From 76e37fff86715dace7576ae2ff684e80cd0a3926 Mon Sep 17 00:00:00 2001 From: --global Date: Thu, 14 Sep 2023 15:50:25 +0500 Subject: [PATCH 1/3] added tiggers for f,g,h and connect --- plugins/aws/connect/customerProfilesDomainEncrypted.js | 1 + plugins/aws/connect/instanceAttachmentsEncrypted.js | 1 + plugins/aws/connect/instanceCallRecordingEncrypted.js | 2 ++ plugins/aws/connect/instanceMediaStreamsEncrypted.js | 1 + plugins/aws/connect/instanceReportsEncrypted.js | 1 + plugins/aws/connect/instanceTranscriptsEncrypted.js | 1 + plugins/aws/connect/voiceIdDomainEncrypted.js | 1 + plugins/aws/connect/wisdomDomainEncrypted.js | 1 + plugins/aws/finspace/finspaceEnvironmentEncrypted.js | 1 + plugins/aws/firehose/deliveryStreamEncrypted.js | 1 + plugins/aws/firehose/firehoseEncrypted.js | 1 + plugins/aws/forecast/datasetExportEncrypted.js | 1 + plugins/aws/forecast/forecastDatasetEncrypted.js | 2 ++ plugins/aws/frauddetector/fraudDetectorDataEncrypted.js | 1 + plugins/aws/fsx/fsxFileSystemEncrypted.js | 2 ++ plugins/aws/glue/bookmarkEncryptionEnabled.js | 1 + plugins/aws/glue/dataCatalogCmkEncrypted.js | 1 + plugins/aws/glue/glueCloudwatchLogsEncrypted.js | 1 + plugins/aws/glue/glueS3EncryptionEnabled.js | 1 + plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js | 1 + plugins/aws/guardduty/exportedFindingsEncrypted.js | 1 + plugins/aws/guardduty/guarddutyEnabled.js | 1 + plugins/aws/guardduty/guarddutyMaster.js | 1 + plugins/aws/guardduty/noActiveFindings.js | 1 + plugins/aws/guardduty/s3ProtectionEnabled.js | 3 ++- plugins/aws/healthlake/dataStoreEncrypted.js | 1 + 26 files changed, 30 insertions(+), 1 deletion(-) diff --git a/plugins/aws/connect/customerProfilesDomainEncrypted.js b/plugins/aws/connect/customerProfilesDomainEncrypted.js index c7341479e1..fedef11522 100644 --- a/plugins/aws/connect/customerProfilesDomainEncrypted.js +++ b/plugins/aws/connect/customerProfilesDomainEncrypted.js @@ -18,6 +18,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['customerprofiles:CreateDomain', 'customerprofiles:UpdateDomain'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/instanceAttachmentsEncrypted.js b/plugins/aws/connect/instanceAttachmentsEncrypted.js index 044894f6b3..2bfbed1ae7 100644 --- a/plugins/aws/connect/instanceAttachmentsEncrypted.js +++ b/plugins/aws/connect/instanceAttachmentsEncrypted.js @@ -19,6 +19,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/instanceCallRecordingEncrypted.js b/plugins/aws/connect/instanceCallRecordingEncrypted.js index e5f6c84901..05e49a7fa2 100644 --- a/plugins/aws/connect/instanceCallRecordingEncrypted.js +++ b/plugins/aws/connect/instanceCallRecordingEncrypted.js @@ -19,6 +19,8 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], + run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/instanceMediaStreamsEncrypted.js b/plugins/aws/connect/instanceMediaStreamsEncrypted.js index 0b3ff40a84..3f8246d899 100644 --- a/plugins/aws/connect/instanceMediaStreamsEncrypted.js +++ b/plugins/aws/connect/instanceMediaStreamsEncrypted.js @@ -19,6 +19,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/instanceReportsEncrypted.js b/plugins/aws/connect/instanceReportsEncrypted.js index b40a127136..1a8ec48222 100644 --- a/plugins/aws/connect/instanceReportsEncrypted.js +++ b/plugins/aws/connect/instanceReportsEncrypted.js @@ -19,6 +19,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/instanceTranscriptsEncrypted.js b/plugins/aws/connect/instanceTranscriptsEncrypted.js index 791b8c886b..fec487e987 100644 --- a/plugins/aws/connect/instanceTranscriptsEncrypted.js +++ b/plugins/aws/connect/instanceTranscriptsEncrypted.js @@ -19,6 +19,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/voiceIdDomainEncrypted.js b/plugins/aws/connect/voiceIdDomainEncrypted.js index f3c7324898..3d63b606a0 100644 --- a/plugins/aws/connect/voiceIdDomainEncrypted.js +++ b/plugins/aws/connect/voiceIdDomainEncrypted.js @@ -22,6 +22,7 @@ module.exports = { default: 'awskms' } }, + realtime_triggers: ['voiceid:CreateDomain', 'voiceid:UpdateDomain'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/wisdomDomainEncrypted.js b/plugins/aws/connect/wisdomDomainEncrypted.js index d757207d95..a7f1e149ee 100644 --- a/plugins/aws/connect/wisdomDomainEncrypted.js +++ b/plugins/aws/connect/wisdomDomainEncrypted.js @@ -22,6 +22,7 @@ module.exports = { default: 'awskms' } }, + realtime_triggers: ['wisdom:CreateAssistant'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/finspace/finspaceEnvironmentEncrypted.js b/plugins/aws/finspace/finspaceEnvironmentEncrypted.js index 7a3e6dadeb..0cf83b46f8 100644 --- a/plugins/aws/finspace/finspaceEnvironmentEncrypted.js +++ b/plugins/aws/finspace/finspaceEnvironmentEncrypted.js @@ -19,6 +19,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['finspace:CreateEnnviromennt'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/firehose/deliveryStreamEncrypted.js b/plugins/aws/firehose/deliveryStreamEncrypted.js index 203250bca8..c14bc2f6e1 100644 --- a/plugins/aws/firehose/deliveryStreamEncrypted.js +++ b/plugins/aws/firehose/deliveryStreamEncrypted.js @@ -20,6 +20,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['firehose:UpdateDestination'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/firehose/firehoseEncrypted.js b/plugins/aws/firehose/firehoseEncrypted.js index 3340988ead..1d69545d2a 100644 --- a/plugins/aws/firehose/firehoseEncrypted.js +++ b/plugins/aws/firehose/firehoseEncrypted.js @@ -17,6 +17,7 @@ module.exports = { 'AWS KMS encryption ensures that the Firehose payload meets the ' + 'encryption in transit and at rest requirements of HIPAA.' }, + realtime_triggers: ['firehose:StartDeliveryStreamEncryption', 'kinesis:StartStreamEncryption'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/forecast/datasetExportEncrypted.js b/plugins/aws/forecast/datasetExportEncrypted.js index afa8e9c6d8..4161ae839f 100644 --- a/plugins/aws/forecast/datasetExportEncrypted.js +++ b/plugins/aws/forecast/datasetExportEncrypted.js @@ -18,6 +18,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['forecast:CreateForecastExportJob'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/forecast/forecastDatasetEncrypted.js b/plugins/aws/forecast/forecastDatasetEncrypted.js index 4bb1eaeb98..742d74ba3d 100644 --- a/plugins/aws/forecast/forecastDatasetEncrypted.js +++ b/plugins/aws/forecast/forecastDatasetEncrypted.js @@ -19,6 +19,8 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['forecastservice:CreateDataset'], + run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/frauddetector/fraudDetectorDataEncrypted.js b/plugins/aws/frauddetector/fraudDetectorDataEncrypted.js index 73933815e4..ca4de0ea64 100644 --- a/plugins/aws/frauddetector/fraudDetectorDataEncrypted.js +++ b/plugins/aws/frauddetector/fraudDetectorDataEncrypted.js @@ -18,6 +18,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['frauddetector:PutKMSEncryptionKey'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/fsx/fsxFileSystemEncrypted.js b/plugins/aws/fsx/fsxFileSystemEncrypted.js index 0e1de5f3db..8741ee2dc5 100644 --- a/plugins/aws/fsx/fsxFileSystemEncrypted.js +++ b/plugins/aws/fsx/fsxFileSystemEncrypted.js @@ -18,6 +18,8 