You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+12-6Lines changed: 12 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,8 @@
3
3
## Table of Contents<!-- omit in toc -->
4
4
5
5
-[Introduction](#introduction)
6
+
-[2023-08-07](#2023-08-07)
7
+
-[2023-07-07](#2023-07-07)
6
8
-[2023-07-01](#2023-07-07)
7
9
-[2023-07-01](#2023-07-01)
8
10
-[2023-06-21](#2023-06-21)
@@ -42,22 +44,26 @@ All notable changes to this project will be documented in this file.
42
44
43
45
---
44
46
45
-
## 2023-07-07
47
+
## 2023-08-07
46
48
47
-
### Changed<!-- omit in toc -->
49
+
- Updated [Common Prerequisites](https://github.com/aws-samples/aws-security-reference-architecture-examples/tree/main/aws_sra_examples/solutions/common/common_prerequisites) solution to make AWS Control Tower optional.
50
+
- Updated [Security Hub](https://github.com/aws-samples/aws-security-reference-architecture-examples/tree/main/aws_sra_examples/solutions/securityhub/securityhub_org) solution to make AWS Control Tower optional.
51
+
- Updated [Inspector](https://github.com/aws-samples/aws-security-reference-architecture-examples/tree/main/aws_sra_examples/solutions/inspector/inspector_org) solution to make AWS Control Tower optional.
52
+
- Updated [GuardDuty](https://github.com/aws-samples/aws-security-reference-architecture-examples/tree/main/aws_sra_examples/solutions/guardduty/guardduty_org) solution to make AWS Control Tower optional.
53
+
- Updated [Easy Setup](https://github.com/aws-samples/aws-security-reference-architecture-examples/tree/main/aws_sra_examples/easy_setup) to support solution updates for making AWS Control Tower optional.
54
+
- Updated [CloudTrail](https://github.com/aws-samples/aws-security-reference-architecture-examples/tree/main/aws_sra_examples/solutions/cloudtrail/cloudtrail_org) solution to make AWS Control Tower optional.
55
+
- Updated [IAM Access Analyzer](https://github.com/aws-samples/aws-security-reference-architecture-examples/tree/main/aws_sra_examples/solutions/iam/iam_access_analyzer) solution to make AWS Control Tower optional.
56
+
57
+
## 2023-07-07
48
58
49
59
- Updated [CloudTrail](https://github.com/aws-samples/aws-security-reference-architecture-examples/tree/main/aws_sra_examples/solutions/cloudtrail/cloudtrail_org) solution to enable delegated administrator.
50
60
51
61
## 2023-07-01
52
62
53
-
### Changed<!-- omit in toc -->
54
-
55
63
- Added [Detective Organization](aws_sra_examples/solutions/detective/detective_org) solution to [Easy Setup](aws_sra_examples/easy_setup) and [Quick Setup](aws_sra_examples/quick_setup/)
56
64
57
65
## 2023-06-21
58
66
59
-
### Changed<!-- omit in toc -->
60
-
61
67
- Added [GuardDuty Organization](aws_sra_examples/solutions/guardduty/guardduty_org) EKS, Malware, RDS, and Lambda protections to [Easy Setup](aws_sra_examples/easy_setup) and [Quick Setup](aws_sra_examples/quick_setup/) deployment options
62
68
- Added [Inspector Organization](aws_sra_examples/solutions/inspector/inspector_org) solution to [Quick Setup](aws_sra_examples/quick_setup/) deployment option
Copy file name to clipboardExpand all lines: aws_sra_examples/easy_setup/README.md
+18-1Lines changed: 18 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -77,6 +77,12 @@ In the CloudFormation service console, navigate to the stacks area.
77
77
In the stacks area, create a stack, and then select the "Upload a template file" option. Click on "Next", then follow the process to deploy the stack.
78
78
Be sure to specify the appropriate parameters for the template as needed.
79
79
80
+
- IMPORTANT: If `AWS Organizations` is being used without AWS Control Tower, you must also specify the following parameter values as you create the stack:
81
+
-`pControlTower` as `false`
82
+
-`pLogArchiveAccountId` as the AWS Account Id of the account designated to be the `Log Archive` account.
83
+
-`pSecurityAccountId` as the AWS Account Id of the account designated to be the `Security Tooling` account.
84
+
-`pGovernedRegions` as a list of AWS regions separated by commas
85
+
80
86
#### II. (Option B) Deployment using the AWS CLI
81
87
82
88
Deployment using the AWS CLI requires the template to be downloaded first.
@@ -100,15 +106,26 @@ Prepare and run the `aws cloudformation deploy` command to launch the template.
