-
Notifications
You must be signed in to change notification settings - Fork 1.1k
HowTo: Use with a list of trusted CIDRs
Scout supports loading trusted CIDRs from a json file formatted in a fashion similar to AWS' public IP ranges. At a high level, the file should is expected to look as follow.
{
"createDate": "2017-12-02-07-08-36",
"prefixes": [
{
"ip_prefix": "1.2.3.4",
"name": "Location A"
},
{
"ip_prefix": "5.6.7.8",
"name": "Location B"
}
]
}
The awsrecipes_create_ip_ranges.py
tool may be used in order to generate well-formatted custom CIDR lists. The tool offers several use cases, such as generation from a CSV file, an interactive mode, and fetching data from AWS accounts to get names of EC2 instances and VPCs.
NCC Group published a blog post with additional information about usage of this tool. The blog post is available at https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2015/november/efficient-review-of-aws-security-groups.
By default, Scout displays the name
attribute of each CIDR. Running the following results in the CIDR name to be displayed in parenthesis next to the CIDR in each of the security group grants.
$ python scout.py --ip-ranges ip-ranges-demo.json
In the event that you used an different attribute than name, for example, office_name
. You may
$ python scout.py --ip-ranges ip-ranges-demo.json --ip-ranges-name-key office_name
The screenshot above illustrates that the name of the CIDR is displayed next to each security group's IP grant.
When an unknown CIDR is found, the Unknown CIDR
caption is added to the report, which facilitates detection of EC2 security group rules that whitelist network traffic from untrusted IP ranges.
- Home
- Getting Started
- Setup
- Compliance
- Configuration and Usage
- Docker
- [v6] Upgrade to v6-alpha
- Advanced Usage
- Understanding the Architecture
- How to Contribute
- FAQ