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['fsx:CreateFileSystem'], + run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/glue/bookmarkEncryptionEnabled.js b/plugins/aws/glue/bookmarkEncryptionEnabled.js index e37c3bfd19..01d98e8c5f 100644 --- a/plugins/aws/glue/bookmarkEncryptionEnabled.js +++ b/plugins/aws/glue/bookmarkEncryptionEnabled.js @@ -10,6 +10,7 @@ module.exports = { recommended_action: 'Recreate Glue security configurations and enable job bookmark encryption', link: 'https://docs.aws.amazon.com/glue/latest/dg/console-security-configurations.html', apis: ['Glue:getSecurityConfigurations', 'STS:getCallerIdentity'], + realtime_triggers: ['glue:CreateSecurityConfiguration'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/glue/dataCatalogCmkEncrypted.js b/plugins/aws/glue/dataCatalogCmkEncrypted.js index 4834134bf9..4f162a0399 100644 --- a/plugins/aws/glue/dataCatalogCmkEncrypted.js +++ b/plugins/aws/glue/dataCatalogCmkEncrypted.js @@ -10,6 +10,7 @@ module.exports = { recommended_action: 'Modify Glue data catalog to use CMK instead of AWS-managed Key to encrypt Metadata', link: 'https://docs.aws.amazon.com/glue/latest/dg/encrypt-glue-data-catalog.html', apis: ['Glue:getDataCatalogEncryptionSettings', 'KMS:listKeys', 'KMS:describeKey'], + realtime_triggers: ['glue:PutDataCatalogEncryptionSettings'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/glue/glueCloudwatchLogsEncrypted.js b/plugins/aws/glue/glueCloudwatchLogsEncrypted.js index d6a9f26bcc..15be118c76 100644 --- a/plugins/aws/glue/glueCloudwatchLogsEncrypted.js +++ b/plugins/aws/glue/glueCloudwatchLogsEncrypted.js @@ -10,6 +10,7 @@ module.exports = { recommended_action: 'Modify Glue Security Configurations to enable CloudWatch logs encryption at-rest', link: 'https://docs.aws.amazon.com/glue/latest/dg/console-security-configurations.html', apis: ['Glue:getSecurityConfigurations', 'STS:getCallerIdentity'], + realtime_triggers: ['glue:CreateSecurityConfiguration'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/glue/glueS3EncryptionEnabled.js b/plugins/aws/glue/glueS3EncryptionEnabled.js index ad4dd82f8c..60a74c9cc0 100644 --- a/plugins/aws/glue/glueS3EncryptionEnabled.js +++ b/plugins/aws/glue/glueS3EncryptionEnabled.js @@ -18,6 +18,7 @@ module.exports = { default: 'awscmk', } }, + realtime_triggers: ['glue:CreateSecurityConfiguration'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js b/plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js index 3ce1c9fb58..64b37025d0 100644 --- a/plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js +++ b/plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js @@ -18,6 +18,7 @@ module.exports = { default: 'awscmk', } }, + realtime_triggers: ['databrew:CreateRecipeJob', 'databrew:UpdateRecipeJob'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/guardduty/exportedFindingsEncrypted.js b/plugins/aws/guardduty/exportedFindingsEncrypted.js index 11adb8fcb7..3585989616 100644 --- a/plugins/aws/guardduty/exportedFindingsEncrypted.js +++ b/plugins/aws/guardduty/exportedFindingsEncrypted.js @@ -19,6 +19,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['guardduty:CreateDetector'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/guardduty/guarddutyEnabled.js b/plugins/aws/guardduty/guarddutyEnabled.js index fb85846c5b..ffd4dd65b4 100644 --- a/plugins/aws/guardduty/guarddutyEnabled.js +++ b/plugins/aws/guardduty/guarddutyEnabled.js @@ -10,6 +10,7 @@ module.exports = { recommended_action: 'Enable GuardDuty for all AWS accounts.', link: 'https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html', apis: ['GuardDuty:listDetectors', 'GuardDuty:getDetector', 