@@ -15,7 +15,7 @@ resource "aws_sns_topic" "alarms" {
15
15
# --------------------------------------------------------------------------------------------------
16
16
17
17
resource "aws_cloudwatch_log_metric_filter" "unauthorized_api_calls" {
18
- count = var. enabled ? 1 : 0
18
+ count = var. enabled && var . unauthorized_api_calls_enabled ? 1 : 0
19
19
20
20
name = " UnauthorizedAPICalls"
21
21
pattern = " { ($.errorCode = \" *UnauthorizedOperation\" ) || ($.errorCode = \" AccessDenied*\" ) }"
@@ -29,7 +29,7 @@ resource "aws_cloudwatch_log_metric_filter" "unauthorized_api_calls" {
29
29
}
30
30
31
31
resource "aws_cloudwatch_metric_alarm" "unauthorized_api_calls" {
32
- count = var. enabled ? 1 : 0
32
+ count = var. enabled && var . unauthorized_api_calls_enabled ? 1 : 0
33
33
34
34
alarm_name = " UnauthorizedAPICalls"
35
35
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -48,7 +48,7 @@ resource "aws_cloudwatch_metric_alarm" "unauthorized_api_calls" {
48
48
}
49
49
50
50
resource "aws_cloudwatch_log_metric_filter" "no_mfa_console_signin" {
51
- count = var. enabled ? 1 : 0
51
+ count = var. enabled && var . no_mfa_console_signin_enabled ? 1 : 0
52
52
53
53
name = " NoMFAConsoleSignin"
54
54
pattern = " { ($.eventName = \" ConsoleLogin\" ) && ($.additionalEventData.MFAUsed != \" Yes\" ) }"
@@ -62,7 +62,7 @@ resource "aws_cloudwatch_log_metric_filter" "no_mfa_console_signin" {
62
62
}
63
63
64
64
resource "aws_cloudwatch_metric_alarm" "no_mfa_console_signin" {
65
- count = var. enabled ? 1 : 0
65
+ count = var. enabled && var . no_mfa_console_signin_enabled ? 1 : 0
66
66
67
67
alarm_name = " NoMFAConsoleSignin"
68
68
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -81,7 +81,7 @@ resource "aws_cloudwatch_metric_alarm" "no_mfa_console_signin" {
81
81
}
82
82
83
83
resource "aws_cloudwatch_log_metric_filter" "root_usage" {
84
- count = var. enabled ? 1 : 0
84
+ count = var. enabled && var . root_usage_enabled ? 1 : 0
85
85
86
86
name = " RootUsage"
87
87
pattern = " { $.userIdentity.type = \" Root\" && $.userIdentity.invokedBy NOT EXISTS && $.eventType != \" AwsServiceEvent\" }"
@@ -95,7 +95,7 @@ resource "aws_cloudwatch_log_metric_filter" "root_usage" {
95
95
}
96
96
97
97
resource "aws_cloudwatch_metric_alarm" "root_usage" {
98
- count = var. enabled ? 1 : 0
98
+ count = var. enabled && var . root_usage_enabled ? 1 : 0
99
99
100
100
alarm_name = " RootUsage"
101
101
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -114,7 +114,7 @@ resource "aws_cloudwatch_metric_alarm" "root_usage" {
114
114
}
115
115
116
116
resource "aws_cloudwatch_log_metric_filter" "iam_changes" {
117
- count = var. enabled ? 1 : 0
117
+ count = var. enabled && var . iam_changes_enabled ? 1 : 0
118
118
119
119
name = " IAMChanges"
120
120
pattern = " {($.eventName=DeleteGroupPolicy)||($.eventName=DeleteRolePolicy)||($.eventName=DeleteUserPolicy)||($.eventName=PutGroupPolicy)||($.eventName=PutRolePolicy)||($.eventName=PutUserPolicy)||($.eventName=CreatePolicy)||($.eventName=DeletePolicy)||($.eventName=CreatePolicyVersion)||($.eventName=DeletePolicyVersion)||($.eventName=AttachRolePolicy)||($.eventName=DetachRolePolicy)||($.eventName=AttachUserPolicy)||($.eventName=DetachUserPolicy)||($.eventName=AttachGroupPolicy)||($.eventName=DetachGroupPolicy)}"
@@ -128,7 +128,7 @@ resource "aws_cloudwatch_log_metric_filter" "iam_changes" {
128
128
}
129
129
130
130
resource "aws_cloudwatch_metric_alarm" "iam_changes" {
131
- count = var. enabled ? 1 : 0
131
