You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,11 +8,11 @@ Installation of the provided prescriptive architecture is reasonably simple, dep
8
8
9
9
## What specifically does the Accelerator deploy and manage?
10
10
11
-
A common misconception is that the AWS Secure Environment Accelerator only deploys security services, not true. The Accelerator is capable of deploying a complete end-to-end hybrid enterprise cloud environment.
11
+
A common misconception is that the AWS Secure Environment Accelerator only deploys security services, not true. The Accelerator is capable of deploying a complete end-to-end hybrid enterprise multi-region cloud environment.
12
12
13
13
Additionally, while the Accelerator is initially responsible for deploying a prescribed architecture, it more importantly allows for organizations to operate, evolve, and maintain their cloud architecture and security controls over time and as they grow, with mininal effort, often using native AWS tools. Customers don't have to change the way they operate in AWS.
14
14
15
-
Specifically the accelerator deploys and manages the following functionality, both at initial accelerator deployment and as new accounts are created, added, or onboarded in a completely automated manner:
15
+
Specifically the accelerator deploys and manages the following functionality, both at initial accelerator deployment and as new accounts are created, added, or onboarded in a completely automated but customizable manner:
16
16
17
17
### Creates AWS Account
18
18
@@ -35,6 +35,7 @@ Specifically the accelerator deploys and manages the following functionality, bo
35
35
- VPC Endpoints (Gateway and Interface, Centralized or Local)
36
36
- Route 53 Private and Public Zones, Resolver Rules and Endpoints, VPC Endpoint Overloaded Zones
37
37
- All completely and indivdiually customizable (per account, VPC, or OU)
38
+
- Layout your VPCs, subnets, CIDRs and connectivity the way you want
38
39
- Deletes default VPC's (worldwide)
39
40
40
41
### Cross-Account Object Sharing
@@ -118,7 +119,7 @@ This summarizes the installation process, the full installation document can be
118
119
- Create a config.json (or config.yaml) file to represent your organizations requirements (PBMM sample provided)
119
120
- Create a Secrets Manager Secret which contains a GitHub token with access to the Accelerator code repo
120
121
- Create a unique S3 input bucket and place your config.json and any additional custom config files in the bucket
121
-
- Download and execute the latest installer CloudFormation template in your master accounts preferred 'primary' region
122
+
- Download and execute the latest installer CloudFormation template in your root accounts preferred 'primary' region
122
123
- Wait for:
123
124
- CloudFormation to deploy and start the Code Pipeline (~5 mins)
124
125
- Code Pipeline to download the Accelerator codebase and install the Accelerator State Machine (~15-20 mins)
@@ -135,7 +136,7 @@ This summarizes the installation process, the full installation document can be
135
136
### - [Installation, Upgrades and Basic Operations Guide](./docs/installation/index.md)
136
137
137
138
- Link to [releases](https://github.com/aws-samples/aws-secure-environment-accelerator/releases)
138
-
-Link to example PBMM config [file](./reference-artifacts/config.example.json)
139
+
-[Link](./docs/installation/customization-index.md) to sample config file and customization details
3. It is **_extremely important_** that **_all_** the account contact details be validated in the MASTER account before deploying any new sub-accounts.
100
+
3. It is **_extremely important_** that **_all_** the account contact details be validated in the ROOT account before deploying any new sub-accounts.
100
101
101
102
- This information is copied to every new sub-account on creation.
102
103
- Subsequent changes to this information require manually updating it in **\*each** sub-account.
@@ -107,7 +108,7 @@ In the Master or root AWS account, manually:
107
108
108
109
If deploying to an internal AWS account, to successfully install the entire solution, you need to enable Private Marketplace (PMP) before starting:
109
110
110
-
1. In the master account go here: https://aws.amazon.com/marketplace/privatemarketplace/create
111
+
1. In the root account go here: https://aws.amazon.com/marketplace/privatemarketplace/create
111
112
2. Click Create Marketplace
112
113
3. Go to Profile sub-tab, click the `Not Live` slider to make it `Live`
113
114
4. Click the `Software requests` slider to turn `Requests off`
@@ -170,7 +171,7 @@ If deploying to an internal AWS account, to successfully install the entire solu
- We also recommend at least 20 unique email ALIASES associated with a single mailbox, never used before to open AWS accounts, such that you do not need to request new email aliases every time you need to create a new AWS account.
172
173
173
-
4. Create an S3 bucket in your master account with versioning enabled `your-bucket-name`
174
+
4. Create an S3 bucket in your root account with versioning enabled `your-bucket-name`
174
175
- you must supply this bucket name in the CFN parameters _and_ in the config file
175
176
- the bucket name _must_ be the same in both spots
176
177
- the bucket should be `S3-KMS` encrypted using either the `AwsLandingZoneKMSKey` or the `Accel-Source-Bucket-Key` created above
@@ -245,7 +246,7 @@ If deploying to an internal AWS account, to successfully install the entire solu
245
246
### 1.3.1. Known Installation Issues
246
247
247
248
- Standalone Accelerator v1.1.6 and v1.1.7 may experience a state machine failure when attempting to deploy Guardduty in at least one random region. Simply rerun the State Machine. This is resolved in v1.1.8.
248
-
- Standalone Accelerator versions prior to v1.1.8 required manual creation of the core ou and moving the master AWS account into it before running the State Machine. If this step is missed, once the SM fails, simply move the master account into the auto-created core ou and rerun the SM. This is resolved in v1.1.8.
