Skip to content

Commit 95a3fe8

Browse files
IevIeievgeniia ieromenko
andauthored
Updated Config Management Account solution to make AWS Control Tower optional (#181)
Co-authored-by: ievgeniia ieromenko <ieviero@amazon.com>
1 parent e13e9b9 commit 95a3fe8

File tree

3 files changed

+45
-7
lines changed

3 files changed

+45
-7
lines changed

aws_sra_examples/solutions/config/config_management_account/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,10 +74,10 @@ accounts/regions.
7474

7575
---
7676

77-
### 2.0 Audit Account<!-- omit in toc -->
77+
### 2.0 Audit Account (Security Tooling)<!-- omit in toc -->
78+
79+
The example solutions use `Audit Account` instead of `Security Tooling Account` to align with the default account name used within the AWS Control Tower setup process for the Security Account. The Account ID for the `Audit Account` can be determined from the `SecurityAccountId` parameter within the `AWSControlTowerBP-BASELINE-CONFIG` StackSet in AWS Control Tower environments, but is specified manually in other environments, and then stored in an SSM parameter (this is all done in the common prerequisites solution).
7880

79-
The example solutions use `Audit Account` instead of `Security Tooling Account` to align with the default account name used within the AWS Control Tower setup process for the Security Account. The Account ID for the `Audit Account` SSM parameter is
80-
populated from the `SecurityAccountId` parameter within the `AWSControlTowerBP-BASELINE-CONFIG` StackSet.
8181

8282
#### 2.1 AWS Config Aggregator<!-- omit in toc -->
8383

aws_sra_examples/solutions/config/config_management_account/templates/sra-config-management-account-main-ssm.yaml

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,11 @@ Metadata:
2525
- pLogArchiveAccountId
2626
- pOrganizationId
2727
- pHomeRegion
28+
- Label:
29+
default: IAM Properties
30+
Parameters:
31+
- pStackSetAdminRole
32+
- pStackExecutionRole
2833
- Label:
2934
default: Config Recorder Properties
3035
Parameters:
@@ -45,6 +50,10 @@ Metadata:
4550
- pLambdaLogGroupKmsKey
4651
- pLambdaLogLevel
4752
ParameterLabels:
53+
pStackSetAdminRole:
54+
default: Stack Set Role
55+
pStackExecutionRole:
56+
default: Stack execution role
4857
pAllSupported:
4958
default: All Supported
5059
pAuditAccountId:
@@ -81,6 +90,16 @@ Metadata:
8190
default: SRA Staging S3 Bucket Name
8291

8392
Parameters:
93+
pStackSetAdminRole:
94+
AllowedValues: [sra-stackset]
95+
Default: sra-stackset
96+
Description: The administration role name that is used in the stackset.
97+
Type: String
98+
pStackExecutionRole:
99+
AllowedValues: [sra-execution]
100+
Default: sra-execution
101+
Description: The execution role name that is used in the stack.
102+
Type: String
84103
pAllSupported:
85104
AllowedValues: ['true', 'false']
86105
Default: 'true'
@@ -214,10 +233,10 @@ Resources:
214233
Type: AWS::CloudFormation::StackSet
215234
Properties:
216235
StackSetName: sra-config-management-account
217-
AdministrationRoleARN: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/service-role/AWSControlTowerStackSetRole
236+
AdministrationRoleARN: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${pStackSetAdminRole}
218237
CallAs: SELF
219238
Description: !Sub ${pSRASolutionVersion} - Enables AWS Config in the Control Tower Management account.
220-
ExecutionRoleName: AWSControlTowerExecution
239+
ExecutionRoleName: !Ref pStackExecutionRole
221240
ManagedExecution:
222241
Active: true
223242
OperationPreferences:

aws_sra_examples/solutions/config/config_management_account/templates/sra-config-management-account-main.yaml

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,11 @@ Metadata:
2424
- pLogArchiveAccountId
2525
- pOrganizationId
2626
- pHomeRegion
27+
- Label:
28+
default: IAM Properties
29+
Parameters:
30+
- pStackSetAdminRole
31+
- pStackExecutionRole
2732
- Label:
2833
default: Config Recorder Properties
2934
Parameters:
@@ -44,6 +49,10 @@ Metadata:
4449
- pLambdaLogGroupKmsKey
4550
- pLambdaLogLevel
4651
ParameterLabels:
52+
pStackSetAdminRole:
53+
default: Stack Set Role
54+
pStackExecutionRole:
55+
default: Stack execution role
4756
pAllSupported:
4857
default: All Supported
4958
pAuditAccountId:
@@ -80,6 +89,16 @@ Metadata:
8089
default: SRA Staging S3 Bucket Name
8190

8291
Parameters:
92+
pStackSetAdminRole:
93+
AllowedValues: [sra-stackset]
94+
Default: sra-stackset
95+
Description: The administration role name that is used in the stackset.
96+
Type: String
97+
pStackExecutionRole:
98+
AllowedValues: [sra-execution]
99+
Default: sra-execution
100+
Description: The execution role name that is used in the stack.
101+
Type: String
83102
pAllSupported:
84103
AllowedValues: ['true', 'false']
85104
Default: 'true'
@@ -204,10 +223,10 @@ Resources:
204223
Type: AWS::CloudFormation::StackSet
205224
Properties:
206225
StackSetName: sra-config-management-account
207-
AdministrationRoleARN: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/service-role/AWSControlTowerStackSetRole
226+
AdministrationRoleARN: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${pStackSetAdminRole}
208227
CallAs: SELF
209228
Description: !Sub ${pSRASolutionVersion} - Enables AWS Config in the Control Tower Management account.
210-
ExecutionRoleName: AWSControlTowerExecution
229+
ExecutionRoleName: !Ref pStackExecutionRole
211230
ManagedExecution:
212231
Active: true
213232
OperationPreferences:

0 commit comments

Comments
 (0)