+ count = var. enabled && var . iam_changes_enabled ? 1 : 0
132
132
133
133
alarm_name = " IAMChanges"
134
134
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -147,7 +147,7 @@ resource "aws_cloudwatch_metric_alarm" "iam_changes" {
147
147
}
148
148
149
149
resource "aws_cloudwatch_log_metric_filter" "cloudtrail_cfg_changes" {
150
- count = var. enabled ? 1 : 0
150
+ count = var. enabled && var . cloudtrail_cfg_changes_enabled ? 1 : 0
151
151
152
152
name = " CloudTrailCfgChanges"
153
153
pattern = " { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) }"
@@ -161,7 +161,7 @@ resource "aws_cloudwatch_log_metric_filter" "cloudtrail_cfg_changes" {
161
161
}
162
162
163
163
resource "aws_cloudwatch_metric_alarm" "cloudtrail_cfg_changes" {
164
- count = var. enabled ? 1 : 0
164
+ count = var. enabled && var . cloudtrail_cfg_changes_enabled ? 1 : 0
165
165
166
166
alarm_name = " CloudTrailCfgChanges"
167
167
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -180,7 +180,7 @@ resource "aws_cloudwatch_metric_alarm" "cloudtrail_cfg_changes" {
180
180
}
181
181
182
182
resource "aws_cloudwatch_log_metric_filter" "console_signin_failures" {
183
- count = var. enabled ? 1 : 0
183
+ count = var. enabled && var . console_signin_failures_enabled ? 1 : 0
184
184
185
185
name = " ConsoleSigninFailures"
186
186
pattern = " { ($.eventName = ConsoleLogin) && ($.errorMessage = \" Failed authentication\" ) }"
@@ -194,7 +194,7 @@ resource "aws_cloudwatch_log_metric_filter" "console_signin_failures" {
194
194
}
195
195
196
196
resource "aws_cloudwatch_metric_alarm" "console_signin_failures" {
197
- count = var. enabled ? 1 : 0
197
+ count = var. enabled && var . console_signin_failures_enabled ? 1 : 0
198
198
199
199
alarm_name = " ConsoleSigninFailures"
200
200
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -213,7 +213,7 @@ resource "aws_cloudwatch_metric_alarm" "console_signin_failures" {
213
213
}
214
214
215
215
resource "aws_cloudwatch_log_metric_filter" "disable_or_delete_cmk" {
216
- count = var. enabled ? 1 : 0
216
+ count = var. enabled && var . disable_or_delete_cmk_enabled ? 1 : 0
217
217
218
218
name = " DisableOrDeleteCMK"
219
219
pattern = " { ($.eventSource = kms.amazonaws.com) && (($.eventName = DisableKey) || ($.eventName = ScheduleKeyDeletion)) }"
@@ -227,7 +227,7 @@ resource "aws_cloudwatch_log_metric_filter" "disable_or_delete_cmk" {
227
227
}
228
228
229
229
resource "aws_cloudwatch_metric_alarm" "disable_or_delete_cmk" {
230
- count = var. enabled ? 1 : 0
230
+ count = var. enabled && var . disable_or_delete_cmk_enabled ? 1 : 0
231
231
232
232
alarm_name = " DisableOrDeleteCMK"
233
233
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -246,7 +246,7 @@ resource "aws_cloudwatch_metric_alarm" "disable_or_delete_cmk" {
246
246
}
247
247
248
248
resource "aws_cloudwatch_log_metric_filter" "s3_bucket_policy_changes" {
249
- count = var. enabled ? 1 : 0
249
+ count = var. enabled && var . s3_bucket_policy_changes_enabled ? 1 : 0
250
250
251
251
name = " S3BucketPolicyChanges"
252
252
pattern = " { ($.eventSource = s3.amazonaws.com) && (($.eventName = PutBucketAcl) || ($.eventName = PutBucketPolicy) || ($.eventName = PutBucketCors) || ($.eventName = PutBucketLifecycle) || ($.eventName = PutBucketReplication) || ($.eventName = DeleteBucketPolicy) || ($.eventName = DeleteBucketCors) || ($.eventName = DeleteBucketLifecycle) || ($.eventName = DeleteBucketReplication)) }"
@@ -260,7 +260,7 @@ resource "aws_cloudwatch_log_metric_filter" "s3_bucket_policy_changes" {
260
260
}
261
261