249
+
- Standalone Accelerator versions prior to v1.1.8 required manual creation of the core ou and moving the root AWS account into it before running the State Machine. If this step is missed, once the SM fails, simply move the root account into the auto-created core ou and rerun the SM. This is resolved in v1.1.8.
249
250
250
251
# 2. Accelerator Basic Operation
251
252
@@ -431,20 +432,20 @@ CloudWatch Log group deletion is prevented for security purposes. Users of the A
431
432
- The Accelerator will NOT alter existing (legacy) constructs (e.g. VPC's, EBS volumes, etc.). For imported and pre-existing accounts, objects the Accelerator prevents from being created using preventative guardrails will continue to exist and not conform to the prescriptive security guidance
432
433
- Existing workloads should be migrated to Accelerator managed VPC's and legacy VPC's deleted to gain the full governance benefits of the Accelerator (centralized flow logging, centralized ingress/egress, no IGW's, Session Manager access, existing non-encrypted EBS volumes, etc.)
433
434
- Existing AWS services will be reconfigured as defined in the Accelerator configuration file (overwriting existing settings)
434
-
- We do NOT support _any_ workloads running or users operating in the master AWS account. The master AWS account MUST be tightly controlled
435
+
- We do NOT support _any_ workloads running or users operating in the root AWS account. The root AWS account MUST be tightly controlled
435
436
- Importing existing _workload_ accounts is fully supported, we do NOT support, recommend and strongly discourage importing mandatory accounts, unless they were clean/empty accounts. Mandatory accounts are critical to ensuring governance across the entire solution
436
437
- We've tried to ensure all customer deployments are smooth. Given the breadth and depth of the AWS service offerings and the flexibility in the available deployment options, their may be scenarios that cause an installation failure. In these situations, simply rectify the conflict and re-run the state machine.
437
438
438
439
## 3.4. Design Constraints
439
440
440
-
- The master account does NOT have any preventative controls to protect the integrity of the Accelerator codebase, deployed objects or guardrails. Do not delete, modify, or change anything in the master account unless you are certain as to what you are doing. More specifically, do NOT delete, or change _any_ buckets in the master account.
441
+
- The root account does NOT have any preventative controls to protect the integrity of the Accelerator codebase, deployed objects or guardrails. Do not delete, modify, or change anything in the root account unless you are certain as to what you are doing. More specifically, do NOT delete, or change _any_ buckets in the root account.
441
442
- While generally protected, do not delete/update/change s3 buckets with CDK, CFN, or PBMMAccel- in _any_ sub-accounts.- ALB automated deployments only supports Forward and not redirect rules.
442
-
- AWS Config Aggregator is deployed in the Organization master account as enablement through Organizations is simpler to implement. AWS Organizations only supports deploying the Aggregator in the Org master account and not in a designated administrative account at this time. Once supported, we plan to update the code to move the Aggregator administrative account.
443
-
- An Organization CloudTrail is deployed, which is created in the primary region in the master AWS account. All AWS account CloudTrails are centralized into this single CloudWatch Log Group. Starting in v1.1.9 this is where we deploy the CloudWatch Alarms which trigger for ALL accounts in the organization. Security Hub will erroneously report that the only account and/or region that is compliant with certain rules is the primary region of the master account. We are working with the Security Hub team to rectify this situation in future Security Hub/Accelerator releases.
443
+
- AWS Config Aggregator is deployed in the Organization root account as enablement through Organizations is simpler to implement. AWS Organizations only supports deploying the Aggregator in the Org root account and not in a designated administrative account at this time. Once supported, we plan to update the code to move the Aggregator administrative account.
444
+
- An Organization CloudTrail is deployed, which is created in the primary region in the root AWS account. All AWS account CloudTrails are centralized into this single CloudWatch Log Group. Starting in v1.1.9 this is where we deploy the CloudWatch Alarms which trigger for ALL accounts in the organization. Security Hub will erroneously report that the only account and/or region that is compliant with certain rules is the primary region of the root account. We are working with the Security Hub team to rectify this situation in future Security Hub/Accelerator releases.
444
445
- Amazon Detective - we have chosen not to enable at this time.
445
446
- Only 1 auto-deployed MAD per AWS account is supported today.
446
447
- VPC Endpoints have no Name tags applied as CloudFormation does not currently support tagging VPC Endpoints.
447
-
- If the master account coincidentally already has an ADC with the same domain name, we do not create/deploy a new ADC. You must manually create a new ADC (it won't cause issues).
448
+
- If the root account coincidentally already has an ADC with the same domain name, we do not create/deploy a new ADC. You must manually create a new ADC (it won't cause issues).
448
449
- Firewall updates are to be performed using the firewall OS based update capabilities. To update the AMI using the Accelerator, you must first remove the firewalls and then redeploy them (as the EIP's will block a parallel deployment), or deploy a second parallel FW cluster and deprovision the first cluster when ready.
449
450
450
451
# 4. AWS Internal - Accelerator Release Process
@@ -467,6 +468,8 @@ CloudWatch Log group deletion is prevented for security purposes. Users of the A
467
468
468
469
- Note: The `Publish` operation will run [the following GitHub Action][action], which merges the `release/vX.Y.Z` branch to `master`. **Branch Protection in GitHub will cause this to fail**. If so, simply disable branch protection for `master`, re-run the Action, and then re-enable.
0 commit comments