Terraform to demonstrate exposed resources in AWS.
Note: Do not run this in production. Probably don't even run this in dev. Run it in a sandboxed account that you intend on nuking afterwards.
If you are using a non-default AWS credentials profile, then set it using these variables (one is used by AWS CLI, one is used by Terraform). In this case, I called my profile vulnerable-aws
.
export AWS_DEFAULT_PROFILE=vulnerable-aws
export AWS_PROFILE=vulnerable-aws
- Now set your AWS region
export AWS_DEFAULT_REGION=us-east-1
terraform init
terraform plan
terraform apply -auto-approve
Name | Version |
---|---|
terraform | 1.0.6 |
aws | 3.63.0 |
Name | Version |
---|---|
archive | 2.2.0 |
aws | 3.63.0 |
null | 3.1.0 |
random | 3.1.0 |
No modules.
Name | Description | Type | Default | Required |
---|---|---|---|---|
domain_name | n/a | string |
"test-resource-exposure.com" |
no |
kms_grantee_principal | KMS Grants require a valid IAM principal, and I don't want to expose my own AWS Account ID, so let's give New Relic (randomly selected) access to the KMS key. | string |
"arn:aws:iam::754728514883:root" |
no |
name | n/a | string |
"test-resource-exposure" |
no |
region | n/a | string |
"us-east-1" |
no |
No outputs.