262
262
resource "aws_cloudwatch_metric_alarm" "s3_bucket_policy_changes" {
263
- count = var. enabled ? 1 : 0
263
+ count = var. enabled && var . s3_bucket_policy_changes_enabled ? 1 : 0
264
264
265
265
alarm_name = " S3BucketPolicyChanges"
266
266
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -279,7 +279,7 @@ resource "aws_cloudwatch_metric_alarm" "s3_bucket_policy_changes" {
279
279
}
280
280
281
281
resource "aws_cloudwatch_log_metric_filter" "aws_config_changes" {
282
- count = var. enabled ? 1 : 0
282
+ count = var. enabled && var . aws_config_changes_enabled ? 1 : 0
283
283
284
284
name = " AWSConfigChanges"
285
285
pattern = " { ($.eventSource = config.amazonaws.com) && (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) }"
@@ -293,7 +293,7 @@ resource "aws_cloudwatch_log_metric_filter" "aws_config_changes" {
293
293
}
294
294
295
295
resource "aws_cloudwatch_metric_alarm" "aws_config_changes" {
296
- count = var. enabled ? 1 : 0
296
+ count = var. enabled && var . aws_config_changes_enabled ? 1 : 0
297
297
298
298
alarm_name = " AWSConfigChanges"
299
299
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -312,7 +312,7 @@ resource "aws_cloudwatch_metric_alarm" "aws_config_changes" {
312
312
}
313
313
314
314
resource "aws_cloudwatch_log_metric_filter" "security_group_changes" {
315
- count = var. enabled ? 1 : 0
315
+ count = var. enabled && var . security_group_changes_enabled ? 1 : 0
316
316
317
317
name = " SecurityGroupChanges"
318
318
pattern = " { ($.eventName = AuthorizeSecurityGroupIngress) || ($.eventName = AuthorizeSecurityGroupEgress) || ($.eventName = RevokeSecurityGroupIngress) || ($.eventName = RevokeSecurityGroupEgress) || ($.eventName = CreateSecurityGroup) || ($.eventName = DeleteSecurityGroup)}"
@@ -326,7 +326,7 @@ resource "aws_cloudwatch_log_metric_filter" "security_group_changes" {
326
326
}
327
327
328
328
resource "aws_cloudwatch_metric_alarm" "security_group_changes" {
329
- count = var. enabled ? 1 : 0
329
+ count = var. enabled && var . security_group_changes_enabled ? 1 : 0
330
330
331
331
alarm_name = " SecurityGroupChanges"
332
332
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -345,7 +345,7 @@ resource "aws_cloudwatch_metric_alarm" "security_group_changes" {
345
345
}
346
346
347
347
resource "aws_cloudwatch_log_metric_filter" "nacl_changes" {
348
- count = var. enabled ? 1 : 0
348
+ count = var. enabled && var . nacl_changes_enabled ? 1 : 0
349
349
350
350
name = " NACLChanges"
351
351
pattern = " { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) }"
@@ -359,7 +359,7 @@ resource "aws_cloudwatch_log_metric_filter" "nacl_changes" {
359
359
}
360
360
361
361
resource "aws_cloudwatch_metric_alarm" "nacl_changes" {
362
- count = var. enabled ? 1 : 0
362
+ count = var. enabled && var . nacl_changes_enabled ? 1 : 0
363
363
364
364
alarm_name = " NACLChanges"
365
365
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -378,7 +378,7 @@ resource "aws_cloudwatch_metric_alarm" "nacl_changes" {
378
378
}
379
379
380
380
resource "aws_cloudwatch_log_metric_filter" "network_gw_changes" {
381
- count = var. enabled ? 1 : 0
381
+ count = var. enabled && var . network_gw_changes_enabled ? 1 : 0
382
382
383
383
name = " NetworkGWChanges"
384
384
pattern = " { ($.eventName = CreateCustomerGateway) || ($.eventName = DeleteCustomerGateway) || ($.eventName = AttachInternetGateway) || ($.eventName = CreateInternetGateway) || ($.eventName = DeleteInternetGateway) || ($.eventName = DetachInternetGateway) }"
