You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+14-14
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
# Change Log<!-- omit in toc -->
1
+
# Change Log<!-- omit in toc -->
2
2
3
-
## Table of Contents<!-- omit in toc -->
3
+
## Table of Contents<!-- omit in toc -->
4
4
5
5
-[Introduction](#introduction)
6
6
-[2021-11-22](#2021-11-22)
@@ -19,33 +19,33 @@ All notable changes to this project will be documented in this file.
19
19
20
20
## 2021-11-22
21
21
22
-
### Added<!-- omit in toc -->
22
+
### Added<!-- omit in toc -->
23
23
24
24
- EC2 Default EBS Encryption solution
25
25
26
-
### Changed<!-- omit in toc -->
26
+
### Changed<!-- omit in toc -->
27
27
28
28
- Nothing Changed
29
29
30
30
## 2021-11-20
31
31
32
-
### Added<!-- omit in toc -->
32
+
### Added<!-- omit in toc -->
33
33
34
34
- S3 Block Account Public Access solution
35
35
36
-
### Changed<!-- omit in toc -->
36
+
### Changed<!-- omit in toc -->
37
37
38
38
- Nothing Changed
39
39
40
40
## 2021-11-19
41
41
42
-
### Added<!-- omit in toc -->
42
+
### Added<!-- omit in toc -->
43
43
44
44
- Added `.flake8`, `poetry.lock`, `pyproject.toml`, and `.markdownlint.json` to define coding standards that we will require and use when building future solutions. Contributors should use the standards defined within these files before submitting
45
45
pull requests. Existing solutions will get refactored to these standards in future updates.
46
46
- Added S3 `BucketKeyEnabled` to the solutions that create S3 objects (e.g. CloudTrail, GuardDuty, and Macie)
47
47
48
-
### Changed<!-- omit in toc -->
48
+
### Changed<!-- omit in toc -->
49
49
50
50
- Removed the AWS Config Aggregator account solution since AWS Control Tower deploys an account aggregator within the Audit account.
51
51
- Modified the directory structure to support multiple internal packages (e.g. 1 for each solution). The folder structure also allows for tests (integration, unit, etc.). See
@@ -58,33 +58,33 @@ All notable changes to this project will be documented in this file.
58
58
59
59
## 2021-09-02
60
60
61
-
### Added<!-- omit in toc -->
61
+
### Added<!-- omit in toc -->
62
62
63
63
- Nothing Added
64
64
65
-
### Changed<!-- omit in toc -->
65
+
### Changed<!-- omit in toc -->
66
66
67
67
- Removed all code and references to AWS Landing Zone as it is currently in Long-term Support and will not receive any additional features.
68
68
69
-
### Fixed<!-- omit in toc -->
69
+
### Fixed<!-- omit in toc -->
70
70
71
71
- Nothing Fixed
72
72
73
73
---
74
74
75
75
## 2021-09-01
76
76
77
-
### Added<!-- omit in toc -->
77
+
### Added<!-- omit in toc -->
78
78
79
79
- AWS IAM Access Analyzer solution
80
80
- Organization AWS Config Aggregator Solution
81
81
- Common Register Delegated Administrator Solution
### 1.0 Organization Management Account<!-- omit in toc -->
28
+
### 1.0 Organization Management Account<!-- omit in toc -->
29
29
30
-
#### 1.1 AWS CloudFormation<!-- omit in toc -->
30
+
#### 1.1 AWS CloudFormation<!-- omit in toc -->
31
31
32
32
- All resources are deployed via AWS CloudFormation as a `StackSet` and `Stack Instance` within the management account or a CloudFormation `Stack` within a specific account.
33
33
- The [Customizations for AWS Control Tower](https://aws.amazon.com/solutions/implementations/customizations-for-aws-control-tower/) solution deploys all templates as a CloudFormation `StackSet`.
34
34
- For parameter details, review the [AWS CloudFormation templates](templates/).
