TFDrift-Falco v0.3.0 Released: 203 CloudTrail Events Across 19 AWS Services
Major milestone achieved! v0.3.0 delivers comprehensive AWS drift detection with 203 CloudTrail events (103% of target), covering 19 AWS services including SageMaker, enhanced DynamoDB, VPC, and RDS support.
TFDrift-Falco v0.3.0 Released: 203 CloudTrail Events Across 19 AWS Services
We're thrilled to announce the official release of TFDrift-Falco v0.3.0! This major milestone delivers comprehensive AWS infrastructure drift detection, achieving 103% of our target with 203 CloudTrail events across 19 AWS services.
🎯 Milestone Achievement
| Metric | v0.2.0 (Starting Point) | v0.3.0 (Released) | Growth |
|---|---|---|---|
| CloudTrail Events | 95 events | 203 events | +114% |
| AWS Services | 10 services | 19 services | +90% |
| Test Coverage | 80% | 100% | +25% |
| Target Achievement | 48% (95/198) | 103% (203/198) | 🎉 |
🚀 What's New in v0.3.0
Phase 1.5: Enhanced AWS Coverage (Complete ✅)
v0.3.0 represents the completion of Phase 1.5, adding 108 new CloudTrail events across 9 services:
1️⃣ RDS Enhanced (31 events total)
Comprehensive database drift detection across all RDS resource types:
- DB Instances & Read Replicas
- Aurora Clusters & Global Tables
- Snapshots & Point-in-Time Recovery
- Parameter Groups & Subnet Groups
- Option Groups
Why it matters: Detect unauthorized database changes that could expose data, violate compliance, or impact costs.
2️⃣ VPC Enhanced (42 events total - #1 coverage!)
Complete network infrastructure monitoring:
- VPC Peering Connections
- Transit Gateway & VPC Attachments
- VPC Flow Logs
- Network Firewall
- Security Groups, Route Tables, ACLs, Endpoints
Why it matters: Network configuration drift can create security vulnerabilities and compliance violations.
3️⃣ SageMaker (16 events - NEW! 🆕)
ML infrastructure drift detection:
- Endpoint Management (deployment tracking)
- Training Jobs (resource consumption)
- Model Packages (model registry governance)
- Notebook Instances (development environment security)
Why it matters: Track ML model deployments and prevent unauthorized training jobs that consume expensive resources.
4️⃣ DynamoDB Enhanced (14 events total)
Advanced data protection monitoring:
- Point-in-Time Recovery (PITR)
- Backup Management
- Global Tables (multi-region replication)
- Kinesis Streaming Destinations
- Contributor Insights
Why it matters: Ensure data resilience and track multi-region table configurations.
5️⃣ Lambda Enhanced (10 events)
Complete serverless monitoring:
- Function Configuration & Code
- Event Source Mappings
- Permissions & Concurrency
6️⃣ EC2 Enhanced (17 events)
Comprehensive compute infrastructure:
- Instance Lifecycle
- AMI Management
- EBS Volumes & Snapshots
- Network Interfaces
7️⃣ ElastiCache (12 events)
Redis and Memcached drift detection:
- Cache Clusters
- Replication Groups
- Parameter Groups
8️⃣ Auto Scaling (10 events)
Dynamic capacity tracking:
- Auto Scaling Groups
- Launch Configurations
- Scaling Policies
- Scheduled Actions
9️⃣ ECS & EKS (25 events combined)
Container orchestration monitoring:
- ECS Services, Tasks, Clusters
- EKS Clusters, Node Groups, Addons
📊 Service Coverage Rankings
Top 10 services by event coverage:
| Rank | Service | Events | Coverage |
|---|---|---|---|
| 🥇 | VPC/Networking | 42 | Security Groups, Peering, Transit Gateway, Flow Logs, Firewall |
| 🥈 | RDS | 31 | Instances, Clusters, Snapshots, Parameter Groups |
| 🥉 | EC2 | 17 | Instances, AMIs, EBS, Snapshots, Network Interfaces |
| 4 | SageMaker 🆕 | 16 | Endpoints, Training, Models, Notebooks |
| 5 | ELB/ALB | 15 | Load Balancers, Target Groups, Listeners |
| 6 | DynamoDB | 14 | Tables, PITR, Backups, Global Tables |
| 7 | IAM | 14 | Roles, Users, Groups, Policies |
| 8 | ECS | 13 | Services, Tasks, Clusters |
| 9 | EKS | 12 | Clusters, Node Groups, Addons |
| 10 | ElastiCache | 12 | Cache Clusters, Replication Groups |
Plus: KMS (10), Lambda (10), Auto Scaling (10), S3 (8), ECR (1)
🔥 Key Features
1. Real-Time Drift Detection
Instant alerts when infrastructure changes occur:
- rule: Critical Infrastructure Change
desc: Detect high-impact infrastructure modifications
