Back to Blog
Keita Higaki

TFDrift-Falco v0.3.0 Released: 203 CloudTrail Events Across 19 AWS Services

Major milestone achieved! v0.3.0 delivers comprehensive AWS drift detection with 203 CloudTrail events (103% of target), covering 19 AWS services including SageMaker, enhanced DynamoDB, VPC, and RDS support.

releasemilestonev0.3.0awsterraformdrift-detection

TFDrift-Falco v0.3.0 Released: 203 CloudTrail Events Across 19 AWS Services

We're thrilled to announce the official release of TFDrift-Falco v0.3.0! This major milestone delivers comprehensive AWS infrastructure drift detection, achieving 103% of our target with 203 CloudTrail events across 19 AWS services.

🎯 Milestone Achievement

Metricv0.2.0 (Starting Point)v0.3.0 (Released)Growth
CloudTrail Events95 events203 events+114%
AWS Services10 services19 services+90%
Test Coverage80%100%+25%
Target Achievement48% (95/198)103% (203/198)🎉

🚀 What's New in v0.3.0

Phase 1.5: Enhanced AWS Coverage (Complete ✅)

v0.3.0 represents the completion of Phase 1.5, adding 108 new CloudTrail events across 9 services:

1️⃣ RDS Enhanced (31 events total)

Comprehensive database drift detection across all RDS resource types:

  • DB Instances & Read Replicas
  • Aurora Clusters & Global Tables
  • Snapshots & Point-in-Time Recovery
  • Parameter Groups & Subnet Groups
  • Option Groups

Why it matters: Detect unauthorized database changes that could expose data, violate compliance, or impact costs.

2️⃣ VPC Enhanced (42 events total - #1 coverage!)

Complete network infrastructure monitoring:

  • VPC Peering Connections
  • Transit Gateway & VPC Attachments
  • VPC Flow Logs
  • Network Firewall
  • Security Groups, Route Tables, ACLs, Endpoints

Why it matters: Network configuration drift can create security vulnerabilities and compliance violations.

3️⃣ SageMaker (16 events - NEW! 🆕)

ML infrastructure drift detection:

  • Endpoint Management (deployment tracking)
  • Training Jobs (resource consumption)
  • Model Packages (model registry governance)
  • Notebook Instances (development environment security)

Why it matters: Track ML model deployments and prevent unauthorized training jobs that consume expensive resources.

4️⃣ DynamoDB Enhanced (14 events total)

Advanced data protection monitoring:

  • Point-in-Time Recovery (PITR)
  • Backup Management
  • Global Tables (multi-region replication)
  • Kinesis Streaming Destinations
  • Contributor Insights

Why it matters: Ensure data resilience and track multi-region table configurations.

5️⃣ Lambda Enhanced (10 events)

Complete serverless monitoring:

  • Function Configuration & Code
  • Event Source Mappings
  • Permissions & Concurrency

6️⃣ EC2 Enhanced (17 events)

Comprehensive compute infrastructure:

  • Instance Lifecycle
  • AMI Management
  • EBS Volumes & Snapshots
  • Network Interfaces

7️⃣ ElastiCache (12 events)

Redis and Memcached drift detection:

  • Cache Clusters
  • Replication Groups
  • Parameter Groups

8️⃣ Auto Scaling (10 events)

Dynamic capacity tracking:

  • Auto Scaling Groups
  • Launch Configurations
  • Scaling Policies
  • Scheduled Actions

9️⃣ ECS & EKS (25 events combined)

Container orchestration monitoring:

  • ECS Services, Tasks, Clusters
  • EKS Clusters, Node Groups, Addons

📊 Service Coverage Rankings

Top 10 services by event coverage:

RankServiceEventsCoverage
🥇VPC/Networking42Security Groups, Peering, Transit Gateway, Flow Logs, Firewall
🥈RDS31Instances, Clusters, Snapshots, Parameter Groups
🥉EC217Instances, AMIs, EBS, Snapshots, Network Interfaces
4SageMaker 🆕16Endpoints, Training, Models, Notebooks
5ELB/ALB15Load Balancers, Target Groups, Listeners
6DynamoDB14Tables, PITR, Backups, Global Tables
7IAM14Roles, Users, Groups, Policies
8ECS13Services, Tasks, Clusters
9EKS12Clusters, Node Groups, Addons
10ElastiCache12Cache Clusters, Replication Groups

Plus: KMS (10), Lambda (10), Auto Scaling (10), S3 (8), ECR (1)

🔥 Key Features

1. Real-Time Drift Detection

Instant alerts when infrastructure changes occur:

- rule: Critical Infrastructure Change
  desc: Detect high-impact infrastructure modifications
  condition: >
    ct.name in (
      ModifyDBInstanceAttribute,
      ModifyDBParameterGroup,
      CreateVpcPeeringConnection,
      CreateTransitGateway,
      DeleteFirewall,
      CreateEndpoint,
      RestoreTableToPointInTime
    )
  output: >
    Critical infrastructure change detected
    (user=%ct.user service=%ct.source event=%ct.name
     resource=%ct.resource region=%ct.region)
  priority: CRITICAL
  source: aws_cloudtrail
  tags: [terraform, drift, critical]

