Skip to content

Commit 0eba951

Browse files
authored
Merge pull request #70 from aws-samples/bug/toc-comments
Removed space before toc comment to fix relative links within README …
2 parents 23406b9 + 1eb4b65 commit 0eba951

File tree

29 files changed

+310
-310
lines changed

29 files changed

+310
-310
lines changed

CHANGELOG.md

+14-14
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
# Change Log <!-- omit in toc -->
1+
# Change Log<!-- omit in toc -->
22

3-
## Table of Contents <!-- omit in toc -->
3+
## Table of Contents<!-- omit in toc -->
44

55
- [Introduction](#introduction)
66
- [2021-11-22](#2021-11-22)
@@ -19,33 +19,33 @@ All notable changes to this project will be documented in this file.
1919

2020
## 2021-11-22
2121

22-
### Added <!-- omit in toc -->
22+
### Added<!-- omit in toc -->
2323

2424
- EC2 Default EBS Encryption solution
2525

26-
### Changed <!-- omit in toc -->
26+
### Changed<!-- omit in toc -->
2727

2828
- Nothing Changed
2929

3030
## 2021-11-20
3131

32-
### Added <!-- omit in toc -->
32+
### Added<!-- omit in toc -->
3333

3434
- S3 Block Account Public Access solution
3535

36-
### Changed <!-- omit in toc -->
36+
### Changed<!-- omit in toc -->
3737

3838
- Nothing Changed
3939

4040
## 2021-11-19
4141

42-
### Added <!-- omit in toc -->
42+
### Added<!-- omit in toc -->
4343

4444
- Added `.flake8`, `poetry.lock`, `pyproject.toml`, and `.markdownlint.json` to define coding standards that we will require and use when building future solutions. Contributors should use the standards defined within these files before submitting
4545
pull requests. Existing solutions will get refactored to these standards in future updates.
4646
- Added S3 `BucketKeyEnabled` to the solutions that create S3 objects (e.g. CloudTrail, GuardDuty, and Macie)
4747

48-
### Changed <!-- omit in toc -->
48+
### Changed<!-- omit in toc -->
4949

5050
- Removed the AWS Config Aggregator account solution since AWS Control Tower deploys an account aggregator within the Audit account.
5151
- Modified the directory structure to support multiple internal packages (e.g. 1 for each solution). The folder structure also allows for tests (integration, unit, etc.). See
@@ -58,33 +58,33 @@ All notable changes to this project will be documented in this file.
5858

5959
## 2021-09-02
6060

61-
### Added <!-- omit in toc -->
61+
### Added<!-- omit in toc -->
6262

6363
- Nothing Added
6464

65-
### Changed <!-- omit in toc -->
65+
### Changed<!-- omit in toc -->
6666

6767
- Removed all code and references to AWS Landing Zone as it is currently in Long-term Support and will not receive any additional features.
6868

69-
### Fixed <!-- omit in toc -->
69+
### Fixed<!-- omit in toc -->
7070

7171
- Nothing Fixed
7272

7373
---
7474

7575
## 2021-09-01
7676

77-
### Added <!-- omit in toc -->
77+
### Added<!-- omit in toc -->
7878

7979
- AWS IAM Access Analyzer solution
8080
- Organization AWS Config Aggregator Solution
8181
- Common Register Delegated Administrator Solution
8282

83-
### Changed <!-- omit in toc -->
83+
### Changed<!-- omit in toc -->
8484

8585
- Nothing Changed
8686

87-
### Fixed <!-- omit in toc -->
87+
### Fixed<!-- omit in toc -->
8888

8989
- Nothing Fixed
9090

CONTRIBUTING.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
# Contributing Guidelines <!-- omit in toc -->
1+
# Contributing Guidelines<!-- omit in toc -->
22

3-
## Table of Contents <!-- omit in toc -->
3+
## Table of Contents<!-- omit in toc -->
44

55
- [Introduction](#introduction)
66
- [Reporting Bugs/Feature Requests](#reporting-bugsfeature-requests)