condition: >
ct.name in (
ModifyDBInstanceAttribute,
ModifyDBParameterGroup,
CreateVpcPeeringConnection,
CreateTransitGateway,
DeleteFirewall,
CreateEndpoint,
RestoreTableToPointInTime
)
output: >
Critical infrastructure change detected
(user=%ct.user service=%ct.source event=%ct.name
resource=%ct.resource region=%ct.region)
priority: CRITICAL
source: aws_cloudtrail
tags: [terraform, drift, critical]
2. Security-First Design
Track security-critical changes:
- RDS: Public access exposure, encryption disabled, snapshot deletion
- VPC: Peering connections, transit gateway creation, firewall deletion
- DynamoDB: PITR disabled, backup deletion
- SageMaker: Unauthorized notebook instances, endpoint deployment
3. Compliance Ready
Support for major compliance frameworks:
- SOC2 (change tracking, access control)
- PCI-DSS (encryption, network isolation)
- HIPAA (data protection, audit trails)
- GDPR (data residency, access logging)
4. Cost Visibility
Track cost-impacting changes:
- RDS instance type upgrades
- Read replica creation
- SageMaker training jobs
- EC2 instance modifications
- Global table replication
🎬 Getting Started
1. Installation
# Clone repository
git clone https://github.com/higakikeita/tfdrift-falco.git
cd tfdrift-falco
# Build and install
make install
# Or use Docker
docker pull ghcr.io/higakikeita/tfdrift-falco:v0.3.0
2. Quick Start Configuration
# config.yaml
providers:
aws:
enabled: true
regions:
- us-east-1
- us-west-2
falco:
enabled: true
hostname: "localhost"
port: 5060
notifications:
slack:
enabled: true
webhook_url: "${SLACK_WEBHOOK_URL}"
channel: "#infrastructure-alerts"
3. Run TFDrift-Falco
# Start monitoring
tfdrift-falco --config config.yaml
# Or with Docker
docker run -d \
--name tfdrift-falco \
-v $(pwd)/config.yaml:/config/config.yaml:ro \
-v ~/.aws:/root/.aws:ro \
ghcr.io/higakikeita/tfdrift-falco:v0.3.0 \
--config /config/config.yaml
📖 Documentation
Comprehensive service documentation available:
- RDS Service Guide - 600+ lines covering all 31 events
- VPC Service Guide - Complete network coverage
- SageMaker Service Guide - ML infrastructure monitoring
- DynamoDB Service Guide - Data protection tracking
Each guide includes:
- Supported CloudTrail events
- Terraform resource mappings
- Falco rule examples
- Real-world drift scenarios
- Security best practices
- Troubleshooting guides
🔬 Real-World Use Cases
Use Case 1: Prevent Database Exposure
Scenario: DevOps engineer accidentally makes RDS instance publicly accessible via AWS Console during troubleshooting.
Detection:
[2025-12-14 15:23:45] CRITICAL Drift Detected
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Resource: aws_db_instance.production_db
Event: ModifyDBInstanceAttribute
Severity: CRITICAL
Change:
publiclyAccessible: false → true
Context:
User: devops-user@example.com
Source: AWS Console
Region: us-east-1
Security Impact:
- Database exposed to internet
- PCI-DSS violation
- Immediate remediation required
Recommendation:
1. Revert publiclyAccessible to false immediately
2. Review security group rules
3. Update Terraform state
4. Incident report required
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Use Case 2: Track ML Model Deployments
Scenario: Data scientist deploys new ML model version to production endpoint without approval.
Detection:
[2025-12-14 10:15:22] WARNING Drift Detected
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Resource: aws_sagemaker_endpoint.recommendation_engine
Event: UpdateEndpoint
Severity: WARNING
Change:
endpointConfigName: prod-config-v1.2 → prod-config-v1.3
instanceType: ml.m5.xlarge → ml.m5.2xlarge
Context:
User: data-scientist@example.com
Source: SageMaker API
Region: us-east-1
Impact:
- New model version deployed
- Instance type upgraded (cost +100%)
- No A/B testing performed
Recommendation:
1. Review model performance metrics
2. Verify A/B testing approval
3. Update Terraform configuration
4. Monitor inference latency
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Use Case 3: Detect Network Topology Changes
Scenario: Network engineer creates VPC peering connection to external account without security review.
