Skip to content

Commit 0d6ae96

Browse files
Update Config File and Docs (#367)
Co-authored-by: Naveen Kumar <nkoppula@amazon.com>
1 parent 903143c commit 0d6ae96

File tree

14 files changed

+1017
-234
lines changed

14 files changed

+1017
-234
lines changed

README.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ Installation of the provided prescriptive architecture is reasonably simple, dep
88

99
## What specifically does the Accelerator deploy and manage?
1010

11-
A common misconception is that the AWS Secure Environment Accelerator only deploys security services, not true. The Accelerator is capable of deploying a complete end-to-end hybrid enterprise cloud environment.
11+
A common misconception is that the AWS Secure Environment Accelerator only deploys security services, not true. The Accelerator is capable of deploying a complete end-to-end hybrid enterprise multi-region cloud environment.
1212

1313
Additionally, while the Accelerator is initially responsible for deploying a prescribed architecture, it more importantly allows for organizations to operate, evolve, and maintain their cloud architecture and security controls over time and as they grow, with mininal effort, often using native AWS tools. Customers don't have to change the way they operate in AWS.
1414

15-
Specifically the accelerator deploys and manages the following functionality, both at initial accelerator deployment and as new accounts are created, added, or onboarded in a completely automated manner:
15+
Specifically the accelerator deploys and manages the following functionality, both at initial accelerator deployment and as new accounts are created, added, or onboarded in a completely automated but customizable manner:
1616

1717
### Creates AWS Account
1818

@@ -35,6 +35,7 @@ Specifically the accelerator deploys and manages the following functionality, bo
3535
- VPC Endpoints (Gateway and Interface, Centralized or Local)
3636
- Route 53 Private and Public Zones, Resolver Rules and Endpoints, VPC Endpoint Overloaded Zones
3737
- All completely and indivdiually customizable (per account, VPC, or OU)
38+
- Layout your VPCs, subnets, CIDRs and connectivity the way you want
3839
- Deletes default VPC's (worldwide)
3940

4041
### Cross-Account Object Sharing
@@ -118,7 +119,7 @@ This summarizes the installation process, the full installation document can be
118119
- Create a config.json (or config.yaml) file to represent your organizations requirements (PBMM sample provided)
119120
- Create a Secrets Manager Secret which contains a GitHub token with access to the Accelerator code repo
120121
- Create a unique S3 input bucket and place your config.json and any additional custom config files in the bucket
121-
- Download and execute the latest installer CloudFormation template in your master accounts preferred 'primary' region
122+
- Download and execute the latest installer CloudFormation template in your root accounts preferred 'primary' region
122123
- Wait for:
123124
- CloudFormation to deploy and start the Code Pipeline (~5 mins)
124125
- Code Pipeline to download the Accelerator codebase and install the Accelerator State Machine (~15-20 mins)
@@ -135,7 +136,7 @@ This summarizes the installation process, the full installation document can be
135136
### - [Installation, Upgrades and Basic Operations Guide](./docs/installation/index.md)
136137

137138
- Link to [releases](https://github.com/aws-samples/aws-secure-environment-accelerator/releases)
138-
- Link to example PBMM config [file](./reference-artifacts/config.example.json)
139+
- [Link](./docs/installation/customization-index.md) to sample config file and customization details
139140

140141
### - [Accelerator Operations/Troubleshooting Guide](./docs/operations/operations-troubleshooting-guide.md) (Early Draft)
141142

@@ -145,4 +146,6 @@ This summarizes the installation process, the full installation document can be
145146