2. Security-First Design

Track security-critical changes:

  • RDS: Public access exposure, encryption disabled, snapshot deletion
  • VPC: Peering connections, transit gateway creation, firewall deletion
  • DynamoDB: PITR disabled, backup deletion
  • SageMaker: Unauthorized notebook instances, endpoint deployment

3. Compliance Ready

Support for major compliance frameworks:

  • SOC2 (change tracking, access control)
  • PCI-DSS (encryption, network isolation)
  • HIPAA (data protection, audit trails)
  • GDPR (data residency, access logging)

4. Cost Visibility

Track cost-impacting changes:

  • RDS instance type upgrades
  • Read replica creation
  • SageMaker training jobs
  • EC2 instance modifications
  • Global table replication

🎬 Getting Started

1. Installation

# Clone repository
git clone https://github.com/higakikeita/tfdrift-falco.git
cd tfdrift-falco

# Build and install
make install

# Or use Docker
docker pull ghcr.io/higakikeita/tfdrift-falco:v0.3.0

2. Quick Start Configuration

# config.yaml
providers:
  aws:
    enabled: true
    regions:
      - us-east-1
      - us-west-2

falco:
  enabled: true
  hostname: "localhost"
  port: 5060

notifications:
  slack:
    enabled: true
    webhook_url: "${SLACK_WEBHOOK_URL}"
    channel: "#infrastructure-alerts"

3. Run TFDrift-Falco

# Start monitoring
tfdrift-falco --config config.yaml

# Or with Docker
docker run -d \
  --name tfdrift-falco \
  -v $(pwd)/config.yaml:/config/config.yaml:ro \
  -v ~/.aws:/root/.aws:ro \
  ghcr.io/higakikeita/tfdrift-falco:v0.3.0 \
  --config /config/config.yaml

📖 Documentation

Comprehensive service documentation available:

Each guide includes:

  • Supported CloudTrail events
  • Terraform resource mappings
  • Falco rule examples
  • Real-world drift scenarios
  • Security best practices
  • Troubleshooting guides

🔬 Real-World Use Cases

Use Case 1: Prevent Database Exposure

Scenario: DevOps engineer accidentally makes RDS instance publicly accessible via AWS Console during troubleshooting.

Detection:

[2025-12-14 15:23:45] CRITICAL Drift Detected
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Resource:     aws_db_instance.production_db
Event:        ModifyDBInstanceAttribute
Severity:     CRITICAL

Change:
  publiclyAccessible: false → true

Context:
  User:         devops-user@example.com
  Source:       AWS Console
  Region:       us-east-1

Security Impact:
  - Database exposed to internet
  - PCI-DSS violation
  - Immediate remediation required

Recommendation:
  1. Revert publiclyAccessible to false immediately
  2. Review security group rules
  3. Update Terraform state
  4. Incident report required
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Use Case 2: Track ML Model Deployments

Scenario: Data scientist deploys new ML model version to production endpoint without approval.

Detection:

[2025-12-14 10:15:22] WARNING Drift Detected
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Resource:     aws_sagemaker_endpoint.recommendation_engine
Event:        UpdateEndpoint
Severity:     WARNING

Change:
  endpointConfigName: prod-config-v1.2 → prod-config-v1.3
  instanceType: ml.m5.xlarge → ml.m5.2xlarge

Context:
  User:         data-scientist@example.com
  Source:       SageMaker API
  Region:       us-east-1

Impact:
  - New model version deployed
  - Instance type upgraded (cost +100%)
  - No A/B testing performed

Recommendation:
  1. Review model performance metrics
  2. Verify A/B testing approval
  3. Update Terraform configuration
  4. Monitor inference latency
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Use Case 3: Detect Network Topology Changes

Scenario: Network engineer creates VPC peering connection to external account without security review.

Detection:

[2025-12-14 14:30:18] CRITICAL Drift Detected
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Resource:     aws_vpc_peering_connection.external_vendor
Event:        CreateVpcPeeringConnection
Severity:     CRITICAL

Details:
  Requester VPC:  vpc-abc123 (production)
  Accepter VPC:   vpc-xyz789 (external account)
  Accepter:       123456789012 (vendor-corp)

Context:
  User:         network-admin@example.com
  Source:       AWS Console
  Region:       us-east-1

Security Risk:
  - New network path to external account
  - Potential data exfiltration risk
  - Security review required
  - Compliance impact unknown

Recommendation:
  1. Immediate security team notification
  2. Review peering connection route tables
  3. Verify vendor security posture
  4. Document in Terraform after approval
  5. Update network security policy
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

🏆 Technical Achievements

100% Test Coverage

Every CloudTrail event has comprehensive test coverage:

