy_overly_permissive_check=False, iot_role_alias_allows_access_to_unused_services_check=False, iot_role_alias_overly_permissive_check=False, logging_disabled_check=False, revoked_ca_certificate_still_active_check=False, revoked_device_certificate_still_active_check=False, unauthenticated_cognito_role_overly_permissive_check=False ) )
Attributes
- authenticated_cognito_role_overly_permissive_check
(experimental) Checks the permissiveness of an authenticated Amazon Cognito identity pool role.
For this check, AWS IoT Device Defender audits all Amazon Cognito identity pools that have been used to connect to the AWS IoT message broker during the 31 days before the audit is performed.
- Default:
true
- Stability:
experimental
- ca_certificate_expiring_check
(experimental) Checks if a CA certificate is expiring.
This check applies to CA certificates expiring within 30 days or that have expired.
- Default:
true
- Stability:
experimental
- ca_certificate_key_quality_check
(experimental) Checks the quality of the CA certificate key.
The quality checks if the key is in a valid format, not expired, and if the key meets a minimum required size.
This check applies to CA certificates that are ACTIVE or PENDING_TRANSFER.
- Default:
true
- Stability:
experimental
- conflicting_client_ids_check
(experimental) Checks if multiple devices connect using the same client ID.
- Default:
true
- Stability:
experimental
- device_certificate_expiring_check
(experimental) Checks if a device certificate is expiring.
This check applies to device certificates expiring within 30 days or that have expired.
- Default:
true
- Stability:
experimental
- device_certificate_key_quality_check
(experimental) Checks the quality of the device certificate key.
The quality checks if the key is in a valid format, not expired, signed by a registered certificate authority, and if the key meets a minimum required size.
- Default:
true
- Stability:
experimental
(experimental) Checks if multiple concurrent connections use the same X.509 certificate to authenticate with AWS IoT.
- Default:
true
- Stability:
experimental
- intermediate_ca_revoked_for_active_device_certificates_check
(experimental) Checks if device certificates are still active despite being revoked by an intermediate CA.
- Default:
true
- Stability:
experimental
- io_t_policy_potential_mis_configuration_check
(experimental) Checks if an AWS IoT policy is potentially misconfigured.
Misconfigured policies, including overly permissive policies, can cause security incidents like allowing devices access to unintended resources.
This check is a warning for you to make sure that only intended actions are allowed before updating the policy.
- Default:
true
- Stability:
experimental
- iot_policy_overly_permissive_check
(experimental) Checks the permissiveness of a policy attached to an authenticated Amazon Cognito identity pool role.
- Default:
true
- Stability:
experimental
- iot_role_alias_allows_access_to_unused_services_check
(experimental) Checks if a role alias has access to services that haven’t been used for the AWS IoT device in the last year.
- Default:
true
- Stability:
experimental
- iot_role_alias_overly_permissive_check
(experimental) Checks if the temporary credentials provided by AWS IoT role aliases are overly permissive.
- Default:
true
- Stability:
experimental
- logging_disabled_check
(experimental) Checks if AWS IoT logs are disabled.
- Default:
true
- Stability:
experimental
- revoked_ca_certificate_still_active_check
(experimental) Checks if a revoked CA certificate is still active.
- Default:
true
- Stability:
experimental
- revoked_device_certificate_still_active_check
(experimental) Checks if a revoked device certificate is still active.
- Default:
true
- Stability:
experimental
- unauthenticated_cognito_role_overly_permissive_check
(experimental) Checks if policy attached to an unauthenticated Amazon Cognito identity pool role is too permissive.
- Default:
true
- Stability:
experimental