GENERAL-CONTRIBUTING-GUIDANCE.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
# General Guidance for Contributing <!-- omit in toc -->
1+
# General Guidance for Contributing<!-- omit in toc -->
22

3-
## Table of Contents <!-- omit in toc -->
3+
## Table of Contents<!-- omit in toc -->
44

55
- [CloudFormation](#cloudformation)
66
- [Encryption](#encryption)

README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
# AWS Security Reference Architecture Examples <!-- omit in toc -->
1+
# AWS Security Reference Architecture Examples<!-- omit in toc -->
22

33
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-Identifier: CC-BY-SA-4.0
44

5-
## Table of Contents <!-- omit in toc -->
5+
## Table of Contents<!-- omit in toc -->
66

77
- [Introduction](#introduction)
88
- [Example Solutions](#example-solutions)

aws_sra_examples/solutions/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
# Solutions <!-- omit in toc -->
1+
# Solutions<!-- omit in toc -->
22

33
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-Identifier: CC-BY-SA-4.0
44

5-
## Table of Contents <!-- omit in toc -->
5+
## Table of Contents<!-- omit in toc -->
66

77
- [Introduction](#introduction)
88
- [Solutions Folder layout](#solutions-folder-layout)

aws_sra_examples/solutions/cloudtrail/cloudtrail_org/README.md

+24-24
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
# Organization CloudTrail <!-- omit in toc -->
1+
# Organization CloudTrail<!-- omit in toc -->
22

33
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-Identifier: CC-BY-SA-4.0
44

5-
## Table of Contents <!-- omit in toc -->
5+
## Table of Contents<!-- omit in toc -->
66

77
- [Introduction](#introduction)
88
- [Deployed Resource Details](#deployed-resource-details)
@@ -25,76 +25,76 @@ what types of events are logged, or otherwise alter the organization trail in an
2525

2626
![Architecture](./documentation/sra-cloudtrail-org.png)
2727

28-
### 1.0 Organization Management Account <!-- omit in toc -->
28+
### 1.0 Organization Management Account<!-- omit in toc -->
2929

30-
#### 1.1 AWS CloudFormation <!-- omit in toc -->
30+
#### 1.1 AWS CloudFormation<!-- omit in toc -->
3131

3232
- All resources are deployed via AWS CloudFormation as a `StackSet` and `Stack Instance` within the management account or a CloudFormation `Stack` within a specific account.
3333
- The [Customizations for AWS Control Tower](https://aws.amazon.com/solutions/implementations/customizations-for-aws-control-tower/) solution deploys all templates as a CloudFormation `StackSet`.
3434
- For parameter details, review the [AWS CloudFormation templates](templates/).
3535

36-
#### 1.2 AWS Lambda Function <!-- omit in toc -->
36+
#### 1.2 AWS Lambda Function<!-- omit in toc -->
3737

3838
- The Lambda Function contains logic for configuring the AWS Organization CloudTrail within the `management account`.
3939

40-
#### 1.3 Lambda Execution IAM Role <!-- omit in toc -->
40+
#### 1.3 Lambda Execution IAM Role<!-- omit in toc -->
4141

4242
- The AWS Lambda Function Role allows the AWS Lambda service to assume the role and perform actions defined in the attached IAM policies.
4343

44-
#### 1.4 Lambda CloudWatch Log Group <!-- omit in toc -->
44+
#### 1.4 Lambda CloudWatch Log Group<!-- omit in toc -->
4545

4646
- All the `AWS Lambda Function` logs are sent to a CloudWatch Log Group `</aws/lambda/<LambdaFunctionName>` to help with debugging and traceability of the actions performed.
4747
- By default the `AWS Lambda Function` will create the CloudWatch Log Group with a `Retention` (14 days) and are encrypted with a CloudWatch Logs service managed encryption key.
4848

49-
#### 1.5 Organization CloudTrail <!-- omit in toc -->
49+
#### 1.5 Organization CloudTrail<!-- omit in toc -->
5050

5151
- AWS CloudTrail for all AWS Organization accounts
5252
- Member accounts are automatically added and cannot modify
5353
- Data events can be disabled via the parameters
5454
- CloudWatch logs can be disabled via the parameters
5555

56-
#### 1.6 Organization CloudTrail CloudWatch Log Group Role <!-- omit in toc -->
56+
#### 1.6 Organization CloudTrail CloudWatch Log Group Role<!-- omit in toc -->
5757

5858
- IAM role used to send CloudTrail logs to the CloudWatch log group
5959

60-
#### 1.7 Organization CloudTrail CloudWatch Log Group <!-- omit in toc -->
60+
#### 1.7 Organization CloudTrail CloudWatch Log Group<!-- omit in toc -->
6161

6262
- Contains the CloudTrail logs with a `Retention` (400 days)
6363

6464
---
6565

66-
### 2.0 Audit Account <!-- omit in toc -->
66+
### 2.0 Audit Account<!-- omit in toc -->
6767

68-
#### 2.1 AWS CloudFormation <!-- omit in toc -->
68+
#### 2.1 AWS CloudFormation<!-- omit in toc -->
6969

7070
- See [1.1 AWS CloudFormation](#11-aws-cloudformation)
7171

72-
#### 2.2 Organization CloudTrail KMS Key <!-- omit in toc -->
72+
#### 2.2 Organization CloudTrail KMS Key<!-- omit in toc -->
7373

7474
- Customer managed KMS key for the AWS Organizations CloudTrail logs and S3 server-side encryption
7575

7676
---
7777

78-
### 3.0 Security Log Archive Account <!-- omit in toc -->
78+
### 3.0 Security Log Archive Account<!-- omit in toc -->
7979

80-
#### 3.1 AWS CloudFormation <!-- omit in toc -->
80+
#### 3.1 AWS CloudFormation<!-- omit in toc -->
8181

8282
- See [1.1 AWS CloudFormation](#11-aws-cloudformation)
8383

84-
#### 3.2 Organization CloudTrail S3 Bucket <!-- omit in toc -->
84+
#### 3.2 Organization CloudTrail S3 Bucket<!-- omit in toc -->
8585

8686
- S3 bucket where the Organization CloudTrail logs are sent for all accounts in the AWS Organization
8787

8888
---
8989

9090
## Implementation Instructions
9191

92-
### Prerequisites <!-- omit in toc -->
92+
### Prerequisites<!-- omit in toc -->
9393

9494
- AWS Control Tower is deployed.
9595
- `aws-security-reference-architecture-examples` repository is stored on your local machine or location where you will be deploying from.
9696

