-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Using a Custom Ruleset
Scout Suite provides a default set of rules that the authors have chosen to be the best compromise between breadth of coverage and a minimum number of false positives. While this default ruleset provides many insights into the configuration of AWS, GCP and Azure environments, using a custom ruleset will provide significantly improved value. We strongly recommend frequent users of the tool generate their own set of rules.
Cloning an existing ruleset is recommended to provide you with the base structure needed for the addition or subtraction of rules.
You can enable or disable rules by giving the value of true
or false
, respectively, to the field "enabled":
. A rule with this value set to to false
will not appear in any of the dashboards and subsequently you won't be able to click on it to have the culprit highlighted, however the data may still be available if you navigate to the proper page of the report.
For each rule, the level (i.e. warning or danger) may be specified by entering either warning or danger next to the field "level":
. This field affects the coloration of the triggered findings in order to signify varying levels of importance to the user reading the report.
Some rules require parameters, which provides the following advantages:
- A rule definition may be referenced multiple times in the ruleset, with only its arguments' values changing.
- Rules that require environment-specific values, such as IP addresses or security group IDs are defined identically for any Scout Suite user.
The screenshot below illustrates how a parameterized rule typically looks like in the json file.
In this example, the rule takes two arguments:
- The friendly/display name for the type of instances; in this case, "beefy".
- The list of EC2 instance types considered as "beefy", each value separated by a comma.
With the new ruleset created, you may use pass it to Scout Suite using the --ruleset
command line argument, as illustrated below.
$ scout aws --ruleset myruleset.json
If you already fetched the data and just wish to tweak the results, you may run a local analysis of the previously downloaded configuration using the --local
argument.
$ scout aws --local --ruleset myruleset.json
- Home
- Getting Started
- Setup
- Compliance
- Configuration and Usage
- Docker
- [v6] Upgrade to v6-alpha
- Advanced Usage
- Understanding the Architecture
- How to Contribute
- FAQ