35
35
36
-
#### 1.2 AWS Lambda Function<!-- omit in toc -->
36
+
#### 1.2 AWS Lambda Function<!-- omit in toc -->
37
37
38
38
- The Lambda Function contains logic for configuring the AWS Organization CloudTrail within the `management account`.
39
39
40
-
#### 1.3 Lambda Execution IAM Role<!-- omit in toc -->
40
+
#### 1.3 Lambda Execution IAM Role<!-- omit in toc -->
41
41
42
42
- The AWS Lambda Function Role allows the AWS Lambda service to assume the role and perform actions defined in the attached IAM policies.
43
43
44
-
#### 1.4 Lambda CloudWatch Log Group<!-- omit in toc -->
44
+
#### 1.4 Lambda CloudWatch Log Group<!-- omit in toc -->
45
45
46
46
- All the `AWS Lambda Function` logs are sent to a CloudWatch Log Group `</aws/lambda/<LambdaFunctionName>` to help with debugging and traceability of the actions performed.
47
47
- By default the `AWS Lambda Function` will create the CloudWatch Log Group with a `Retention` (14 days) and are encrypted with a CloudWatch Logs service managed encryption key.
48
48
49
-
#### 1.5 Organization CloudTrail<!-- omit in toc -->
49
+
#### 1.5 Organization CloudTrail<!-- omit in toc -->
50
50
51
51
- AWS CloudTrail for all AWS Organization accounts
52
52
- Member accounts are automatically added and cannot modify
53
53
- Data events can be disabled via the parameters
54
54
- CloudWatch logs can be disabled via the parameters
55
55
56
-
#### 1.6 Organization CloudTrail CloudWatch Log Group Role<!-- omit in toc -->
56
+
#### 1.6 Organization CloudTrail CloudWatch Log Group Role<!-- omit in toc -->
57
57
58
58
- IAM role used to send CloudTrail logs to the CloudWatch log group
- Contains the CloudTrail logs with a `Retention` (400 days)
63
63
64
64
---
65
65
66
-
### 2.0 Audit Account<!-- omit in toc -->
66
+
### 2.0 Audit Account<!-- omit in toc -->
67
67
68
-
#### 2.1 AWS CloudFormation<!-- omit in toc -->
68
+
#### 2.1 AWS CloudFormation<!-- omit in toc -->
69
69
70
70
- See [1.1 AWS CloudFormation](#11-aws-cloudformation)
71
71
72
-
#### 2.2 Organization CloudTrail KMS Key<!-- omit in toc -->
72
+
#### 2.2 Organization CloudTrail KMS Key<!-- omit in toc -->
73
73
74
74
- Customer managed KMS key for the AWS Organizations CloudTrail logs and S3 server-side encryption
75
75
76
76
---
77
77
78
-
### 3.0 Security Log Archive Account<!-- omit in toc -->
78
+
### 3.0 Security Log Archive Account<!-- omit in toc -->
79
79
80
-
#### 3.1 AWS CloudFormation<!-- omit in toc -->
80
+
#### 3.1 AWS CloudFormation<!-- omit in toc -->
81
81
82
82
- See [1.1 AWS CloudFormation](#11-aws-cloudformation)
83
83
84
-
#### 3.2 Organization CloudTrail S3 Bucket<!-- omit in toc -->
84
+
#### 3.2 Organization CloudTrail S3 Bucket<!-- omit in toc -->
85
85
86
86
- S3 bucket where the Organization CloudTrail logs are sent for all accounts in the AWS Organization
87
87
88
88
---
89
89
90
90
## Implementation Instructions
91
91
92
-
### Prerequisites<!-- omit in toc -->
92
+
### Prerequisites<!-- omit in toc -->
93
93
94
94
- AWS Control Tower is deployed.
95
95
-`aws-security-reference-architecture-examples` repository is stored on your local machine or location where you will be deploying from.
