Created
February 18, 2020 17:24
-
-
Save matthew-harper/4d8dfae1a821a6340b9ac39435c337c0 to your computer and use it in GitHub Desktop.
Python AWS Lambda function to process CloudTrail Events
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import json | |
import urllib.parse | |
import boto3 | |
import io | |
import gzip | |
import re | |
s3 = boto3.client('s3') | |
sns = boto3.client('sns') | |
sns_arn = "arn:replace_me" | |
USER_AGENTS = {"console.amazonaws.com", "Coral/Jakarta", "Coral/Netty4"} | |
IGNORED_EVENTS = {"DownloadDBLogFilePortion", "TestScheduleExpression", "TestEventPattern", "LookupEvents", | |
"listDnssec", "Decrypt", "REST.GET.OBJECT_LOCK_CONFIGURATION", "ConsoleLogin"} | |
def post_to_sns(user, event) -> None: | |
message = f'Manual AWS Changed Detected: {user} --> {event}' | |
sns_publish(message) | |
def post_to_sns_details(message) -> None: | |
message = {"Manual AWS Change Detected": message} | |
sns_publish(message) | |
def sns_publish(message) -> None: | |
sns.publish( | |
TargetArn=sns_arn, | |
Message=json.dumps({'default': json.dumps(message)}), | |
MessageStructure='json' | |
) | |
def check_regex(expr, txt) -> bool: | |
match = re.search(expr, txt) | |
return match is not None | |
def match_user_agent(txt) -> bool: | |
if txt in USER_AGENTS: | |
return True | |
expressions = ( | |
"signin.amazonaws.com(.*)", | |
"^S3Console", | |
"^\[S3Console", | |
"^Mozilla/", | |
"^console(.*)amazonaws.com(.*)", | |
"^aws-internal(.*)AWSLambdaConsole(.*)", | |
) | |
for expresion in expressions: | |
if check_regex(expresion, txt): | |
return True | |
return False | |
def match_readonly_event_name(txt) -> bool: | |
# starts with | |
expressions = ( | |
"^Get", | |
"^Describe", | |
"^List", | |
"^Head", | |
) | |
for expression in expressions: | |
if check_regex(expression, txt): | |
return True | |
return False | |
def match_ignored_events(event_name) -> bool: | |
return event_name in IGNORED_EVENTS | |
def filter_user_events(event) -> bool: | |
is_match = match_user_agent(event['userAgent']) | |
is_read_only = match_readonly_event_name(event['eventName']) | |
is_ignored_event = match_ignored_events(event['eventName']) | |
is_in_event = 'invokedBy' in event['userIdentity'] and event['userIdentity']['invokedBy'] == 'AWS Internal' | |
status = is_match and not is_read_only and not is_ignored_event and not is_in_event | |
return status | |
def get_user_email(principal_id) -> str: | |
words = principal_id.split(':') | |
if len(words) > 1: | |
return words[1] | |
return principal_id | |
def lambda_handler(event, context) -> None: | |
""" | |
This functions processes CloudTrail logs from S3, filters events from the AWS Console, and publishes to SNS | |
:param event: List of S3 Events | |
:param context: AWS Lambda Context Object | |
:return: None | |
""" | |
for record in event['Records']: | |
# Get the object from the event and show its content type | |
bucket = record['s3']['bucket']['name'] | |
key = urllib.parse.unquote_plus(record['s3']['object']['key'], encoding='utf-8') | |
try: | |
response = s3.get_object(Bucket=bucket, Key=key) | |
content = response['Body'].read() | |
with gzip.GzipFile(fileobj=io.BytesIO(content), mode='rb') as fh: | |
event_json = json.load(fh) | |
output_dict = [record for record in event_json['Records'] if filter_user_events(record)] | |
if len(output_dict) > 0: | |
post_to_sns_details(output_dict) | |
for item in output_dict: | |
post_to_sns(get_user_email(item['userIdentity']['principalId']), item['eventName']) | |
return response['ContentType'] | |
except Exception as e: | |
print(e) | |
message = f""" | |
Error getting object {key} from bucket {bucket}. | |
Make sure they exist and your bucket is in the same region as this function. | |
""" | |
print(message) | |
raise e | |
def unit_test() -> None: | |
with open('sample.txt') as json_file: | |
event_json = json.load(json_file) | |
output_dict = [record for record in event_json['Records'] if filter_user_events(record)] | |
for item in output_dict: | |
user_email = get_user_email(item['userIdentity']['principalId']) | |
print(f"{user_email} -- {item['eventName']}") | |
post_to_sns(get_user_email(item['userIdentity']['principalId']), item['eventName']) | |
post_to_sns_details(item) | |
#unit_test() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment