cloud-storage-security

cloudstoragesec/cloud-storage-security/aws

Terraform Module HCL AWS ✓ Verified

A Terraform Module for CSS products

Install
module "cloud-storage-security" {
source = "cloudstoragesec/cloud-storage-security/aws"
version = "1.8.16+css9.06.000"
}
⭐ Source on GitHub 📦 Registry page
README

Cloud Storage Security Terraform Module Overview This Terraform module facilitates the seamless setup and deployment of Cloud Storage Security (CSS) within an AWS environment as an alternative to the CloudFormation deployment method. Prerequisites PAYG Deployment Subscribe to AWS Marketplace Listing In order to run the product, you must be subscribed to one of Cloud Storage Security's listings in AWS Marketplace. Our primary listing may be found at the link below. Click Continue to Subscribe, and continue until you reach the deployment step. This process will be run instead of the CloudFormation deployment that is described in the listing. Antivirus for Amazon S3 - PAYG with 30 DAY FREE TRIAL BYOL/GovCloud Deployment If you are looking to deploy our BYOL version of this software which does

Inputs (50)
NameTypeDescriptionDefault
cidrlist(string)The CIDR blocks which are allowed access to the CSS Console (e.g. 0.0.0.0/0 for required
subnet_a_idstringA subnet ID within the VPC that may be used for ECS tasks for this deployment required
vpcstringThe VPC in which to place the user facing Console required
configure_load_balancerboolWhether the Console should be deployed behind a load balancer. Recommended if defalse
existing_target_group_arnstring If you are using your own AWS load balancer, provide the Target Group ARN thnull
large_file_disk_size_gbnumber Choose a larger disk size (between 20 - 16,300 GB) to enable scanning larger2000
azure_max_running_agentsnumber Default maximum number of running scan Azure agents. This value represents t12
application_bucket_prefixstringPrefix for the main application bucket name"cloudstoragesec"
lb_subnet_a_idstring A subnet in your VPC in which the Load Balancer can be placed. Ensure this snull
eventbridge_notifications_enabledbool If true Proactive Notifications will also be sent to AWS EventBridge This vafalse
cpustringThe CPU for the CSS Console"512"
guard_duty_s3_integration_enabled_regionsstring If you are utilizing GuardDuty S3 Malware scanning, you may enable an integrat"DISABLED"
ebs_volume_encryptionbool Enable EBS Volume Encryption false
agent_scanning_enginestring The initial scanning engine to use. CSS Secure is included with no additiona"ClamAV"
sns_cmk_key_arnstring Optional ARN for the CMK that should be used for the AWS KMS encryption for null
multi_engine_scanning_modestring Initial setting for whether or not multiple av engines should be utilized to"Disabled"
ecr_accountstring The AWS Account ID which contains the ECR repositories used for the CSS Consnull
console_auto_assign_public_ipbool Whether a public IP should be assigned to the console. If set to false, true
product_modestringSelect Whether to have AV, DC or Both enabled by default (these can be changed l"AV"
use_fips_endpointsbool Would you like us to use AWS FIPS endpoints? false
s3_cmk_key_arnstring Optional ARN for the CMK that should be used for the AWS KMS encryption for "default"
enable_large_file_scanningbool Set to true if you would like to have EC2 instances launched to scan files toofalse
ebs_volume_encryption_kms_key_idstring Enter an optional custom KMS Key ARN to use for EBS encryption; otherwise, t"default"
… and 10 more inputs
Outputs (13)
console_web_address — Address of Console Web Interface
username — User Name used to log in to console
proactive_notifications_topic_arn — ARN for the proactive notifications topic
lb_arn — ARN for the console Load Balancer if LB is used
application_id — The Application ID that identifies the Antivirus for Amazon S3 deployment
primary_account_id — The Account ID that is hosting the Antivirus for Amazon S3 deployment
cross_account_policy_name — Cross-Account Scanning Policy Name
cross_account_ec2_policy_name — Cross-Account EC2 Scanning Policy Name
allow_access_to_all_kms_keys — Whether scanner has access to all KMS encrypted buckets
quarantine_bucket_prefix — Prefix for the quarantine bucket
cross_account_role_name — Cross-Account Scanning Role Name
cross_account_event_bridge_role_name — Cross-Account Event Bridge Scanning Role Name
cross_account_event_bridge_policy_name — Cross-Account Event Bridge Scanning Policy Name
Resources (38)
aws_appautoscaling_targetaws_appconfig_applicationaws_appconfig_configuration_profileaws_appconfig_deploymentaws_appconfig_deployment_strategyaws_appconfig_environmentaws_cloudwatch_event_busaws_cloudwatch_log_groupaws_cloudwatch_metric_alarmaws_cognito_useraws_cognito_user_groupaws_cognito_user_in_groupaws_cognito_user_poolaws_cognito_user_pool_clientaws_dynamodb_tableaws_ecs_clusteraws_ecs_serviceaws_ecs_task_definitionaws_iam_instance_profileaws_iam_policyaws_iam_roleaws_iam_role_policyaws_iam_role_policy_attachmentaws_lbaws_lb_listeneraws_lb_target_groupaws_s3_bucketaws_s3_bucket_policyaws_s3_bucket_server_side_encryption_configurationaws_security_groupaws_sns_topicaws_sns_topic_policyaws_sqs_queueaws_ssm_documentaws_ssm_parameterawscc_ssm_documentrandom_idtime_sleep
Details
FrameworkTerraform Module
LanguageHCL
Version1.8.16+css9.06.000
Cloud AWS
★ Stars3
Forks10
Total downloads40.0k
Inputs50
Outputs13
Resources38
Submodules1
LicenseApache-2.0
Namespacecloudstoragesec
Updated