97-
### Staging <!-- omit in toc -->
97+
### Staging<!-- omit in toc -->
9898

9999
1. In the `management account (home region)`, launch the AWS CloudFormation **Stack** using the [prereq-controltower-execution-role.yaml](../../../utils/aws_control_tower/prerequisites/prereq-controltower-execution-role.yaml) template file as the
100100
source, to implement the `AWSControlTowerExecution` role pre-requisite.
@@ -138,13 +138,13 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
138138
--src_dir "$SRA_REPO"/aws_sra_examples/solutions/cloudtrail/cloudtrail_org/lambda/src
139139
```
140140

141-
### Solution Deployment <!-- omit in toc -->
141+
### Solution Deployment<!-- omit in toc -->
142142

143-
#### Customizations for AWS Control Tower <!-- omit in toc -->
143+
#### Customizations for AWS Control Tower<!-- omit in toc -->
144144

145145
- [Customizations for AWS Control Tower](./customizations_for_aws_control_tower)
146146

147-
#### AWS CloudFormation <!-- omit in toc -->
147+
#### AWS CloudFormation<!-- omit in toc -->
148148

149149
1. In the `management account (home region)`, launch an AWS CloudFormation **Stack Set** and deploy to the `Audit account (home region)` using the [sra-cloudtrail-kms.yaml](templates/sra-cloudtrail-org-kms.yaml) template file as the source.
150150
2. In the `management account (home region)`, launch an AWS CloudFormation **Stack Set** and deploy to the `Log Archive account (home region)` using the [sra-cloudtrail-org-bucket.yaml](templates/sra-cloudtrail-org-bucket.yaml) template file as the
@@ -157,13 +157,13 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
157157
> - Update any metric filters and any other resources that reference the CloudWatch Log Group
158158
> - If a CloudWatch Log Group Subscription is used for forwarding the logs, remove the Subscription from the old group and add it to the new group
159159
160-
#### Verify Solution Deployment <!-- omit in toc -->
160+
#### Verify Solution Deployment<!-- omit in toc -->
161161

162162
1. Log into the `Management account` and navigate to the CloudTrail page
163163
2. Select Trails and select the "sra-cloudtrail-org" trail
164164
3. Verify the correct configurations have been applied
165165

166-
#### Solution Delete Instructions <!-- omit in toc -->
166+
#### Solution Delete Instructions<!-- omit in toc -->
167167

168168
1. In the `management account (home region)`, delete the AWS CloudFormation **Stack** created in step 3 of the solution deployment.
169169
2. In the `management account (home region)`, delete the AWS CloudFormation **StackSet** created in step 2 of the solution deployment. **Note:** there should not be any `stack instances` associated with this StackSet.
@@ -174,7 +174,7 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
174174

175175
## Appendix
176176

177-
### CloudFormation StackSet Instructions <!-- omit in toc -->
177+
### CloudFormation StackSet Instructions<!-- omit in toc -->
178178

179179
If you need to launch an AWS CloudFormation **StackSet** in the `management account`, see below steps (for additional details, see
180180
[Create a stack set with self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-getting-started-create.html#stacksets-getting-started-create-self-managed))

aws_sra_examples/solutions/cloudtrail/cloudtrail_org/customizations_for_aws_control_tower/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
# Customizations for AWS Control Tower Implementation Instructions <!-- omit in toc -->
1+
# Customizations for AWS Control Tower Implementation Instructions<!-- omit in toc -->
22

33
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-Identifier: CC-BY-SA-4.0
44

55
---
66

7-
## Table of Contents <!-- omit in toc -->
7+
## Table of Contents<!-- omit in toc -->
88

99
- [Version 1 Solution Deployment](#version-1-solution-deployment)
1010
- [Version 2 Solution Deployment](#version-2-solution-deployment)

aws_sra_examples/solutions/common/common_register_delegated_administrator/README.md

+18-18
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
# Register Delegated Administrator Account <!-- omit in toc -->
1+
# Register Delegated Administrator Account<!-- omit in toc -->
22

33
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-Identifier: CC-BY-SA-4.0
44

5-
## Table of Contents <!-- omit in toc -->
5+
## Table of Contents<!-- omit in toc -->
66

77
- [Introduction](#introduction)
88
- [Deployed Resource Details](#deployed-resource-details)
@@ -22,35 +22,35 @@ The register delegated administrator account solution is a common solution to re
2222

2323
![Architecture](./documentation/sra-common-register-delegated-administrator.png)
2424

25-
### 1.0 Organization Management Account <!-- omit in toc -->
25+
### 1.0 Organization Management Account<!-- omit in toc -->
2626

27-
#### 1.1 AWS CloudFormation <!-- omit in toc -->
27+
#### 1.1 AWS CloudFormation<!-- omit in toc -->
2828

2929
- All resources are deployed via AWS CloudFormation as a `StackSet` and `Stack Instance` within the management account or a CloudFormation `Stack` within a specific account.
3030
- The [Customizations for AWS Control Tower](https://aws.amazon.com/solutions/implementations/customizations-for-aws-control-tower/) solution deploys all templates as a CloudFormation `StackSet`.
3131
- For parameter details, review the [AWS CloudFormation templates](templates/).
3232

33-
#### 1.2 AWS Lambda Function <!-- omit in toc -->
33+
#### 1.2 AWS Lambda Function<!-- omit in toc -->
3434

3535
- The Lambda function delegates the administrator account for the provided service principals
3636

37-
#### 1.3 Lambda CloudWatch Log Group <!-- omit in toc -->
37+
#### 1.3 Lambda CloudWatch Log Group<!-- omit in toc -->
3838

3939
- Contains Lambda function execution logs
4040

41-
#### 1.4 Lambda Execution IAM Role <!-- omit in toc -->
41+
#### 1.4 Lambda Execution IAM Role<!-- omit in toc -->
4242

4343
- IAM role used by the Lambda function to enable AWS service access for the provided service and register an AWS account as the delegated administrator.
4444

45-
#### 1.5 AWS Organizations <!-- omit in toc -->
45+
#### 1.5 AWS Organizations<!-- omit in toc -->
4646

4747
- AWS Organizations APIs are used to delegate the administrator account
4848

4949
---
5050

51-
### 2.0 Delegated Administrator Account (Audit) <!-- omit in toc -->
51+
### 2.0 Delegated Administrator Account (Audit)<!-- omit in toc -->
5252

53-
#### 2.1 Services Supported <!-- omit in toc -->
53+
#### 2.1 Services Supported<!-- omit in toc -->
5454

5555
- The services that support a delegated administrator account can be configured and managed within this account.
5656
- Service Principal Mapping
@@ -70,12 +70,12 @@ The register delegated administrator account solution is a common solution to re
7070

7171
## Implementation Instructions
7272

73-
### Prerequisites <!-- omit in toc -->
73+
### Prerequisites<!-- omit in toc -->
7474

7575
- AWS Control Tower is deployed.
7676
- `aws-security-reference-architecture-examples` repository is stored on your local machine or location where you will be deploying from.
7777

78-
### Staging <!-- omit in toc -->
78+
### Staging<!-- omit in toc -->
7979

8080
1. In the `management account (home region)`, launch the AWS CloudFormation **Stack** using the [prereq-controltower-execution-role.yaml](../../../utils/aws_control_tower/prerequisites/prereq-controltower-execution-role.yaml) source, to implement the
8181
`AWSControlTowerExecution` role pre-requisite.
@@ -119,17 +119,17 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
119119
--src_dir "$SRA_REPO"/aws_sra_examples/solutions/commmon/common_register_delegated_administrator/lambda/src
120120
```
121121

