UNPKG

@k9securityio/k9-cdk

Version:

Provision strong AWS security policies easily using the AWS CDK.

137 lines 22.6 kB
"use strict"; var _a; Object.defineProperty(exports, "__esModule", { value: true }); exports.makeKeyPolicy = exports.CloudFrontOACReadAccessGenerator = exports.SID_DENY_EVERYONE_ELSE = exports.SID_ALLOW_ROOT_AND_IDENTITY_POLICIES = void 0; const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti"); const iam = require("aws-cdk-lib/aws-iam"); const aws_iam_1 = require("aws-cdk-lib/aws-iam"); const k9policy_1 = require("./k9policy"); let SUPPORTED_CAPABILITIES = new Array(k9policy_1.AccessCapability.ADMINISTER_RESOURCE, k9policy_1.AccessCapability.READ_CONFIG, k9policy_1.AccessCapability.READ_DATA, k9policy_1.AccessCapability.WRITE_DATA, k9policy_1.AccessCapability.DELETE_DATA); exports.SID_ALLOW_ROOT_AND_IDENTITY_POLICIES = 'Allow Root User to Administer Key And Identity Policies'; exports.SID_DENY_EVERYONE_ELSE = 'DenyEveryoneElse'; /** * Generate key policy statements to enable the CloudFront service to read encrypted S3 bucket object data (only) * from within a <a href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-restricting-access-to-s3.html#sse-kms">CloudFront OAC integration</a>. */ class CloudFrontOACReadAccessGenerator { constructor(distributionArn) { this.distributionArn = distributionArn; } makeAllowStatements() { return [new aws_iam_1.PolicyStatement({ sid: CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_SVC_READ_DATA, effect: aws_iam_1.Effect.ALLOW, principals: [new aws_iam_1.ServicePrincipal('cloudfront.amazonaws.com')], actions: ['kms:Decrypt'], resources: ['*'], conditions: { StringEquals: { 'aws:SourceArn': this.distributionArn }, }, }), new aws_iam_1.PolicyStatement({ sid: CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_IAM_ROLE_READ_DATA, effect: aws_iam_1.Effect.ALLOW, principals: [new aws_iam_1.AnyPrincipal()], actions: ['kms:Decrypt'], resources: ['*'], conditions: { // use ArnEquals condition instead of a plain Principal element in case // the CloudFront service recreates the role. // conditions bind against the principal ARN at runtime. // the principal element binds (once) to the principal's canonical userid at policy definition time. ArnEquals: { 'aws:PrincipalArn': 'arn:aws:iam::856369053181:role/OriginAccessControlRole', }, }, })]; } makeConditionsToExceptFromDenyEveryoneElse() { // return a (TypeScript) Record of the form: // {"Operator": { "keyInRequestContext": "value" } } return { StringNotEqualsIfExists: { 'aws:PrincipalServiceName': 'cloudfront.amazonaws.com' } }; } } exports.CloudFrontOACReadAccessGenerator = CloudFrontOACReadAccessGenerator; _a = JSII_RTTI_SYMBOL_1; CloudFrontOACReadAccessGenerator[_a] = { fqn: "@k9securityio/k9-cdk.kms.CloudFrontOACReadAccessGenerator", version: "2.1.3" }; CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_SVC_READ_DATA = 'Allow CloudFront Service read-data'; CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_IAM_ROLE_READ_DATA = 'Allow CloudFront IAM role read-data'; function makeKeyPolicy(props) { const policyFactory = new k9policy_1.K9PolicyFactory(); const policy = new iam.PolicyDocument(); const resourceArns = ['*']; let accessSpecsByCapabilityRecs = policyFactory.mergeDesiredAccessSpecsByCapability(SUPPORTED_CAPABILITIES, props.k9DesiredAccess); let accessSpecsByCapability = new Map(); for (let [capabilityStr, accessSpec] of Object.entries(accessSpecsByCapabilityRecs)) { accessSpecsByCapability.set((0, k9policy_1.getAccessCapabilityFromValue)(capabilityStr), accessSpec); } if (!(0, k9policy_1.canPrincipalsManageResources)(accessSpecsByCapability)) { throw Error('At least one principal must be able to administer and read-config for keys' + ' so encrypted data remains accessible; found:\n' + `administer-resource: '${accessSpecsByCapability.get(k9policy_1.AccessCapability.ADMINISTER_RESOURCE)?.allowPrincipalArns}'\n` + `read-config: '${accessSpecsByCapability.get(k9policy_1.AccessCapability.READ_CONFIG)?.allowPrincipalArns}'`); } const allowStatements = policyFactory.makeAllowStatements('KMS', SUPPORTED_CAPABILITIES, Array.from(accessSpecsByCapability.values()), resourceArns); policy.addStatements(...allowStatements); if (props.awsServiceAccessGenerators) { for (let serviceAccessSpec of props.awsServiceAccessGenerators) { policy.addStatements(...serviceAccessSpec.makeAllowStatements()); } } //console.log(`trustAccountIdentities: ${props.trustAccountIdentities}`); // Allow root user and control access via Identity policy by aligning to Key's behavior: if (props.trustAccountIdentities) { //console.log('Adding Allow root and DenyEveryoneElse statements'); const denyEveryoneElseStatement = new aws_iam_1.PolicyStatement({ sid: exports.SID_DENY_EVERYONE_ELSE, effect: aws_iam_1.Effect.DENY, principals: policyFactory.makeDenyEveryoneElsePrincipals(), actions: ['kms:*'], resources: resourceArns, }); denyEveryoneElseStatement.addCondition('Bool', { 'aws:PrincipalIsAWSService': ['false'], 'kms:GrantIsForAWSResource': ['false'], }); const denyEveryoneElseTest = policyFactory.wasLikeUsed(props.k9DesiredAccess) ? 'ArnNotLike' : 'ArnNotEquals'; const allAllowedPrincipalArns = policyFactory.getAllowedPrincipalArns(props.k9DesiredAccess); const accountRootPrincipal = new aws_iam_1.AccountRootPrincipal(); denyEveryoneElseStatement.addCondition(denyEveryoneElseTest, { 'aws:PrincipalArn': [ // Place Root Principal arn in stable, prominent position; // will render as an object Fn::Join'ing Partition & AccountId accountRootPrincipal.arn, ...allAllowedPrincipalArns, ], }); policy.addStatements( // add AllowRootUserToAdministerKey statement and enable access granted via Identity policies new aws_iam_1.PolicyStatement({ sid: exports.SID_ALLOW_ROOT_AND_IDENTITY_POLICIES, effect: aws_iam_1.Effect.ALLOW, principals: [accountRootPrincipal], actions: ['kms:*'], resources: resourceArns, }), denyEveryoneElseStatement); } else { // Omit Allow Root & DenyEveryoneElse statement // // Instead, implement