- Install/Update Python with pip
- Install or update the latest version of the AWS CLI
- Install requirements.txt
pip install -r requirements.txt - Optional: Check Boto3 Installation
Get and update cacert with GE External Root Certificate
# Linux
curl https://static.gecirtnotification.com/browser_remediation/packages/GE_Dev_External_Root_CA_2_1.crt -o ~/gecert.pem; echo '' >> ~/gecert.pem
cat ~/gecert.pem >> ~/aws/dist/awscli/botocore/cacert.pem
# Windows
pyhon ge-cert.pyCMC is on DynamoDb in public-cloud-prod account. To get CMC json and csv data you may run below command with AWS Profile for public-cloud-prod and two json and csv files with current timestamp will be generated in data-export folder.
# Gossamer assume_roles:
# GR-Standard 277688789493 [public-cloud-prod] Corporate CoreTech
- role_arn: arn:aws:iam::277688789493:role/cs/p-engineering
profile: Public-Cloud-Prod
# Get CMC Data
# Call from src/ path
python bin/get-cmc-data.py --profile Public-Cloud-ProdTo get Security Hub Member Accounts csv list you should have digital-vesg-secops profile for digital-vesg-secops account
# Gossamer assume_roles:
# GR-Standard 264560008398 [digital-vesg-secops] Corporate Cyber
- role_arn: arn:aws:iam::264560008398:role/cs/p-engineering
profile: digital-vesg-secops
# Get SecOps Security Hub Member Accounts
bash get-secops-data.sh
## GovCloud
# Gossamer assume_roles:
# GovCloud 715477192348 [gov-public-cloud-security]
- role_arn: arn:aws-us-gov:iam::715477192348:role/cs/p-engineering
profile: Gov-SecOps
# Get SecOps Security Hub Member Accounts - GovCloud
bash get-secops-data.sh
To see the util.py Functions, Classes and Methods run below code which uses Abstract Syntax Tree to get the information from file after runs a self demo.
python util.py# VS Code Terminal Settings
export VS_TERM="/mnt/c/Users/${USER/SSO/}/AppData/Roaming/Code/User/settings.json"
cat $VS_TERM | grep -v "//" | jq .
# Profiles › List
cat $VS_TERM | grep -v "//" | jq '.["terminal.integrated.profiles.windows"] | keys'
# Profiles › Data
cat $VS_TERM | grep -v "//" | jq '.["terminal.integrated.profiles.windows"]'