Skip to content

Commit 7eaea19

Browse files
committed
Add links to docs
1 parent a0361a8 commit 7eaea19

File tree

7 files changed

+25
-25
lines changed

7 files changed

+25
-25
lines changed

README.md

+20-20
Original file line numberDiff line numberDiff line change
@@ -38,26 +38,26 @@ endgame expose --service s3 --name computers-were-a-mistake
3838
Note: At the time of this writing, [AWS Access Analyzer](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-resources.html) does **NOT** support auditing **11 out of the 18 services** that `endgame` attacks. Given that Access Analyzer is intended to detect this exact kind of violation, we kindly suggest to the AWS Team that they support all resources that can be attacked using `endgame`. 😊
3939

4040

41-
| Backdoor Resource Type | Support | [AWS Access Analyzer Support][1] |
42-
|------------------------------------|---------|----------------------------------|
43-
| ACM Private CAs |||
44-
| CloudWatch Resource Policies |||
45-
| EBS Volume Snapshots |||
46-
| EC2 Amazon Machine Images (AMIs) |||
47-
| ECR Container Repositories |||
48-
| EFS File Systems |||
49-
| ElasticSearch Domains |||
50-
| Glacier Vault Access Policies |||
51-
| IAM Roles |||
52-
| KMS Keys |||
53-
| Lambda Functions |||
54-
| Lambda Layers |||
55-
| RDS Snapshots |||
56-
| S3 Buckets |||
57-
| Secrets Manager Secrets |||
58-
| SES Sender Authorization Policies |||
59-
| SQS Queues |||
60-
| SNS Topics |||
41+
| Backdoor Resource Type | Support | [AWS Access Analyzer Support][1] |
42+
|---------------------------------------------------------|---------|----------------------------------|
43+
| [ACM Private CAs](docs/risks/acm-pca.md) |||
44+
| [CloudWatch Resource Policies](docs/risks/logs.md) |||
45+
| [EBS Volume Snapshots](docs/risks/ebs.md) |||
46+
| [EC2 AMIs](docs/risks/amis.md) |||
47+
| [ECR Container Repositories](docs/risks/ecr.md) |||
48+
| [EFS File Systems](docs/risks/efs.md) |||
49+
| [ElasticSearch Domains](docs/risks/es.md) |||
50+
| [Glacier Vault Access Policies](docs/risks/glacier.md) |||
51+
| [IAM Roles](docs/risks/iam-roles.md) |||
52+
| [KMS Keys](docs/risks/kms.md) |||
53+
| [Lambda Functions](docs/risks/lambda-functions.md) |||
54+
| [Lambda Layers](docs/risks/lambda-layers.md) |||
55+
| [RDS Snapshots](docs/risks/rds-snapshots.md) |||
56+
| [S3 Buckets](docs/risks/s3.md) |||
57+
| [Secrets Manager Secrets](docs/risks/secretsmanager.md) |||
58+
| [SES Sender Authorization Policies](docs/risks/ses.md) |||
59+
| [SQS Queues](docs/risks/sqs.md) |||
60+
| [SNS Topics](docs/risks/sns.md) |||
6161

6262

6363
## Installation
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

mkdocs.yml

+5-5
Original file line numberDiff line numberDiff line change
@@ -26,14 +26,14 @@ nav:
2626

2727
- "<b>Backdoor Resource Types</b>":
2828
- ACM Private CAs: 'risks/acm-pca.md'
29-
- CloudWatch: 'risks/cloudwatch-logs.md'
30-
- EC2 Machine Images (AMIs): 'risks/ec2-amis.md'
29+
- CloudWatch: 'risks/logs.md'
30+
- EC2 Machine Images (AMIs): 'risks/amis.md'
3131
- Elastic Block Store (EBS): 'risks/ebs.md'
3232
- Elastic Container Registry (ECR): 'risks/ecr.md'
33-
- Elastic File System (EFS): 'risks/elasticfilesystem.md'
34-
- ElasticSearch: 'risks/elasticsearch.md'
33+
- Elastic File System (EFS): 'risks/efs.md'
34+
- ElasticSearch: 'risks/es.md'
3535
- Glacier Vaults: 'risks/glacier.md'
36-
- IAM Roles: 'risks/iam.md'
36+
- IAM Roles: 'risks/iam-roles.md'
3737
- KMS Keys: 'risks/kms.md'
3838
- Lambda Functions: 'risks/lambda-functions.md'
3939
- Lambda Layers: 'risks/lambda-layers.md'

0 commit comments

Comments
 (0)