least privilege by relying on KMS' special behavior that // enables granting access solely via a KMS key policy, *irrespective of* Identity policy. // // See: https://docs.aws.amazon.com/kms/latest/developerguide/control-access-overview.html#managing-access // "To allow access to a KMS key, you must use the key policy, // *either alone* or in combination with IAM policies or grants. // IAM policies by themselves are not sufficient to allow access to a KMS key, // though you can use them in combination with a key policy." // //console.log('Omitting Allow root and DenyEveryoneElse statements'); } policy.validateForResourcePolicy(); return policy; } exports.makeKeyPolicy = makeKeyPolicy; //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"kms.js","sourceRoot":"","sources":["../src/kms.ts"],"names":[],"mappings":";;;;;AAAA,2CAA2C;AAC3C,iDAO6B;AAC7B,yCAOoB;AAcpB,IAAI,sBAAsB,GAAG,IAAI,KAAK,CACpC,2BAAgB,CAAC,mBAAmB,EACpC,2BAAgB,CAAC,WAAW,EAC5B,2BAAgB,CAAC,SAAS,EAC1B,2BAAgB,CAAC,UAAU,EAC3B,2BAAgB,CAAC,WAAW,CAC7B,CAAC;AAEW,QAAA,oCAAoC,GAAG,yDAAyD,CAAC;AACjG,QAAA,sBAAsB,GAAG,kBAAkB,CAAC;AAEzD;;;GAGG;AACH,MAAa,gCAAgC;IAO3C,YAAY,eAAuB;QACjC,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;IACzC,CAAC;IAED,mBAAmB;QACjB,OAAO,CAAC,IAAI,yBAAe,CAAC;gBAC1B,GAAG,EAAE,gCAAgC,CAAC,kCAAkC;gBACxE,MAAM,EAAE,gBAAM,CAAC,KAAK;gBACpB,UAAU,EAAE,CAAC,IAAI,0BAAgB,CAAC,0BAA0B,CAAC,CAAC;gBAC9D,OAAO,EAAE,CAAC,aAAa,CAAC;gBACxB,SAAS,EAAE,CAAC,GAAG,CAAC;gBAChB,UAAU,EAAE;oBACV,YAAY,EAAE,EAAE,eAAe,EAAE,IAAI,CAAC,eAAe,EAAE;iBACxD;aACF,CAAC;YACF,IAAI,yBAAe,CAAC;gBAClB,GAAG,EAAE,gCAAgC,CAAC,uCAAuC;gBAC7E,MAAM,EAAE,gBAAM,CAAC,KAAK;gBACpB,UAAU,EAAE,CAAC,IAAI,sBAAY,EAAE,CAAC;gBAChC,OAAO,EAAE,CAAC,aAAa,CAAC;gBACxB,SAAS,EAAE,CAAC,GAAG,CAAC;gBAChB,UAAU,EAAE;oBACV,uEAAuE;oBACvE,6CAA6C;oBAC7C,wDAAwD;oBACxD,oGAAoG;oBACpG,SAAS,EAAE;wBACT,kBAAkB,EAAE,wDAAwD;qBAC7E;iBACF;aACF,CAAC,CAAC,CAAC;IACN,CAAC;IAED,0CAA0C;QACxC,4CAA4C;QAC5C,wDAAwD;QACxD,OAAO,EAAE,uBAAuB,EAAE,EAAE,0BAA0B,EAAE,0BAA0B,EAAE,EAAE,CAAC;IACjG,CAAC;;AA5CH,4EA6CC;;;AA3CiB,mEAAkC,GAAG,oCAAoC,CAAC;AAC1E,wEAAuC,GAAG,qCAAqC,CAAC;AA6ClG,SAAgB,aAAa,CAAC,KAAuB;IACnD,MAAM,aAAa,GAAG,IAAI,0BAAe,EAAE,CAAC;IAC5C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,cAAc,EAAE,CAAC;IAExC,MAAM,YAAY,GAAG,CAAC,GAAG,CAAC,CAAC;IAE3B,IAAI,2BAA2B,GAAG,aAAa,CAAC,mCAAmC,CAAC,sBAAsB,EAAE,KAAK,CAAC,eAAe,CAAC,CAAC;IACnI,IAAI,uBAAuB,GAAuC,IAAI,GAAG,EAAE,CAAC;IAE5E,KAAK,IAAI,CAAC,aAAa,EAAE,UAAU,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,2BAA2B,CAAC,EAAE,CAAC;QACpF,uBAAuB,CAAC,GAAG,CAAC,IAAA,uCAA4B,EAAC,aAAa,CAAC,EAAE,UAAU,CAAC,CAAC;IACvF,CAAC;IAED,IAAI,CAAC,IAAA,uCAA4B,EAAC,uBAAuB,CAAC,EAAE,CAAC;QAC3D,MAAM,KAAK,CAAC,4EAA4E;YAChF,iDAAiD;YACjD,yBAAyB,uBAAuB,CAAC,GAAG,CAAC,2BAAgB,CAAC,mBAAmB,CAAC,EAAE,kBAAkB,KAAK;YACnH,iBAAiB,uBAAuB,CAAC,GAAG,CAAC,2BAAgB,CAAC,WAAW,CAAC,EAAE,kBAAkB,GAAG,CACxG,CAAC;IACJ,CAAC;IAED,MAAM,eAAe,GAAG,aAAa,CAAC,mBAAmB,CAAC,KAAK,EAC7D,sBAAsB,EACtB,KAAK,CAAC,IAAI,CAAC,uBAAuB,CAAC,MAAM,EAAE,CAAC,EAC5C,YAAY,CAAC,CAAC;IAChB,MAAM,CAAC,aAAa,CAAC,GAAG,eAAe,CAAC,CAAC;IAEzC,IAAI,KAAK,CAAC,0BAA0B,EAAE,CAAC;QACrC,KAAK,IAAI,iBAAiB,IAAI,KAAK,CAAC,0BAA0B,EAAE,CAAC;YAC/D,MAAM,CAAC,aAAa,CAAC,GAAG,iBAAiB,CAAC,mBAAmB,EAAE,CAAC,CAAC;QACnE,CAAC;IACH,CAAC;IAED,yEAAyE;IAEzE,wFAAwF;IACxF,IAAI,KAAK,CAAC,sBAAsB,EAAE,CAAC;QACjC,mEAAmE;QACnE,MAAM,yBAAyB,GAAG,IAAI,yBAAe,CAAC;YACpD,GAAG,EAAE,8BAAsB;YAC3B,MAAM,EAAE,gBAAM,CAAC,IAAI;YACnB,UAAU,EAAE,aAAa,CAAC,8BAA8B,EAAE;YAC1D,OAAO,EAAE,CAAC,OAAO,CAAC;YAClB,SAAS,EAAE,YAAY;SACxB,CAAC,CAAC;QACH,yBAAyB,CAAC,YAAY,CAAC,MAAM,EAAE;YAC7C,2BAA2B,EAAE,CAAC,OAAO,CAAC;YACtC,2BAA2B,EAAE,CAAC,OAAO,CAAC;SACvC,CAAC,CAAC;QACH,MAAM,oBAAoB,GAAG,aAAa,CAAC,WAAW,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC;YAC7E,YAAY,CAAC,CAAC;YACd,cAAc,CAAC;QACjB,MAAM,uBAAuB,GAAG,aAAa,CAAC,uBAAuB,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;QAC7F,MAAM,oBAAoB,GAAG,IAAI,8BAAoB,EAAE,CAAC;QACxD,yBAAyB,CAAC,YAAY,CAAC,oBAAoB,EAAE;YAC3D,kBAAkB,EAAE;gBAClB,0DAA0D;gBAC1D,8DAA8D;gBAC9D,oBAAoB,CAAC,GAAG;gBACxB,GAAG,uBAAuB;aAC3B;SACF,CAAC,CAAC;QAEH,MAAM,CAAC,aAAa;QAClB,6FAA6F;QAC7F,IAAI,yBAAe,CAAC;YAClB,GAAG,EAAE,4CAAoC;YACzC,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,UAAU,EAAE,CAAC,oBAAoB,CAAC;YAClC,OAAO,EAAE,CAAC,OAAO,CAAC;YAClB,SAAS,EAAE,YAAY;SACxB,CAAC,EACA,yBAAyB,CAC5B,CAAC;IACJ,CAAC;SAAM,CAAC;QAEN,+CAA+C;QAC/C,EAAE;QACF,8EAA8E;QAC9E,0FAA0F;QAC1F,EAAE;QACF,0GAA0G;QAC1G,8DAA8D;QAC9D,iEAAiE;QACjE,+EAA+E;QAC/E,8DAA8D;QAC9D,EAAE;QAEF,qEAAqE;IACvE,CAAC;IAED,MAAM,CAAC,yBAAyB,EAAE,CAAC;IAEnC,OAAO,MAAM,CAAC;AAChB,CAAC;AA9FD,sCA8FC","sourcesContent":["import * as iam from 'aws-cdk-lib/aws-iam';\nimport {\n  AccountRootPrincipal, AnyPrincipal,\n  Conditions,\n  Effect,\n  PolicyDocument,\n  PolicyStatement,\n  ServicePrincipal,\n} from 'aws-cdk-lib/aws-iam';\nimport {\n  AccessCapability,\n  canPrincipalsManageResources,\n  getAccessCapabilityFromValue,\n  IAccessSpec,\n  IAWSServiceAccessGenerator,\n  K9PolicyFactory,\n} from './k9policy';\n\nexport interface K9KeyPolicyProps {\n  readonly k9DesiredAccess: Array<IAccessSpec>;\n  readonly trustAccountIdentities?: boolean;\n  /**\n   * An (optional) array of IAWSServiceAccessGenerator instances which will generate statements to allow access to the\n   * key by an AWS service like CloudFront or Kinesis.\n   *\n   * @default undefined\n   */\n  readonly awsServiceAccessGenerators?: Array<IAWSServiceAccessGenerator>;\n}\n\nlet SUPPORTED_CAPABILITIES = new Array<AccessCapability>(\n  AccessCapability.ADMINISTER_RESOURCE,\n  AccessCapability.READ_CONFIG,\n  AccessCapability.READ_DATA,\n  AccessCapability.WRITE_DATA,\n  AccessCapability.DELETE_DATA,\n);\n\nexport const SID_ALLOW_ROOT_AND_IDENTITY_POLICIES = 'Allow Root User to Administer Key And Identity Policies';\nexport const SID_DENY_EVERYONE_ELSE = 'DenyEveryoneElse';\n\n/**\n * Generate key policy statements to enable the CloudFront service to read encrypted S3 bucket object data (only)\n * from within a <a href=\"https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-restricting-access-to-s3.html#sse-kms\">CloudFront OAC integration</a>.