146147
### - [Frequently Asked Questions](./docs/faq/index.md) (Future)
147148

148-
[...Go to Table of Contents](./docs/index.md)
149+
---
150+
151+
[...Go to Accelerator Table of Contents](./docs/index.md)

docs/architectures/pbmm/index.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -692,4 +692,8 @@ These frameworks will perform checks against the accounts via Config Rules that
692692
[config-org]: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-config.html
693693
[found]: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards-fsbp-controls.html
694694
[pci]: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-pci-controls.html
695-
[cis]: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cis-controls.html
695+
[cis]: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cis-controls.html
696+
697+
---
698+
699+
[...Return to Accelerator Table of Contents](../../index.md)

docs/developer/developer-guide.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1260,3 +1260,7 @@ Run in the root of the project.
12601260
```sh
12611261
pnpm recursive run lint --stream --no-bail
12621262
```
1263+
1264+
---
1265+
1266+
[...Return to Accelerator Table of Contents](../index.md)

docs/faq/index.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,6 @@ Future answer 1
88

99
Future answer 2
1010

11-
[...Return to Table of Contents](../index.md)
11+
---
12+
13+
[...Return to Accelerator Table of Contents](../index.md)

docs/index.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
# AWS Secure Environment Accelerator
22

3-
# **Documentation** (Linked)
3+
## **Documentation** (Linked)
44

55
### - [Solution Summary / Repo Root](../README.md)
66

77
### - [Installation, Upgrades and Basic Operations Guide](./installation/index.md)
88

99
- Link to [releases](https://github.com/aws-samples/aws-secure-environment-accelerator/releases)
10-
- Link to example PBMM config [file](../reference-artifacts/config.example.json)
10+
- [Link](./installation/customization-index.md) to sample config file and customization details
1111

1212
### - [Accelerator Operations/Troubleshooting Guide](./operations/operations-troubleshooting-guide.md) (Early Draft)
1313

@@ -16,3 +16,6 @@
1616
### - [Prescriptive PBMM Architecture Design Document](./architectures/pbmm/index.md) (Early Draft)
1717

1818
### - [Frequently Asked Questions](./faq/index.md)
19+
20+
---
21+
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# AWS Secure Environment Accelerator
2+
3+
## **Deployment Customizations**
4+
5+
### - Link to the sample PBMM config [file](../../reference-artifacts/config.example.json)
6+
7+
### - [Multi-file Accelerator config file option and YAML support](./multi-file-config-capabilities.md)
8+
9+
### - [Additional config file parameters not shown in primary sample config file](../../reference-artifacts/master-config-sample-snippets/sample_snippets.md)
10+
11+
### - 3rd Party Firewall
12+
13+
- Sample firewall config [file](../../reference-artifacts/Third-Party/firewall-example.txt)
14+
- Firewall configuration [customizations](../../reference-artifacts/master-config-sample-snippets/firewall_file_available_variables.md)
15+
16+
### - Other Sample Accelerator Configuration Files
17+
18+
- [Future](.)
19+
- [Future](.)
20+
21+
---
22+
23+
[...Return to Accelerator Table of Contents](../index.md)

docs/installation/index.md

Lines changed: 23 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -36,12 +36,13 @@ These installation instructions assume the prescribed architecture is being depl
3636
- [3.4. Design Constraints](#34-design-constraints)
3737
- [4. AWS Internal - Accelerator Release Process](#4-aws-internal---accelerator-release-process)
3838
- [4.1. Creating a new Accelerator Code Release](#41-creating-a-new-accelerator-code-release)
39+
- [[action]: https://github.com/aws-samples/aws-secure-environment-accelerator/blob/master/.github/workflows/publish.yml](#)
3940

4041
## 1.1. Prerequisites
4142

4243
### 1.1.1. General
4344

44-
- Master or Root AWS account (the AWS Accelerator cannot be deployed in an AWS sub-account)
45+
- Master or root AWS account (the AWS Accelerator cannot be deployed in an AWS sub-account)
4546
- No additional AWS accounts need to be pre-created before Accelerator installation
4647
- Limit increase to support a minimum of 6 new sub-accounts plus any additional workload accounts
4748
- Determine if you will install on top of ALZ or as a standalone installation
@@ -55,20 +56,20 @@ These installation instructions assume the prescribed architecture is being depl
5556