'STS:getCallerIdentity'], + realtime_triggers: ['guardduty:CreateDetector'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/guardduty/guarddutyMaster.js b/plugins/aws/guardduty/guarddutyMaster.js index 9ae9b96931..7354f3a721 100644 --- a/plugins/aws/guardduty/guarddutyMaster.js +++ b/plugins/aws/guardduty/guarddutyMaster.js @@ -18,6 +18,7 @@ module.exports = { default: '', }, }, + realtime_triggers: ['guardduty:CreateDetector', 'guardduty:CreateMembers'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/guardduty/noActiveFindings.js b/plugins/aws/guardduty/noActiveFindings.js index b928b275ef..9230ca27a5 100644 --- a/plugins/aws/guardduty/noActiveFindings.js +++ b/plugins/aws/guardduty/noActiveFindings.js @@ -20,6 +20,7 @@ module.exports = { default: '48' } }, + realtime_triggers: ['guardduty:CreateDetector', 'guardduty:ArchiveFindings'], run: function(cache, settings, callback) { const results = []; diff --git a/plugins/aws/guardduty/s3ProtectionEnabled.js b/plugins/aws/guardduty/s3ProtectionEnabled.js index b5e8008c40..76cdf1ad85 100644 --- a/plugins/aws/guardduty/s3ProtectionEnabled.js +++ b/plugins/aws/guardduty/s3ProtectionEnabled.js @@ -10,7 +10,8 @@ module.exports = { recommended_action: 'Enable GuardDuty S3 protection for all AWS accounts.', link: 'https://docs.aws.amazon.com/guardduty/latest/ug/s3-protection.html', apis: ['GuardDuty:listDetectors', 'GuardDuty:getDetector', 'STS:getCallerIdentity'], - + realtime_triggers: ['guardduty:CreateDetector', 'guardduty:UpdateDetector'], + run: function(cache, settings, callback) { var results = []; var source = {}; diff --git a/plugins/aws/healthlake/dataStoreEncrypted.js b/plugins/aws/healthlake/dataStoreEncrypted.js index 1fad1ee32e..1ac5ac19b7 100644 --- a/plugins/aws/healthlake/dataStoreEncrypted.js +++ b/plugins/aws/healthlake/dataStoreEncrypted.js @@ -19,6 +19,7 @@ module.exports = { default: 'awscmk' } }, + realtime_triggers: ['healthlake:CreateFHIRDatastore'], run: function(cache, settings, callback) { var results = []; From 8ddf40e406991405cac62c1a53f7aaf8de5058d0 Mon Sep 17 00:00:00 2001 From: --global Date: Thu, 14 Sep 2023 18:02:20 +0500 Subject: [PATCH 2/3] added tiggers --- plugins/aws/firehose/deliveryStreamEncrypted.js | 2 +- plugins/aws/firehose/firehoseEncrypted.js | 2 +- plugins/aws/guardduty/guarddutyEnabled.js | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/plugins/aws/firehose/deliveryStreamEncrypted.js b/plugins/aws/firehose/deliveryStreamEncrypted.js index c14bc2f6e1..584aabd312 100644 --- a/plugins/aws/firehose/deliveryStreamEncrypted.js +++ b/plugins/aws/firehose/deliveryStreamEncrypted.js @@ -20,7 +20,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['firehose:UpdateDestination'], + realtime_triggers: ['firehose:CreateDeliveryStreams','firehose:UpdateDestination'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/firehose/firehoseEncrypted.js b/plugins/aws/firehose/firehoseEncrypted.js index 1d69545d2a..a05543968e 100644 --- a/plugins/aws/firehose/firehoseEncrypted.js +++ b/plugins/aws/firehose/firehoseEncrypted.js @@ -17,7 +17,7 @@ module.exports = { 'AWS KMS encryption ensures that the Firehose payload meets the ' + 'encryption in transit and at rest requirements of HIPAA.' }, - realtime_triggers: ['firehose:StartDeliveryStreamEncryption', 'kinesis:StartStreamEncryption'], + realtime_triggers: ['firehose:CreateDeliveryStreams','firehose:StartDeliveryStreamEncryption', 'kinesis:StartStreamEncryption'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/guardduty/guarddutyEnabled.js b/plugins/aws/guardduty/guarddutyEnabled.js index ffd4dd65b4..295249e0cf 100644 --- a/plugins/aws/guardduty/guarddutyEnabled.js +++ b/plugins/aws/guardduty/guarddutyEnabled.js @@ -10,7 +10,7 @@ module.exports = { recommended_action: 'Enable GuardDuty for all AWS accounts.', link: 'https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html', apis: ['GuardDuty:listDetectors', 'GuardDuty:getDetector', 'STS:getCallerIdentity'], - realtime_triggers: ['guardduty:CreateDetector'], + realtime_triggers: ['guardduty:CreateDetector', 'guardduty:DeleteDetector'], run: function(cache, settings, callback) { var results = []; From 594979bae4f3624e180d047e1c706a16f2d5855d Mon Sep 17 00:00:00 2001 From: --global Date: Wed, 20 Sep 2023 22:46:46 +0500 Subject: [PATCH 3/3] added delete tigger --- plugins/aws/connect/customerProfilesDomainEncrypted.js | 2 +- plugins/aws/connect/instanceAttachmentsEncrypted.js | 2 +- plugins/aws/connect/instanceCallRecordingEncrypted.js | 2 +- plugins/aws/connect/instanceMediaStreamsEncrypted.js | 2 +- plugins/aws/connect/instanceReportsEncrypted.js | 2 +- plugins/aws/connect/instanceTranscriptsEncrypted.js | 2 +- plugins/aws/connect/voiceIdDomainEncrypted.js | 2 +- plugins/aws/connect/wisdomDomainEncrypted.js | 2 +- plugins/aws/finspace/finspaceEnvironmentEncrypted.js | 2 +- plugins/aws/firehose/deliveryStreamEncrypted.js | 2 +- plugins/aws/firehose/firehoseEncrypted.js | 2 +- plugins/aws/forecast/datasetExportEncrypted.js | 2 +- plugins/aws/forecast/forecastDatasetEncrypted.js | 2 +- plugins/aws/frauddetector/fraudDetectorDataEncrypted.js | 2 +- plugins/aws/fsx/fsxFileSystemEncrypted.js | 2 +- plugins/aws/glue/bookmarkEncryptionEnabled.js | 2 +- plugins/aws/glue/glueCloudwatchLogsEncrypted.js | 2 +- plugins/aws/glue/glueS3EncryptionEnabled.js | 2 +- plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js | 2 +- plugins/aws/guardduty/exportedFindingsEncrypted.js | 2 +- plugins/aws/guardduty/guarddutyMaster.js | 2 +- plugins/aws/guardduty/noActiveFindings.js | 2 +- plugins/aws/guardduty/s3ProtectionEnabled.js | 2 +- plugins/aws/healthlake/dataStoreEncrypted.js | 2 +- 24 files changed, 24 insertions(+), 24 deletions(-) diff --git a/plugins/aws/connect/customerProfilesDomainEncrypted.js b/plugins/aws/connect/customerProfilesDomainEncrypted.js index fedef11522..2678a2ce1c 100644 --- a/plugins/aws/connect/customerProfilesDomainEncrypted.js +++ b/plugins/aws/connect/customerProfilesDomainEncrypted.js @@ -18,7 +18,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['customerprofiles:CreateDomain', 'customerprofiles:UpdateDomain'], + realtime_triggers: ['customerprofiles:CreateDomain', 'customerprofiles:UpdateDomain', 'customerprofile:DeleteDomain'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/instanceAttachmentsEncrypted.js b/plugins/aws/connect/instanceAttachmentsEncrypted.js index 2bfbed1ae7..14be6532a3 100644 --- a/plugins/aws/connect/instanceAttachmentsEncrypted.js +++ b/plugins/aws/connect/instanceAttachmentsEncrypted.js @@ -19,7 +19,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig', 'connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/instanceCallRecordingEncrypted.js b/plugins/aws/connect/instanceCallRecordingEncrypted.js index 05e49a7fa2..e90bf9778e 100644 --- a/plugins/aws/connect/instanceCallRecordingEncrypted.js +++ b/plugins/aws/connect/instanceCallRecordingEncrypted.js @@ -19,7 +19,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig','connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'], run: function(cache, settings, callback) { diff --git a/plugins/aws/connect/instanceMediaStreamsEncrypted.js b/plugins/aws/connect/instanceMediaStreamsEncrypted.js index 3f8246d899..8c7c4f4b1d 