\n */\nexport class CloudFrontOACReadAccessGenerator implements IAWSServiceAccessGenerator {\n\n  static readonly SID_ALLOW_CLOUDFRONT_SVC_READ_DATA = 'Allow CloudFront Service read-data';\n  static readonly SID_ALLOW_CLOUDFRONT_IAM_ROLE_READ_DATA = 'Allow CloudFront IAM role read-data';\n\n  readonly distributionArn: string;\n\n  constructor(distributionArn: string) {\n    this.distributionArn = distributionArn;\n  }\n\n  makeAllowStatements(): Array<PolicyStatement> {\n    return [new PolicyStatement({\n      sid: CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_SVC_READ_DATA,\n      effect: Effect.ALLOW,\n      principals: [new ServicePrincipal('cloudfront.amazonaws.com')],\n      actions: ['kms:Decrypt'],\n      resources: ['*'],\n      conditions: {\n        StringEquals: { 'aws:SourceArn': this.distributionArn },\n      },\n    }),\n    new PolicyStatement({\n      sid: CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_IAM_ROLE_READ_DATA,\n      effect: Effect.ALLOW,\n      principals: [new AnyPrincipal()],\n      actions: ['kms:Decrypt'],\n      resources: ['*'],\n      conditions: {\n        // use ArnEquals condition instead of a plain Principal element in case\n        // the CloudFront service recreates the role.\n        // conditions bind against the principal ARN at runtime.\n        // the principal element binds (once) to the principal's canonical userid at policy definition time.\n        ArnEquals: {\n          'aws:PrincipalArn': 'arn:aws:iam::856369053181:role/OriginAccessControlRole',\n        },\n      },\n    })];\n  }\n\n  makeConditionsToExceptFromDenyEveryoneElse(): Conditions {\n    // return a (TypeScript) Record of the form:\n    //     {\"Operator\": { \"keyInRequestContext\": \"value\" } }\n    return { StringNotEqualsIfExists: { 'aws:PrincipalServiceName': 'cloudfront.amazonaws.com' } };\n  }\n}\n\n\nexport function makeKeyPolicy(props: K9KeyPolicyProps): PolicyDocument {\n  const policyFactory = new K9PolicyFactory();\n  const policy = new iam.PolicyDocument();\n\n  const resourceArns = ['*'];\n\n  let accessSpecsByCapabilityRecs = policyFactory.mergeDesiredAccessSpecsByCapability(SUPPORTED_CAPABILITIES, props.k9DesiredAccess);\n  let accessSpecsByCapability: Map<AccessCapability, IAccessSpec> = new Map();\n\n  for (let [capabilityStr, accessSpec] of Object.entries(accessSpecsByCapabilityRecs)) {\n    accessSpecsByCapability.set(getAccessCapabilityFromValue(capabilityStr), accessSpec);\n  }\n\n  if (!canPrincipalsManageResources(accessSpecsByCapability)) {\n    throw Error('At least one principal must be able to administer and read-config for keys' +\n            ' so encrypted data remains accessible; found:\\n' +\n            `administer-resource: '${accessSpecsByCapability.get(AccessCapability.ADMINISTER_RESOURCE)?.allowPrincipalArns}'\\n` +\n            `read-config: '${accessSpecsByCapability.get(AccessCapability.READ_CONFIG)?.allowPrincipalArns}'`,\n    );\n  }\n\n  const allowStatements = policyFactory.makeAllowStatements('KMS',\n    SUPPORTED_CAPABILITIES,\n    Array.from(accessSpecsByCapability.values()),\n    resourceArns);\n  policy.addStatements(...allowStatements);\n\n  if (props.awsServiceAccessGenerators) {\n    for (let serviceAccessSpec of props.awsServiceAccessGenerators) {\n      policy.addStatements(...serviceAccessSpec.makeAllowStatements());\n    }\n  }\n\n  //console.log(`trustAccountIdentities: ${props.trustAccountIdentities}`);\n\n  // Allow root user and control access via Identity policy by aligning to Key's behavior:\n  if (props.trustAccountIdentities) {\n    //console.log('Adding Allow root and DenyEveryoneElse statements');\n    const denyEveryoneElseStatement = new PolicyStatement({\n      sid: SID_DENY_EVERYONE_ELSE,\n      effect: Effect.DENY,\n      principals: policyFactory.makeDenyEveryoneElsePrincipals(),\n      actions: ['kms:*'],\n      resources: resourceArns,\n    });\n    denyEveryoneElseStatement.addCondition('Bool', {\n      'aws:PrincipalIsAWSService': ['false'],\n      'kms:GrantIsForAWSResource': ['false'],\n    });\n    const denyEveryoneElseTest = policyFactory.wasLikeUsed(props.k9DesiredAccess) ?\n      'ArnNotLike' :\n      'ArnNotEquals';\n    const allAllowedPrincipalArns = policyFactory.getAllowedPrincipalArns(props.k9DesiredAccess);\n    const accountRootPrincipal = new AccountRootPrincipal();\n    denyEveryoneElseStatement.addCondition(denyEveryoneElseTest, {\n      'aws:PrincipalArn': [\n        // Place Root Principal arn in stable, prominent position;\n        // will render as an object Fn::Join'ing Partition & AccountId\n        accountRootPrincipal.arn,\n        ...allAllowedPrincipalArns,\n      ],\n    });\n\n    policy.addStatements(\n      // add AllowRootUserToAdministerKey statement and enable access granted via Identity policies\n      new PolicyStatement({\n        sid: SID_ALLOW_ROOT_AND_IDENTITY_POLICIES,\n        effect: Effect.ALLOW,\n        principals: [accountRootPrincipal],\n        actions: ['kms:*'],\n        resources: resourceArns,\n      })\n      , denyEveryoneElseStatement,\n    );\n  } else {\n\n    // Omit Allow Root & DenyEveryoneElse statement\n    //\n    // Instead, implement least privilege by relying on KMS' special behavior that\n    // enables granting access solely via a KMS key policy, *irrespective of* Identity policy.\n    //\n    // See: https://docs.aws.amazon.com/kms/latest/developerguide/control-access-overview.html#managing-access\n    // \"To allow access to a KMS key, you must use the key policy,\n    //  *either alone* or in combination with IAM policies or grants.\n    //  IAM policies by themselves are not sufficient to allow access to a KMS key,\n    //  though you can use them in combination with a key policy.\"\n    //\n\n    //console.log('Omitting Allow root and DenyEveryoneElse statements');\n  }\n\n  policy.validateForResourcePolicy();\n\n  return policy;\n}\n"]}