100
106
- Be sure to alter the folder/path for the `sra-easy-setup.yaml` template-file appropriately (replace `[path to template file]`)
101
107
- Be sure to put in the s3 bucket name (replace `[s3 bucket name from step 1]`)
102
108
- Be sure to specify the proper parameter overrides and specify the alarm email address (`[email address]`)
109
+
- If `AWS Organizations` is being used without AWS Control Tower, you must also specify the following parameter values as you create the stack:
110
+
-`pControlTower` as `false`
111
+
-`pLogArchiveAccountId` as the AWS Account Id of the account designated to be the `Log Archive` account.
112
+
-`pSecurityAccountId` as the AWS Account Id of the account designated to be the `Security Tooling` account.
113
+
-`pGovernedRegions` as a list of AWS regions separated by commas
103
114
104
115
*NOTE: The example command below deploys The Guard Duty, Security Hub, and Config Management solutions (you can remove those 3 parameters or replace them with other solutions deployment parameters)*
105
116
106
-
###### Example Command To Launch The Template<!-- omit in toc -->
117
+
###### Example Command To Launch The Template in AWS Control Tower landing zone<!-- omit in toc -->
107
118
108
119
```bash
109
120
aws cloudformation deploy --template-file [path to template file]/sra-easy-setup.yaml --stack-name sra-easy-setup --s3-bucket [s3 bucket name from step 1] --capabilities CAPABILITY_NAMED_IAM --parameter-overrides pDeployGuardDutySolution=Yes pDeployConfigManagementSolution=Yes pDeploySecurityHubSolution=Yes pSRAAlarmEmail=[email address]
110
121
```
111
122
123
+
###### Example Command To Launch The Template in AWS Organizations<!-- omit in toc -->
124
+
125
+
```bash
126
+
aws cloudformation deploy --template-file [path to template file]/sra-easy-setup.yaml --stack-name sra-easy-setup --s3-bucket [s3 bucket name from step 1] --capabilities CAPABILITY_NAMED_IAM --parameter-overrides pControlTower=false pLogArchiveAccountId=<LOG_ARCHIVE_ACCOUNT_ID> pSecurityAccountId=<SECURITY_ACCOUNT_ID> pGovernedRegions=<COMMA_SEPARATED_REGIONS>
For AWS Control Tower, set to ct-regions (default). If not using AWS Control Tower, specify comma separated list of regions (e.g. us-west-2,us-east-1,ap-south-1) in lower case.
461
+
Default: ct-regions
462
+
Description: AWS regions (comma separated) if not using AWS Control Tower (leave set to ct-regions for AWS Control Tower environments)
463
+
Type: String
464
+
pSecurityAccountId:
465
+
AllowedPattern: '^\d{12}$'
466
+
Default: 111111111111
467
+
ConstraintDescription: Must be 12 digits.
468
+
Description: AWS Account ID of the Security Tooling account (ignored for AWS Control Tower environments).
469
+
Type: String
470
+
pLogArchiveAccountId:
471
+
AllowedPattern: '^\d{12}$'
472
+
Default: 222222222222
473
+
ConstraintDescription: Must be 12 digits.
474
+
Description: AWS Account ID of the Log Archive account (ignored for AWS Control Tower environments).
475
+
Type: String
414
476
pSRASolutionName:
415
477
AllowedValues: [sra-common-prerequisites]
416
478
Default: sra-common-prerequisites
@@ -918,6 +980,16 @@ Parameters:
918
980
MaxValue: 128
919
981
MinValue: 6
920
982
Type: Number
983
+
pEnableNISTStandard:
984
+
AllowedValues: ['true', 'false']
985
+
Default: 'false'
986
+
Description: Indicates whether to enable the National Institute of Standards and Technology (NIST) SP 800-53 Rev. 5.
987
+
Type: String
988
+
pNISTStandardVersion:
989
+
AllowedValues: [5.0.0]
990
+
Default: 5.0.0
991
+
Description: NIST Standard Version
992
+
Type: String
921
993
pOperationsContactAction:
922
994
AllowedValues: ['add', 'delete', 'ignore']
923
995
Default: add
@@ -1182,8 +1254,10 @@ Resources:
1182
1254
Value: !Ref AWS::Region
1183
1255
- Name: AWS_ACCOUNT_ID
1184
1256
Value: !Ref "AWS::AccountId"
1185
-
- Name: SRA_DEPLOY_GUARDDUTY
1186
-
Value: !Ref pDeployGuardDutySolution
1257
+
- Name: SRA_REPO_URL
1258
+
Value: !Ref pRepoURL
1259
+
- Name: SRA_REPO_BRANCH_NAME
1260
+
Value: !Ref pRepoBranch
1187
1261
- Name: SRA_STAGING_S3_BUCKET_STACK_NAME
1188
1262
Value: !Ref pSRAStagingS3BucketStackName
1189
1263
Image: "aws/codebuild/standard:5.0"
@@ -1202,16 +1276,18 @@ Resources:
1202
1276
build:
1203
1277
commands:
1204
1278
- echo Build started on `date` in ${AWS::Region} region
0 commit comments