100644 --- a/plugins/aws/connect/instanceMediaStreamsEncrypted.js +++ b/plugins/aws/connect/instanceMediaStreamsEncrypted.js @@ -19,7 +19,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig','connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/instanceReportsEncrypted.js b/plugins/aws/connect/instanceReportsEncrypted.js index 1a8ec48222..c25ca703e2 100644 --- a/plugins/aws/connect/instanceReportsEncrypted.js +++ b/plugins/aws/connect/instanceReportsEncrypted.js @@ -19,7 +19,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig','connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/instanceTranscriptsEncrypted.js b/plugins/aws/connect/instanceTranscriptsEncrypted.js index fec487e987..1e9cdf1cf4 100644 --- a/plugins/aws/connect/instanceTranscriptsEncrypted.js +++ b/plugins/aws/connect/instanceTranscriptsEncrypted.js @@ -19,7 +19,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig'], + realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig','connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/voiceIdDomainEncrypted.js b/plugins/aws/connect/voiceIdDomainEncrypted.js index 3d63b606a0..cf9c889357 100644 --- a/plugins/aws/connect/voiceIdDomainEncrypted.js +++ b/plugins/aws/connect/voiceIdDomainEncrypted.js @@ -22,7 +22,7 @@ module.exports = { default: 'awskms' } }, - realtime_triggers: ['voiceid:CreateDomain', 'voiceid:UpdateDomain'], + realtime_triggers: ['voiceid:CreateDomain', 'voiceid:UpdateDomain', 'voiceid:DeleteDomain'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/connect/wisdomDomainEncrypted.js b/plugins/aws/connect/wisdomDomainEncrypted.js index a7f1e149ee..bf153794bc 100644 --- a/plugins/aws/connect/wisdomDomainEncrypted.js +++ b/plugins/aws/connect/wisdomDomainEncrypted.js @@ -22,7 +22,7 @@ module.exports = { default: 'awskms' } }, - realtime_triggers: ['wisdom:CreateAssistant'], + realtime_triggers: ['wisdom:CreateAssistant', 'wisdom:DeleteAssistant'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/finspace/finspaceEnvironmentEncrypted.js b/plugins/aws/finspace/finspaceEnvironmentEncrypted.js index 0cf83b46f8..1d454cf9f4 100644 --- a/plugins/aws/finspace/finspaceEnvironmentEncrypted.js +++ b/plugins/aws/finspace/finspaceEnvironmentEncrypted.js @@ -19,7 +19,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['finspace:CreateEnnviromennt'], + realtime_triggers: ['finspace:CreateEnviromennt', 'finspace:DeleteEnviroment'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/firehose/deliveryStreamEncrypted.js b/plugins/aws/firehose/deliveryStreamEncrypted.js index 584aabd312..ca7df2db5f 100644 --- a/plugins/aws/firehose/deliveryStreamEncrypted.js +++ b/plugins/aws/firehose/deliveryStreamEncrypted.js @@ -20,7 +20,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['firehose:CreateDeliveryStreams','firehose:UpdateDestination'], + realtime_triggers: ['firehose:CreateDeliveryStreams','firehose:UpdateDestination', 'firehose:DeleteliveryStreams'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/firehose/firehoseEncrypted.js b/plugins/aws/firehose/firehoseEncrypted.js index a05543968e..d7be7839df 100644 --- a/plugins/aws/firehose/firehoseEncrypted.js +++ b/plugins/aws/firehose/firehoseEncrypted.js @@ -17,7 +17,7 @@ module.exports = { 'AWS KMS encryption ensures that the Firehose payload meets the ' + 'encryption in transit and at rest requirements of HIPAA.' }, - realtime_triggers: ['firehose:CreateDeliveryStreams','firehose:StartDeliveryStreamEncryption', 'kinesis:StartStreamEncryption'], + realtime_triggers: ['firehose:CreateDeliveryStreams','firehose:StartDeliveryStreamEncryption', 'kinesis:StartStreamEncryption', 