Detection:
[2025-12-14 14:30:18] CRITICAL Drift Detected
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Resource: aws_vpc_peering_connection.external_vendor
Event: CreateVpcPeeringConnection
Severity: CRITICAL
Details:
Requester VPC: vpc-abc123 (production)
Accepter VPC: vpc-xyz789 (external account)
Accepter: 123456789012 (vendor-corp)
Context:
User: network-admin@example.com
Source: AWS Console
Region: us-east-1
Security Risk:
- New network path to external account
- Potential data exfiltration risk
- Security review required
- Compliance impact unknown
Recommendation:
1. Immediate security team notification
2. Review peering connection route tables
3. Verify vendor security posture
4. Document in Terraform after approval
5. Update network security policy
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
🏆 Technical Achievements
100% Test Coverage
Every CloudTrail event has comprehensive test coverage:
$ go test ./pkg/falco/... -v -cover
=== RUN TestMapEventToResourceType
=== RUN TestMapEventToResourceType/RDS_Instance_Attribute_Modify
=== RUN TestMapEventToResourceType/SageMaker_Endpoint_Create
=== RUN TestMapEventToResourceType/DynamoDB_Restore_To_Point_In_Time
=== RUN TestMapEventToResourceType/VPC_Peering_Connection_Create
=== RUN TestMapEventToResourceType/Transit_Gateway_Create
... (203 tests)
--- PASS: TestMapEventToResourceType (0.00s)
PASS
coverage: 100.0% of statements
Event Name Conflict Resolution
Documented handling of CloudTrail event name conflicts:
// Note: CreateModel/DeleteModel events conflict with API Gateway events
// SageMaker model events cannot be distinguished from API Gateway model
// events without eventSource field (future enhancement)
Terraform Resource Mapping
Complete mapping of all 203 CloudTrail events to Terraform resource types:
| CloudTrail Event | Terraform Resource | Service |
|---|---|---|
| CreateVpcPeeringConnection | aws_vpc_peering_connection | VPC |
| CreateEndpoint | aws_sagemaker_endpoint | SageMaker |
| RestoreTableToPointInTime | aws_dynamodb_table | DynamoDB |
| CreateDBInstanceReadReplica | aws_db_instance | RDS |
| CreateTransitGateway | aws_ec2_transit_gateway | VPC |
📈 Growth Metrics
Development Timeline
Phase 1.0 (MVP)
├─ v0.1.0: 36 events, 5 services (baseline)
└─ v0.2.0: 95 events, 10 services (+164% events)
Phase 1.5 (Enhanced Coverage)
├─ ECS/EKS: +25 events (containers)
├─ Lambda Enhanced: +10 events (serverless)
├─ EC2 Enhanced: +17 events (compute)
├─ ElastiCache: +12 events (caching)
├─ Auto Scaling: +10 events (capacity)
├─ RDS Enhanced: +31 events (databases)
├─ DynamoDB Enhanced: +14 events (NoSQL)
├─ VPC Enhanced: +42 events (networking)
└─ SageMaker: +16 events (ML) 🆕
v0.3.0: 203 events, 19 services (+114% from v0.2.0)
Community Impact
- GitHub Stars: Growing community adoption
- Docker Pulls: Production deployments increasing
- Documentation: 5,000+ lines of comprehensive guides
- Test Coverage: 100% (all 203 events tested)
🔮 What's Next: Phase 2
While v0.3.0 completes our AWS coverage goals, we're already planning Phase 2:
Multi-Cloud Support
- GCP Audit Logs - Google Cloud Platform drift detection
- Azure Activity Logs - Microsoft Azure monitoring
- Multi-cloud unified dashboard
Advanced Features
- Drift Auto-Remediation - Automatic rollback of unauthorized changes
- Policy-as-Code Integration - OPA/Rego policy enforcement
- Machine Learning Anomaly Detection - AI-powered drift prediction
- Terraform Plan Generation - Auto-generate HCL from drift events
Enterprise Features
- Multi-Account/Multi-Org Support - Centralized monitoring
- RBAC & Team Management - Role-based access control
- Compliance Reporting - Automated audit reports
- SaaS Offering - Managed drift detection service
🤝 Contributing
TFDrift-Falco is open source and welcomes contributions!
Ways to Contribute
- Report Issues - GitHub Issues
- Request Features - GitHub Discussions
- Submit PRs - See CONTRIBUTING.md
- Improve Documentation - Help expand service guides
- Share Use Cases - Tell us how you use TFDrift-Falco
Development Setup
# Clone and build
git clone https://github.com/higakikeita/tfdrift-falco.git
cd tfdrift-falco
go mod download
# Run tests
go test ./... -v -cover
# Run with race detection
go test -race ./...
# Build
make build
🙏 Acknowledgments
Special thanks to:
- Falco Community - For the incredible CloudTrail plugin
- Terraform Community - For comprehensive AWS provider documentation
- AWS Community - For CloudTrail event specifications
- Early Adopters - For valuable feedback and testing
- Contributors - For bug reports and feature requests
📞 Get in Touch
- Website: tfdrift-falco.vercel.app
- GitHub: github.com/higakikeita/tfdrift-falco
- Documentation: tfdrift-falco.vercel.app/docs
- Issues: GitHub Issues
- Discussions: GitHub Discussions
🎉 Try v0.3.0 Today!
# Quick start with Docker
docker run -d \
--name tfdrift-falco \
-e TF_STATE_BACKEND=s3 \
-e TF_STATE_S3_BUCKET=your-terraform-state \
-e TF_STATE_S3_KEY=prod/terraform.tfstate \
-e AWS_REGION=us-east-1 \
-e SLACK_WEBHOOK_URL=https://hooks.slack.com/services/... \
-v ~/.aws:/root/.aws:ro \
ghcr.io/higakikeita/tfdrift-falco:v0.3.0
# View logs
docker logs -f tfdrift-falco
Start monitoring your infrastructure in real-time today! 🚀
TFDrift-Falco v0.3.0 - Real-time Terraform Drift Detection Powered by Falco
203 CloudTrail Events • 19 AWS Services • 100% Test Coverage • Production Ready