Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Checks CISA's Known Exploited Vulnerabilities (KEV) catalog and sends slack messages about new entries

License

Notifications You must be signed in to change notification settings

aquia-inc/KEV_Bot

image

GitHub Super-Linter CodeQL

Description

KEV Bot periodically checks the CISA Known Exploited Vulnerabilities catalog for new entries. When KEV Bot detects a new entry to the catalog, KEV Bot slacks an announcement of the new entry.

AWS Services Used

Event Bridge
DynamoDB
Lambda
SSM
S3 (if using github actions)

How to deploy with github actions

Prerequisites

  1. AWS Account and Github OIDC configured
  2. Fork this repo

Configure the following github secrets on your fork

  1. ROLE_TO_ASSUME - From AWS account KEV Bot will be deployed
  2. SLACK_WEBHOOK_URL - Slack incoming webhook URL to send notifications

Modify provider.tf

Configure provider.tf to point to a s3 bucket in your aws account

Push to main

Push requests approved to the main branch will trigger GitHub actions and deploy KEV bot to your AWS account.

How to deploy without github actions

Prerequisites

  1. Terraform installed and configured with an AWS account
  2. Python 3 installed
  3. pip installed and in path
  4. delete provider.tf from KEV Files
  5. Slack app configured with an incoming webhook

Deploy Linux

terraform init
terraform plan -input=false -var="slack_webhook_url=$SLACK_WEBHOOK_URL"
terraform apply -input=false -var="slack_webhook_url=$SLACK_WEBHOOK_URL"

Deploy Windows cmd

terraform init
terraform plan -input=false -var="slack_webhook_url=%SLACK_WEBHOOK_URL%"
terraform apply -input=false -var="slack_webhook_url=%SLACK_WEBHOOK_URL%"

About

Checks CISA's Known Exploited Vulnerabilities (KEV) catalog and sends slack messages about new entries

Resources

License

Code of conduct

Contributing

Stars

Watchers

Forks

Contributors 3

  •  
  •  
  •