122-
### Solution Deployment <!-- omit in toc -->
122+
### Solution Deployment<!-- omit in toc -->
123123

124-
#### Customizations for AWS Control Tower <!-- omit in toc -->
124+
#### Customizations for AWS Control Tower<!-- omit in toc -->
125125

126126
- [Customizations for AWS Control Tower](./customizations_for_aws_control_tower)
127127

128-
#### AWS CloudFormation <!-- omit in toc -->
128+
#### AWS CloudFormation<!-- omit in toc -->
129129

130130
1. In the `management account (home region)`, launch an AWS CloudFormation **Stack** using the [sra-common-register-delegated-administrator.yaml](templates/sra-common-register-delegated-administrator.yaml) template file as the source.
131131

132-
#### Verify Solution Deployment <!-- omit in toc -->
132+
#### Verify Solution Deployment<!-- omit in toc -->
133133

134134
- Verify the configuration using the following AWS CLI shell script
135135

@@ -141,7 +141,7 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
141141
--query 'DelegatedServices[*].ServicePrincipal'); done
142142
```
143143

144-
#### Solution Delete Instructions <!-- omit in toc -->
144+
#### Solution Delete Instructions<!-- omit in toc -->
145145

146146
1. In the `management account (home region)`, delete the AWS CloudFormation **Stack** created in step 1 of the solution deployment.
147147
2. In the `management account (home region)`, delete the AWS CloudWatch **Log Group** (e.g. /aws/lambda/<solution_name>) for the Lambda function deployed in step 3 of the solution deployment.
@@ -150,7 +150,7 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
150150

151151
## Appendix
152152

153-
### CloudFormation StackSet Instructions <!-- omit in toc -->
153+
### CloudFormation StackSet Instructions<!-- omit in toc -->
154154

155155
If you need to launch an AWS CloudFormation **StackSet** in the `management account`, see below steps (for additional details, see
156156
[Create a stack set with self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-getting-started-create.html#stacksets-getting-started-create-self-managed))

0 commit comments

Comments
 (0)