@@ -392,7 +392,7 @@ resource "aws_cloudwatch_log_metric_filter" "network_gw_changes" {
392
392
}
393
393
394
394
resource "aws_cloudwatch_metric_alarm" "network_gw_changes" {
395
- count = var. enabled ? 1 : 0
395
+ count = var. enabled && var . network_gw_changes_enabled ? 1 : 0
396
396
397
397
alarm_name = " NetworkGWChanges"
398
398
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -411,7 +411,7 @@ resource "aws_cloudwatch_metric_alarm" "network_gw_changes" {
411
411
}
412
412
413
413
resource "aws_cloudwatch_log_metric_filter" "route_table_changes" {
414
- count = var. enabled ? 1 : 0
414
+ count = var. enabled && var . route_table_changes_enabled ? 1 : 0
415
415
416
416
name = " RouteTableChanges"
417
417
pattern = " { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) }"
@@ -425,7 +425,7 @@ resource "aws_cloudwatch_log_metric_filter" "route_table_changes" {
425
425
}
426
426
427
427
resource "aws_cloudwatch_metric_alarm" "route_table_changes" {
428
- count = var. enabled ? 1 : 0
428
+ count = var. enabled && var . route_table_changes_enabled ? 1 : 0
429
429
430
430
alarm_name = " RouteTableChanges"
431
431
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -444,7 +444,7 @@ resource "aws_cloudwatch_metric_alarm" "route_table_changes" {
444
444
}
445
445
446
446
resource "aws_cloudwatch_log_metric_filter" "vpc_changes" {
447
- count = var. enabled ? 1 : 0
447
+ count = var. enabled && var . vpc_changes_enabled ? 1 : 0
448
448
449
449
name = " VPCChanges"
450
450
pattern = " { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) }"
@@ -458,7 +458,7 @@ resource "aws_cloudwatch_log_metric_filter" "vpc_changes" {
458
458
}
459
459
460
460
resource "aws_cloudwatch_metric_alarm" "vpc_changes" {
461
- count = var. enabled ? 1 : 0
461
+ count = var. enabled && var . vpc_changes_enabled ? 1 : 0
462
462
463
463
alarm_name = " VPCChanges"
464
464
comparison_operator = " GreaterThanOrEqualToThreshold"
@@ -477,7 +477,7 @@ resource "aws_cloudwatch_metric_alarm" "vpc_changes" {
477
477
}
478
478
479
479
resource "aws_cloudwatch_log_metric_filter" "organizations_changes" {
480
- count = var. enabled ? 1 : 0
480
+ count = var. enabled && var . organizations_changes_enabled ? 1 : 0
481
481
482
482
name = " OrganizationsChanges"
483
483
pattern = " { ($.eventSource = organizations.amazonaws.com) && (($.eventName = \" AcceptHandshake\" ) || ($.eventName = \" AttachPolicy\" ) || ($.eventName = \" CreateAccount\" ) || ($.eventName = \" CreateOrganizationalUnit\" ) || ($.eventName= \" CreatePolicy\" ) || ($.eventName = \" DeclineHandshake\" ) || ($.eventName = \" DeleteOrganization\" ) || ($.eventName = \" DeleteOrganizationalUnit\" ) || ($.eventName = \" DeletePolicy\" ) || ($.eventName = \" DetachPolicy\" ) || ($.eventName = \" DisablePolicyType\" ) || ($.eventName = \" EnablePolicyType\" ) || ($.eventName = \" InviteAccountToOrganization\" ) || ($.eventName = \" LeaveOrganization\" ) || ($.eventName = \" MoveAccount\" ) || ($.eventName = \" RemoveAccountFromOrganization\" ) || ($.eventName = \" UpdatePolicy\" ) || ($.eventName =\" UpdateOrganizationalUnit\" )) }"
@@ -491,7 +491,7 @@ resource "aws_cloudwatch_log_metric_filter" "organizations_changes" {
491
491
}
492
492
493
493
resource "aws_cloudwatch_metric_alarm" "organizations_changes" {
494
- count = var. enabled ? 1 : 0
494
+ count = var. enabled && var . organizations_changes_enabled ? 1 : 0
495
495
496
496
alarm_name = " OrganizationsChanges"
497
497
comparison_operator = " GreaterThanOrEqualToThreshold"
0 commit comments