5657
Before installing, you must first:
5758

58-
1. Login to the Organization **Master AWS account** with `AdministratorAccess`.
59+
1. Login to the organization **root AWS account** with `AdministratorAccess`.
5960
2. **_Set the region to `ca-central-1`._**
6061
3. Enable AWS Organizations
6162
4. Enable Service Control Policies
62-
5. In AWS Organizations, "Verify" the master account email address (this is a technical process)
63+
5. In AWS Organizations, "Verify" the root account email address (this is a technical process)
6364
6. Set `alz-baseline=false` in the configuration file
6465
7. Create a new KMS key to encrypt your source configuration bucket (you can use an existing key)
6566

6667
- AWS Key Management Service, Customer Managed Keys, Create Key, Symmetric, and then provide a key name
6768
(`Accel-Source-Bucket-Key`), Next
68-
- Select a key administrator (Admin Role or Group for the master account), Next
69-
- Select key users (Admin Role or Group for the master account), Next
69+
- Select a key administrator (Admin Role or Group for the root account), Next
70+
- Select key users (Admin Role or Group for the root account), Next
7071
- Validate an entry exists to "Enable IAM User Permissions" (critical step if using an existing key)
71-
- `"arn:aws:iam::123456789012:root"`, where `123456789012` is your **_master_** account id.
72+
- `"arn:aws:iam::123456789012:root"`, where `123456789012` is your **_root_** account id.
7273
- Click Finish
7374

7475
### 1.1.3. ALZ Based Accelerator Pre-Install Steps
@@ -85,18 +86,18 @@ When deploying the ALZ select:
8586
Before installing, you must first:
8687

8788
1. Set `alz-baseline=true` in the configuration file
88-
2. Login to the Organization **Master AWS account** where AWS Landing Zone is deployed with `AdministratorAccess`.
89+
2. Login to the organization **root AWS account** where AWS Landing Zone is deployed with `AdministratorAccess`.
8990
3. **_Set the region to `ca-central-1`._**
9091
4. Enable IAM permissions to control access to use the `AwsLandingZoneKMSKey` KMS key.
91-
- i.e. add a root entry - `"arn:aws:iam::123456789012:root"`, where `123456789012` is your **_master_** account id.
92+
- i.e. add a root entry - `"arn:aws:iam::123456789012:root"`, where `123456789012` is your **_root_** account id.
9293

9394
### 1.1.4. Remaining Pre-Install Steps - Both Installation Types
9495

95-
In the Master or root AWS account, manually:
96+
In the master or root AWS account, manually:
9697

9798
1. Enable `"Cost Explorer"` (My Account, Cost Explorer, Enable Cost Explorer)
9899
2. Enable `"Receive Billing Alerts"` (My Account, Billing Preferences, Receive Billing Alerts)
99-
3. It is **_extremely important_** that **_all_** the account contact details be validated in the MASTER account before deploying any new sub-accounts.
100+
3. It is **_extremely important_** that **_all_** the account contact details be validated in the ROOT account before deploying any new sub-accounts.
100101

101102
- This information is copied to every new sub-account on creation.
102103
- Subsequent changes to this information require manually updating it in **\*each** sub-account.
@@ -107,7 +108,7 @@ In the Master or root AWS account, manually:
107108

108109
If deploying to an internal AWS account, to successfully install the entire solution, you need to enable Private Marketplace (PMP) before starting:
109110

110-
1. In the master account go here: https://aws.amazon.com/marketplace/privatemarketplace/create
111+
1. In the root account go here: https://aws.amazon.com/marketplace/privatemarketplace/create
111112
2. Click Create Marketplace
112113
3. Go to Profile sub-tab, click the `Not Live` slider to make it `Live`
113114
4. Click the `Software requests` slider to turn `Requests off`
@@ -170,7 +171,7 @@ If deploying to an internal AWS account, to successfully install the entire solu
170171
- 2 Fortinet FortiGate firewall licenses (Eval licenses adequate)
171172
- We also recommend at least 20 unique email ALIASES associated with a single mailbox, never used before to open AWS accounts, such that you do not need to request new email aliases every time you need to create a new AWS account.
172173