96
96
97
-
### Staging<!-- omit in toc -->
97
+
### Staging<!-- omit in toc -->
98
98
99
99
1. In the `management account (home region)`, launch the AWS CloudFormation **Stack** using the [prereq-controltower-execution-role.yaml](../../../utils/aws_control_tower/prerequisites/prereq-controltower-execution-role.yaml) template file as the
100
100
source, to implement the `AWSControlTowerExecution` role pre-requisite.
@@ -138,13 +138,13 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
#### Customizations for AWS Control Tower<!-- omit in toc -->
143
+
#### Customizations for AWS Control Tower<!-- omit in toc -->
144
144
145
145
-[Customizations for AWS Control Tower](./customizations_for_aws_control_tower)
146
146
147
-
#### AWS CloudFormation<!-- omit in toc -->
147
+
#### AWS CloudFormation<!-- omit in toc -->
148
148
149
149
1. In the `management account (home region)`, launch an AWS CloudFormation **Stack Set** and deploy to the `Audit account (home region)` using the [sra-cloudtrail-kms.yaml](templates/sra-cloudtrail-org-kms.yaml) template file as the source.
150
150
2. In the `management account (home region)`, launch an AWS CloudFormation **Stack Set** and deploy to the `Log Archive account (home region)` using the [sra-cloudtrail-org-bucket.yaml](templates/sra-cloudtrail-org-bucket.yaml) template file as the
@@ -157,13 +157,13 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
157
157
> - Update any metric filters and any other resources that reference the CloudWatch Log Group
158
158
> - If a CloudWatch Log Group Subscription is used for forwarding the logs, remove the Subscription from the old group and add it to the new group
159
159
160
-
#### Verify Solution Deployment<!-- omit in toc -->
160
+
#### Verify Solution Deployment<!-- omit in toc -->
161
161
162
162
1. Log into the `Management account` and navigate to the CloudTrail page
163
163
2. Select Trails and select the "sra-cloudtrail-org" trail
164
164
3. Verify the correct configurations have been applied
165
165
166
-
#### Solution Delete Instructions<!-- omit in toc -->
166
+
#### Solution Delete Instructions<!-- omit in toc -->
167
167
168
168
1. In the `management account (home region)`, delete the AWS CloudFormation **Stack** created in step 3 of the solution deployment.
169
169
2. In the `management account (home region)`, delete the AWS CloudFormation **StackSet** created in step 2 of the solution deployment. **Note:** there should not be any `stack instances` associated with this StackSet.
@@ -174,7 +174,7 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
174
174
175
175
## Appendix
176
176
177
-
### CloudFormation StackSet Instructions<!-- omit in toc -->
177
+
### CloudFormation StackSet Instructions<!-- omit in toc -->
178
178
179
179
If you need to launch an AWS CloudFormation **StackSet** in the `management account`, see below steps (for additional details, see
180
180
[Create a stack set with self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-getting-started-create.html#stacksets-getting-started-create-self-managed))
### 1.0 Organization Management Account<!-- omit in toc -->
25
+
### 1.0 Organization Management Account<!-- omit in toc -->
26
26
27
-
#### 1.1 AWS CloudFormation<!-- omit in toc -->
27
+
#### 1.1 AWS CloudFormation<!-- omit in toc -->
28
28
29
29
- All resources are deployed via AWS CloudFormation as a `StackSet` and `Stack Instance` within the management account or a CloudFormation `Stack` within a specific account.
30
30
- The [Customizations for AWS Control Tower](https://aws.amazon.com/solutions/implementations/customizations-for-aws-control-tower/) solution deploys all templates as a CloudFormation `StackSet`.
31
31
- For parameter details, review the [AWS CloudFormation templates](templates/).
32
32
33
-
#### 1.2 AWS Lambda Function<!-- omit in toc -->
33
+
#### 1.2 AWS Lambda Function<!-- omit in toc -->
34
34
35
35
- The Lambda function delegates the administrator account for the provided service principals
36
36
37
-
#### 1.3 Lambda CloudWatch Log Group<!-- omit in toc -->
37
+
#### 1.3 Lambda CloudWatch Log Group<!-- omit in toc -->
38
38
39
39
- Contains Lambda function execution logs
40
40
41
-
#### 1.4 Lambda Execution IAM Role<!-- omit in toc -->
41
+
#### 1.4 Lambda Execution IAM Role<!-- omit in toc -->
42
42
43
43
- IAM role used by the Lambda function to enable AWS service access for the provided service and register an AWS account as the delegated administrator.
