Skip to content

Conversation

@TimDiekmann
Copy link
Member

🌟 What is the purpose of this PR?

Add AWS GuardDuty configuration to enhance security monitoring and threat detection capabilities in our AWS infrastructure.

🔗 Related links

  • None

🔍 What does this change?

  • Implements AWS GuardDuty detector resource in Terraform
  • Enables S3 logs monitoring for security threats
  • Configures Kubernetes audit logs monitoring
  • Sets up malware protection with EBS volume scanning
  • Adds appropriate tagging for the GuardDuty detector resource

Pre-Merge Checklist 🚀

🚢 Has this modified a publishable library?

This PR:

  • does not modify any publishable blocks or libraries, or modifications do not need publishing

📜 Does this require a change to the docs?

The changes in this PR:

  • are internal and do not require a docs change

🕸️ Does this require a change to the Turbo Graph?

The changes in this PR:

  • do not affect the execution graph

🛡 What tests cover this?

  • Terraform plan validation will verify the resource configuration

❓ How to test this?

  1. Run terraform plan to verify the GuardDuty configuration
  2. Apply the changes in a test environment
  3. Verify GuardDuty detector appears in AWS console with the correct configuration

@github-actions github-actions bot added area/infra Relates to version control, CI, CD or IaC (area) area/infra > terraform labels Nov 4, 2025
@TimDiekmann TimDiekmann changed the title SRE-67: Add AWS GuardDuty configuration for security monitoring SRE-67: Add AWS GuardDuty configuration for security monitoring Nov 4, 2025
@TimDiekmann TimDiekmann changed the title SRE-67: Add AWS GuardDuty configuration for security monitoring SRE-67: Add AWS GuardDuty configuration for security monitoring Nov 4, 2025
@graphite-app
Copy link
Contributor

graphite-app bot commented Nov 4, 2025

Graphite Automations

"Request DevOps reviewers once CI passes" took an action on this PR • (11/04/25)

1 reviewer was added to this PR based on Tim Diekmann's automation.

@graphite-app graphite-app bot changed the base branch from t/sre-87-vanta-remediate-database-io-monitored-aws to graphite-base/8006 November 4, 2025 11:34
@TimDiekmann TimDiekmann force-pushed the t/sre-67-vanta-remediate-intrusion-detection-system-enabled-aws-for branch from 1f2f2a5 to 87d3b81 Compare November 4, 2025 19:10
@graphite-app graphite-app bot changed the base branch from graphite-base/8006 to main November 4, 2025 19:11
@graphite-app
Copy link
Contributor

graphite-app bot commented Nov 4, 2025

Merge activity

  • Nov 4, 7:11 PM UTC: Graphite rebased this pull request, because this pull request is set to merge when ready.

@TimDiekmann TimDiekmann added this pull request to the merge queue Nov 4, 2025
Merged via the queue into main with commit 7d1c218 Nov 4, 2025
39 of 57 checks passed
@TimDiekmann TimDiekmann deleted the t/sre-67-vanta-remediate-intrusion-detection-system-enabled-aws-for branch November 4, 2025 19:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/infra > terraform area/infra Relates to version control, CI, CD or IaC (area)

Development

Successfully merging this pull request may close these issues.

3 participants