Skip to content

Commit

Permalink
Updating formatting of SNS message
Browse files Browse the repository at this point in the history
  • Loading branch information
Tracy committed Jan 14, 2021
1 parent 24552b1 commit 352aab1
Show file tree
Hide file tree
Showing 2 changed files with 42 additions and 25 deletions.
Binary file modified notifier_0.83.0.zip
Binary file not shown.
67 changes: 42 additions & 25 deletions template/iam-auto-key-rotation-enforcement.html
Original file line number Diff line number Diff line change
@@ -1,25 +1,42 @@
To all application owners,

Security is the top-most priority of any organization. To ensure continued success in our drive to design and architect a secure infrastructure, we are implementing a 90-day automatic rotation of all AWS IAM User Access Keys. This will begin on DATE HERE.

Why is this important and how does fixing this help you?
Rotating Identity and Access Management (IAM) credentials periodically will significantly reduce the chances that a compromised set of access keys can be used without your knowledge to access certain components within your AWS account.

What this means for you:
You will need to update your applications every 90-days with the new Access Key pair. These can be found in AWS Secrets Manager in a secret accessible by your application’s AWS IAM User only. You will have a grace period of 10 days after rotation before old Access Keys are disabled. There will be another 10-day grace period before old Access Keys are deleted. Until they are disabled, old Access Keys can be used to programmatically retrieve the new Access Keys from AWS Secrets Manager.

Enabling this setting will also help you align with the following compliance standards:
• The Center of Internet Security AWS Foundations Benchmark
• APRA
• MAS
• National Institute of Standards and Technology (NIST)
• AWS Well-Architected Framework

AWS Resources with Violations Detected:
[insert-violations-here]

Should you have any questions, please reach out to EMAIL ADDRESS HERE. As always, thank you for continuing to strive for a secure work environment.

Sincerely,

INFO HERE
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Style-Type" content="text/css">
<title></title>
<meta name="Generator" content="Cocoa HTML Writer">
<meta name="CocoaVersion" content="1894.6">
<style type="text/css">
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica}
</style>
</head>
<body>
<p class="p1">
To all application owners,<br>
<br>
Security is the top-most priority of any organization. To ensure continued success in our drive to design and architect a secure infrastructure, we are implementing a 90-day automatic rotation of all AWS IAM User Access Keys. This will begin on 2/1/20201.<br>
<br>
Why is this important and how does fixing this help you?<br>
Rotating Identity and Access Management (IAM) credentials periodically will significantly reduce the chances that a compromised set of access keys can be used without your knowledge to access certain components within your AWS account.<br>
<br>
What this means for you:<br>
You will need to update your applications every 90-days with the new Access Key pair. These can be found in AWS Secrets Manager in a secret accessible by your application’s AWS IAM User only. You will have a grace period of 10 days after rotation before old Access Keys are disabled. There will be another 10-day grace period before old Access Keys are deleted. Until they are disabled, old Access Keys can be used to programmatically retrieve the new Access Keys from AWS Secrets Manager.<br>
<br>
Enabling this setting will also help you align with the following compliance standards:<br>
<br>
&bull; The Center of Internet Security AWS Foundations Benchmark<br>
&bull; APRA<br>
&bull; MAS<br>
&bull; National Institute of Standards and Technology (NIST)<br>
&bull; AWS Well-Architected Framework<br>
<br>
AWS IAM Access Keys have been rotated for the below:<br>
[insert-violations-here]<br>
<br>
Should you have any questions, please reach out to [email protected]. As always, thank you for continuing to strive for a secure work environment.<br>
<br>
Sincerely,<br>
<br>
Tracy Pierce;</p>
</body>
</html>

0 comments on commit 352aab1

Please sign in to comment.