You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: aws_sra_examples/solutions/cloudtrail/cloudtrail_org/README.md
+20-7Lines changed: 20 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -12,8 +12,7 @@ Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-
12
12
13
13
## Introduction
14
14
15
-
The Organization CloudTrail solution will create an Organization CloudTrail within the Organization Management Account that is encrypted with a Customer Managed KMS Key managed in the Audit Account and logs delivered to the Log Archive Account. An
16
-
Organization CloudTrail logs all events for all AWS accounts in the AWS Organization.
15
+
The Organization CloudTrail solution will create an Organization CloudTrail within the Organization Management Account and delegate administration to a member account (e.g. Audit or Security Tooling). The Organization CloudTrail is encrypted with a Customer Managed KMS Key managed in the Audit Account and logs delivered to the Log Archive Account. An Organization CloudTrail logs all events for all AWS accounts in the AWS Organization.
17
16
18
17
When you create an organization trail, a trail with the name that you give it will be created in every AWS account that belongs to your organization. Users with CloudTrail permissions in member accounts will be able to see this trail when they log
19
18
into the AWS CloudTrail console from their AWS accounts, or when they run AWS CLI commands such as describe-trail. However, users in member accounts will not have sufficient permissions to delete the organization trail, turn logging on or off, change
@@ -39,27 +38,34 @@ The solution default configuration deploys an Organization CloudTrail enabling o
39
38
40
39
- The Lambda Function contains logic for configuring the AWS Organization CloudTrail within the `management account`.
41
40
42
-
#### 1.3 Lambda Execution IAM Role<!-- omit in toc -->
41
+
#### 1.3 Lambda Layer<!-- omit in toc -->
42
+
43
+
- The python boto3 SDK lambda layer to enable capability for lambda to enable delegated administrator for CloudTrail service.
44
+
- This is downloaded during the deployment process and packaged into a layer that is used by the lambda function in this solution.
45
+
- The CloudTrail API available in the current lambda environment (as of 06/6/2023) is boto3-1.20.32, however, enhanced functionality of the CloudTrail API used in this solution requires at least 1.26.4 (see references below).
46
+
- Note: Future revisions to this solution will remove this layer when boto3 is updated within the lambda environment.
47
+
48
+
#### 1.4 Lambda Execution IAM Role<!-- omit in toc -->
43
49
44
50
- The AWS Lambda Function Role allows the AWS Lambda service to assume the role and perform actions defined in the attached IAM policies.
45
51
46
-
#### 1.4 Lambda CloudWatch Log Group<!-- omit in toc -->
52
+
#### 1.5 Lambda CloudWatch Log Group<!-- omit in toc -->
47
53
48
54
- All the `AWS Lambda Function` logs are sent to a CloudWatch Log Group `</aws/lambda/<LambdaFunctionName>` to help with debugging and traceability of the actions performed.
49
55
- By default the `AWS Lambda Function` will create the CloudWatch Log Group with a `Retention` (14 days) and are encrypted with a CloudWatch Logs service managed encryption key.
50
56
51
-
#### 1.5 Organization CloudTrail<!-- omit in toc -->
57
+
#### 1.6 Organization CloudTrail<!-- omit in toc -->
52
58
53
59
- AWS CloudTrail for all AWS Organization accounts
54
60
- Member accounts are automatically added and cannot modify
55
61
- Data events can be disabled via the parameters
56
62
- CloudWatch logs can be disabled via the parameters
57
63
58
-
#### 1.6 Organization CloudTrail CloudWatch Log Group Role<!-- omit in toc -->
64
+
#### 1.7 Organization CloudTrail CloudWatch Log Group Role<!-- omit in toc -->
59
65
60
66
- IAM role used to send CloudTrail logs to the CloudWatch log group
0 commit comments