44
44
45
-
#### 1.5 AWS Organizations<!-- omit in toc -->
45
+
#### 1.5 AWS Organizations<!-- omit in toc -->
46
46
47
47
- AWS Organizations APIs are used to delegate the administrator account
48
48
49
49
---
50
50
51
-
### 2.0 Delegated Administrator Account (Audit)<!-- omit in toc -->
51
+
### 2.0 Delegated Administrator Account (Audit)<!-- omit in toc -->
52
52
53
-
#### 2.1 Services Supported<!-- omit in toc -->
53
+
#### 2.1 Services Supported<!-- omit in toc -->
54
54
55
55
- The services that support a delegated administrator account can be configured and managed within this account.
56
56
- Service Principal Mapping
@@ -70,12 +70,12 @@ The register delegated administrator account solution is a common solution to re
70
70
71
71
## Implementation Instructions
72
72
73
-
### Prerequisites<!-- omit in toc -->
73
+
### Prerequisites<!-- omit in toc -->
74
74
75
75
- AWS Control Tower is deployed.
76
76
-`aws-security-reference-architecture-examples` repository is stored on your local machine or location where you will be deploying from.
77
77
78
-
### Staging<!-- omit in toc -->
78
+
### Staging<!-- omit in toc -->
79
79
80
80
1. In the `management account (home region)`, launch the AWS CloudFormation **Stack** using the [prereq-controltower-execution-role.yaml](../../../utils/aws_control_tower/prerequisites/prereq-controltower-execution-role.yaml) source, to implement the
81
81
`AWSControlTowerExecution` role pre-requisite.
@@ -119,17 +119,17 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
#### Customizations for AWS Control Tower<!-- omit in toc -->
124
+
#### Customizations for AWS Control Tower<!-- omit in toc -->
125
125
126
126
-[Customizations for AWS Control Tower](./customizations_for_aws_control_tower)
127
127
128
-
#### AWS CloudFormation<!-- omit in toc -->
128
+
#### AWS CloudFormation<!-- omit in toc -->
129
129
130
130
1. In the `management account (home region)`, launch an AWS CloudFormation **Stack** using the [sra-common-register-delegated-administrator.yaml](templates/sra-common-register-delegated-administrator.yaml) template file as the source.
131
131
132
-
#### Verify Solution Deployment<!-- omit in toc -->
132
+
#### Verify Solution Deployment<!-- omit in toc -->
133
133
134
134
- Verify the configuration using the following AWS CLI shell script
135
135
@@ -141,7 +141,7 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
#### Solution Delete Instructions<!-- omit in toc -->
144
+
#### Solution Delete Instructions<!-- omit in toc -->
145
145
146
146
1. In the `management account (home region)`, delete the AWS CloudFormation **Stack** created in step 1 of the solution deployment.
147
147
2. In the `management account (home region)`, delete the AWS CloudWatch **Log Group** (e.g. /aws/lambda/<solution_name>) for the Lambda function deployed in step 3 of the solution deployment.
@@ -150,7 +150,7 @@ sh "$SRA_REPO"/aws_sra_examples/utils/packaging_scripts/package-lambda.sh \
150
150
151
151
## Appendix
152
152
153
-
### CloudFormation StackSet Instructions<!-- omit in toc -->
153
+
### CloudFormation StackSet Instructions<!-- omit in toc -->
154
154
155
155
If you need to launch an AWS CloudFormation **StackSet** in the `management account`, see below steps (for additional details, see
156
156
[Create a stack set with self-managed permissions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-getting-started-create.html#stacksets-getting-started-create-self-managed))
0 commit comments