You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### 1.0 Organization Management Account<!-- omit in toc -->
45
49
46
-
#### 1.1 AWS Patch Manager<!-- omit in toc -->
50
+
#### 1.1 AWS CloudFormation<!-- omit in toc -->
47
51
48
-
- All resources are deployed via AWS CloudFormation as a `StackSet` and `Stack Instance` within the `management account` or a CloudFormation `Stack` within a specific account.
52
+
- All resources are deployed via AWS CloudFormation as a `StackSet` and `Stack Instance` within the management account or a CloudFormation `Stack` within a specific account.
49
53
- The [Customizations for AWS Control Tower](https://aws.amazon.com/solutions/implementations/customizations-for-aws-control-tower/) solution deploys all templates as a CloudFormation `StackSet`.
50
54
- For parameter details, review the [AWS CloudFormation templates](templates/).
51
55
52
-
#### 1.2 IAM Roles<!-- omit in toc -->
56
+
#### 1.2 AWS Lambda Function<!-- omit in toc -->
57
+
58
+
- The Lambda function includes logic to enable and configure Patch Manager
59
+
60
+
#### 1.3 Lambda Execution IAM Role<!-- omit in toc -->
53
61
54
62
- The `Lambda IAM Role` is used by the Lambda function in the management account to enable the Patch Manager in the management account.
63
+
64
+
#### 1.4 Lambda CloudWatch Log Group<!-- omit in toc -->
65
+
66
+
- All the `AWS Lambda Function` logs are sent to a CloudWatch Log Group `</aws/lambda/<LambdaFunctionName>` to help with debugging and traceability of the actions performed.
67
+
- By default the `AWS Lambda Function` will create the CloudWatch Log Group and logs are encrypted with a CloudWatch Logs service managed encryption key.
68
+
69
+
#### 1.5 AWS Patch Manager<!-- omit in toc -->
70
+
71
+
- Patch Manager is enabled for each existing active account and region during the initial setup.
72
+
73
+
### 2.0 All Existing Active Accounts and Regions<!-- omit in toc -->
74
+
75
+
#### 2.1 AWS CloudFormation<!-- omit in toc -->
76
+
77
+
- All resources are deployed via AWS CloudFormation as a `StackSet` and `Stack Instance` within the management account or a CloudFormation `Stack` within a specific account.
78
+
- The [Customizations for AWS Control Tower](https://aws.amazon.com/solutions/implementations/customizations-for-aws-control-tower/) solution deploys all templates as a CloudFormation `StackSet`.
79
+
- For parameter details, review the [AWS CloudFormation templates](templates/).
80
+
81
+
#### 2.2 IAM Roles<!-- omit in toc -->
82
+
55
83
- The `Patch Management IAM Role` is assumed by the Lambda function in each of the member accounts to to configure Patch Manager.
56
84
- The `SSM Automation Role` is used by the Maintenance Window to execute the task.
57
85
- The `DefaultHostConfig Role` is used to enable the Default Host Configuration setting.
58
86
- The `Patch Mgr EC2 Profile` is used if there are issue with the Default Host Configuration setting.
59
87
60
-
#### 1.3 Maintenance Windows<!-- omit in toc -->
88
+
### 3.0 Patch Manager Solution<!-- omit in toc -->
89
+
90
+
#### 3.1 Maintenance Windows<!-- omit in toc -->
61
91
62
92
##### Maintenance Windows Window
63
93
@@ -80,14 +110,12 @@ Three target groups are created and registered with each of the Maintenance Wind
80
110
-`Windows_Scan` which includes all instances with the tag InstanceOS:Windows
81
111
-`Linux_Scan` which includes all instances with the tag InstanceOS:Linux
82
112
83
-
#### 1.4 Command Documents<!-- omit in toc -->
113
+
#### 3.2 Command Documents<!-- omit in toc -->
84
114
85
115
These AWS Managed SSM Documents are used by the tasks:
86
116
-`AWS-UpdateSSMAgent`
87
117
-`AWS-RunPatchBaseline`
88
118
89
-
90
-
91
119
## Implementation Instructions
92
120
93
121
### Prerequisites<!-- omit in toc -->
@@ -126,9 +154,26 @@ Choose to deploy the Patch Manager solution from within the chosen deployment ty
126
154
127
155
---
128
156
129
-
#### Troubleshooting<!-- omit in toc -->
157
+
## Viewing Results
158
+
159
+
### Viewing Node Compliance<!-- omit in toc -->
160
+
161
+
Navigate to `Systems Manager` then `Patch Manager`. From the Dashboard select the `Compliance Reporting` tab. This will show you all your managed instances, the Compliance Status, and the Non-Compliant Count of patches.
Selecting the link on Non-Compliant Count will show you the missing patches for that Managed Instance. Selecting `Patch Now` at the top right of the window will allow you to plan the installation of the patches.
0 commit comments