$ go test ./pkg/falco/... -v -cover

=== RUN   TestMapEventToResourceType
=== RUN   TestMapEventToResourceType/RDS_Instance_Attribute_Modify
=== RUN   TestMapEventToResourceType/SageMaker_Endpoint_Create
=== RUN   TestMapEventToResourceType/DynamoDB_Restore_To_Point_In_Time
=== RUN   TestMapEventToResourceType/VPC_Peering_Connection_Create
=== RUN   TestMapEventToResourceType/Transit_Gateway_Create
... (203 tests)
--- PASS: TestMapEventToResourceType (0.00s)
PASS
coverage: 100.0% of statements

Event Name Conflict Resolution

Documented handling of CloudTrail event name conflicts:

// Note: CreateModel/DeleteModel events conflict with API Gateway events
// SageMaker model events cannot be distinguished from API Gateway model
// events without eventSource field (future enhancement)

Terraform Resource Mapping

Complete mapping of all 203 CloudTrail events to Terraform resource types:

CloudTrail EventTerraform ResourceService
CreateVpcPeeringConnectionaws_vpc_peering_connectionVPC
CreateEndpointaws_sagemaker_endpointSageMaker
RestoreTableToPointInTimeaws_dynamodb_tableDynamoDB
CreateDBInstanceReadReplicaaws_db_instanceRDS
CreateTransitGatewayaws_ec2_transit_gatewayVPC

📈 Growth Metrics

Development Timeline

Phase 1.0 (MVP)
├─ v0.1.0: 36 events, 5 services (baseline)
└─ v0.2.0: 95 events, 10 services (+164% events)

Phase 1.5 (Enhanced Coverage)
├─ ECS/EKS: +25 events (containers)
├─ Lambda Enhanced: +10 events (serverless)
├─ EC2 Enhanced: +17 events (compute)
├─ ElastiCache: +12 events (caching)
├─ Auto Scaling: +10 events (capacity)
├─ RDS Enhanced: +31 events (databases)
├─ DynamoDB Enhanced: +14 events (NoSQL)
├─ VPC Enhanced: +42 events (networking)
└─ SageMaker: +16 events (ML) 🆕

v0.3.0: 203 events, 19 services (+114% from v0.2.0)

Community Impact

  • GitHub Stars: Growing community adoption
  • Docker Pulls: Production deployments increasing
  • Documentation: 5,000+ lines of comprehensive guides
  • Test Coverage: 100% (all 203 events tested)

🔮 What's Next: Phase 2

While v0.3.0 completes our AWS coverage goals, we're already planning Phase 2:

Multi-Cloud Support

  • GCP Audit Logs - Google Cloud Platform drift detection
  • Azure Activity Logs - Microsoft Azure monitoring
  • Multi-cloud unified dashboard

Advanced Features

  • Drift Auto-Remediation - Automatic rollback of unauthorized changes
  • Policy-as-Code Integration - OPA/Rego policy enforcement
  • Machine Learning Anomaly Detection - AI-powered drift prediction
  • Terraform Plan Generation - Auto-generate HCL from drift events

Enterprise Features

  • Multi-Account/Multi-Org Support - Centralized monitoring
  • RBAC & Team Management - Role-based access control
  • Compliance Reporting - Automated audit reports
  • SaaS Offering - Managed drift detection service

🤝 Contributing

TFDrift-Falco is open source and welcomes contributions!

Ways to Contribute

  1. Report Issues - GitHub Issues
  2. Request Features - GitHub Discussions
  3. Submit PRs - See CONTRIBUTING.md
  4. Improve Documentation - Help expand service guides
  5. Share Use Cases - Tell us how you use TFDrift-Falco

Development Setup

# Clone and build
git clone https://github.com/higakikeita/tfdrift-falco.git
cd tfdrift-falco
go mod download

# Run tests
go test ./... -v -cover

# Run with race detection
go test -race ./...

# Build
make build

🙏 Acknowledgments

Special thanks to:

  • Falco Community - For the incredible CloudTrail plugin
  • Terraform Community - For comprehensive AWS provider documentation
  • AWS Community - For CloudTrail event specifications
  • Early Adopters - For valuable feedback and testing
  • Contributors - For bug reports and feature requests

📞 Get in Touch


🎉 Try v0.3.0 Today!

# Quick start with Docker
docker run -d \
  --name tfdrift-falco \
  -e TF_STATE_BACKEND=s3 \
  -e TF_STATE_S3_BUCKET=your-terraform-state \
  -e TF_STATE_S3_KEY=prod/terraform.tfstate \
  -e AWS_REGION=us-east-1 \
  -e SLACK_WEBHOOK_URL=https://hooks.slack.com/services/... \
  -v ~/.aws:/root/.aws:ro \
  ghcr.io/higakikeita/tfdrift-falco:v0.3.0

# View logs
docker logs -f tfdrift-falco

Start monitoring your infrastructure in real-time today! 🚀


TFDrift-Falco v0.3.0 - Real-time Terraform Drift Detection Powered by Falco

203 CloudTrail Events • 19 AWS Services • 100% Test Coverage • Production Ready