'firehose:DeleteliveryStreams'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/forecast/datasetExportEncrypted.js b/plugins/aws/forecast/datasetExportEncrypted.js index 4161ae839f..880e55f20c 100644 --- a/plugins/aws/forecast/datasetExportEncrypted.js +++ b/plugins/aws/forecast/datasetExportEncrypted.js @@ -18,7 +18,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['forecast:CreateForecastExportJob'], + realtime_triggers: ['forecast:CreateForecastExportJob', 'forecast:DeleteForecastExportjob'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/forecast/forecastDatasetEncrypted.js b/plugins/aws/forecast/forecastDatasetEncrypted.js index 742d74ba3d..27191963a8 100644 --- a/plugins/aws/forecast/forecastDatasetEncrypted.js +++ b/plugins/aws/forecast/forecastDatasetEncrypted.js @@ -19,7 +19,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['forecastservice:CreateDataset'], + realtime_triggers: ['forecastservice:CreateDataset', 'forecastservice:DeleteDataset'], run: function(cache, settings, callback) { diff --git a/plugins/aws/frauddetector/fraudDetectorDataEncrypted.js b/plugins/aws/frauddetector/fraudDetectorDataEncrypted.js index ca4de0ea64..78096775d4 100644 --- a/plugins/aws/frauddetector/fraudDetectorDataEncrypted.js +++ b/plugins/aws/frauddetector/fraudDetectorDataEncrypted.js @@ -18,7 +18,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['frauddetector:PutKMSEncryptionKey'], + realtime_triggers: ['frauddetector:PutKMSEncryptionKey', 'frauddetector:DeleteDetector'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/fsx/fsxFileSystemEncrypted.js b/plugins/aws/fsx/fsxFileSystemEncrypted.js index 8741ee2dc5..10817359a6 100644 --- a/plugins/aws/fsx/fsxFileSystemEncrypted.js +++ b/plugins/aws/fsx/fsxFileSystemEncrypted.js @@ -18,7 +18,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['fsx:CreateFileSystem'], + realtime_triggers: ['fsx:CreateFileSystem', 'fsx:DeleteFileSystem'], run: function(cache, settings, callback) { diff --git a/plugins/aws/glue/bookmarkEncryptionEnabled.js b/plugins/aws/glue/bookmarkEncryptionEnabled.js index 01d98e8c5f..9ce185c8e8 100644 --- a/plugins/aws/glue/bookmarkEncryptionEnabled.js +++ b/plugins/aws/glue/bookmarkEncryptionEnabled.js @@ -10,7 +10,7 @@ module.exports = { recommended_action: 'Recreate Glue security configurations and enable job bookmark encryption', link: 'https://docs.aws.amazon.com/glue/latest/dg/console-security-configurations.html', apis: ['Glue:getSecurityConfigurations', 'STS:getCallerIdentity'], - realtime_triggers: ['glue:CreateSecurityConfiguration'], + realtime_triggers: ['glue:CreateSecurityConfiguration', 'glue:DeleteSecurityConfiguration'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/glue/glueCloudwatchLogsEncrypted.js b/plugins/aws/glue/glueCloudwatchLogsEncrypted.js index 15be118c76..127101b2d4 100644 --- a/plugins/aws/glue/glueCloudwatchLogsEncrypted.js +++ b/plugins/aws/glue/glueCloudwatchLogsEncrypted.js @@ -10,7 +10,7 @@ module.exports = { recommended_action: 'Modify Glue Security Configurations to enable CloudWatch logs encryption at-rest', link: 'https://docs.aws.amazon.com/glue/latest/dg/console-security-configurations.html', apis: ['Glue:getSecurityConfigurations', 'STS:getCallerIdentity'], - realtime_triggers: ['glue:CreateSecurityConfiguration'], + realtime_triggers: ['glue:CreateSecurityConfiguration', 'glue:DeleteSecurityConfiguration'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/glue/glueS3EncryptionEnabled.js b/plugins/aws/glue/glueS3EncryptionEnabled.js index 60a74c9cc0..7391f26fcc 100644 --- a/plugins/aws/glue/glueS3EncryptionEnabled.js +++ b/plugins/aws/glue/glueS3EncryptionEnabled.js @@ -18,7 +18,7 @@ module.exports = { default: 'awscmk', } }, - realtime_triggers: ['glue:CreateSecurityConfiguration'], + realtime_triggers: ['glue:CreateSecurityConfiguration','glue:DeleteSecurityConfiguration'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js b/plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js index 64b37025d0..eee2ed8665 100644 --- a/plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js +++ b/plugins/aws/gluedatabrew/databrewJobOutputEncrypted.js @@ -18,7 +18,7 @@ module.exports = { default: 'awscmk', } }, - realtime_triggers: ['databrew:CreateRecipeJob', 'databrew:UpdateRecipeJob'], + realtime_triggers: ['databrew:CreateRecipeJob', 'databrew:UpdateRecipeJob', 'databrew:DeleteJob'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/guardduty/exportedFindingsEncrypted.js b/plugins/aws/guardduty/exportedFindingsEncrypted.js index 3585989616..6a310a2cf6 100644 --- a/plugins/aws/guardduty/exportedFindingsEncrypted.js +++ b/plugins/aws/guardduty/exportedFindingsEncrypted.js @@ -19,7 +19,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['guardduty:CreateDetector'], + realtime_triggers: ['guardduty:CreateDetector', 'guardduty:DeleteDetector'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/guardduty/guarddutyMaster.js b/plugins/aws/guardduty/guarddutyMaster.js index 7354f3a721..63b4cb3511 100644 --- a/plugins/aws/guardduty/guarddutyMaster.js +++ b/plugins/aws/guardduty/guarddutyMaster.js @@ -18,7 +18,7 @@ module.exports = { default: '', }, }, - realtime_triggers: ['guardduty:CreateDetector', 'guardduty:CreateMembers'], + realtime_triggers: ['guardduty:CreateDetector', 'guardduty:CreateMembers', 'guardduty:DeleteDetector', 'guardduty:DeleteMembers'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/guardduty/noActiveFindings.js b/plugins/aws/guardduty/noActiveFindings.js index 9230ca27a5..c158ecdedc 100644 --- a/plugins/aws/guardduty/noActiveFindings.js +++ b/plugins/aws/guardduty/noActiveFindings.js @@ -20,7 +20,7 @@ module.exports = { default: '48' } }, - realtime_triggers: ['guardduty:CreateDetector', 'guardduty:ArchiveFindings'], + realtime_triggers: ['guardduty:CreateDetector', 'guardduty:ArchiveFindings', 'guardduty:DeleteDetector'], run: function(cache, settings, callback) { const results = []; diff --git a/plugins/aws/guardduty/s3ProtectionEnabled.js b/plugins/aws/guardduty/s3ProtectionEnabled.js index 76cdf1ad85..5c55542a28 100644 --- a/plugins/aws/guardduty/s3ProtectionEnabled.js +++ b/plugins/aws/guardduty/s3ProtectionEnabled.js @@ -10,7 +10,7 @@ module.exports = { recommended_action: 'Enable GuardDuty S3 protection for all AWS accounts.', link: 'https://docs.aws.amazon.com/guardduty/latest/ug/s3-protection.html', apis: ['GuardDuty:listDetectors', 'GuardDuty:getDetector', 'STS:getCallerIdentity'], - realtime_triggers: ['guardduty:CreateDetector', 'guardduty:UpdateDetector'], + realtime_triggers: ['guardduty:CreateDetector', 'guardduty:UpdateDetector', 'guardduty:DeleteDetector'], run: function(cache, settings, callback) { var results = []; diff --git a/plugins/aws/healthlake/dataStoreEncrypted.js b/plugins/aws/healthlake/dataStoreEncrypted.js index 1ac5ac19b7..2a860f83b5 100644 --- a/plugins/aws/healthlake/dataStoreEncrypted.js +++ b/plugins/aws/healthlake/dataStoreEncrypted.js @@ -19,7 +19,7 @@ module.exports = { default: 'awscmk' } }, - realtime_triggers: ['healthlake:CreateFHIRDatastore'], + realtime_triggers: ['healthlake:CreateFHIRDatastore', 'healthlake:DeleteFHIRDatastore'], run: function(cache, settings, callback) { var results = [];