173-
4. Create an S3 bucket in your master account with versioning enabled `your-bucket-name`
174+
4. Create an S3 bucket in your root account with versioning enabled `your-bucket-name`
174175
- you must supply this bucket name in the CFN parameters _and_ in the config file
175176
- the bucket name _must_ be the same in both spots
176177
- the bucket should be `S3-KMS` encrypted using either the `AwsLandingZoneKMSKey` or the `Accel-Source-Bucket-Key` created above
@@ -245,7 +246,7 @@ If deploying to an internal AWS account, to successfully install the entire solu
245246
### 1.3.1. Known Installation Issues
246247

247248
- Standalone Accelerator v1.1.6 and v1.1.7 may experience a state machine failure when attempting to deploy Guardduty in at least one random region. Simply rerun the State Machine. This is resolved in v1.1.8.
248-
- Standalone Accelerator versions prior to v1.1.8 required manual creation of the core ou and moving the master AWS account into it before running the State Machine. If this step is missed, once the SM fails, simply move the master account into the auto-created core ou and rerun the SM. This is resolved in v1.1.8.
249+
- Standalone Accelerator versions prior to v1.1.8 required manual creation of the core ou and moving the root AWS account into it before running the State Machine. If this step is missed, once the SM fails, simply move the root account into the auto-created core ou and rerun the SM. This is resolved in v1.1.8.
249250

250251
# 2. Accelerator Basic Operation
251252

@@ -431,20 +432,20 @@ CloudWatch Log group deletion is prevented for security purposes. Users of the A
431432
- The Accelerator will NOT alter existing (legacy) constructs (e.g. VPC's, EBS volumes, etc.). For imported and pre-existing accounts, objects the Accelerator prevents from being created using preventative guardrails will continue to exist and not conform to the prescriptive security guidance
432433
- Existing workloads should be migrated to Accelerator managed VPC's and legacy VPC's deleted to gain the full governance benefits of the Accelerator (centralized flow logging, centralized ingress/egress, no IGW's, Session Manager access, existing non-encrypted EBS volumes, etc.)
433434
- Existing AWS services will be reconfigured as defined in the Accelerator configuration file (overwriting existing settings)
434-
- We do NOT support _any_ workloads running or users operating in the master AWS account. The master AWS account MUST be tightly controlled
435+
- We do NOT support _any_ workloads running or users operating in the root AWS account. The root AWS account MUST be tightly controlled
435436
- Importing existing _workload_ accounts is fully supported, we do NOT support, recommend and strongly discourage importing mandatory accounts, unless they were clean/empty accounts. Mandatory accounts are critical to ensuring governance across the entire solution
436437
- We've tried to ensure all customer deployments are smooth. Given the breadth and depth of the AWS service offerings and the flexibility in the available deployment options, their may be scenarios that cause an installation failure. In these situations, simply rectify the conflict and re-run the state machine.
437438

438439
## 3.4. Design Constraints
439440

440-
- The master account does NOT have any preventative controls to protect the integrity of the Accelerator codebase, deployed objects or guardrails. Do not delete, modify, or change anything in the master account unless you are certain as to what you are doing. More specifically, do NOT delete, or change _any_ buckets in the master account.
441+
- The root account does NOT have any preventative controls to protect the integrity of the Accelerator codebase, deployed objects or guardrails. Do not delete, modify, or change anything in the root account unless you are certain as to what you are doing. More specifically, do NOT delete, or change _any_ buckets in the root account.
441442
- While generally protected, do not delete/update/change s3 buckets with CDK, CFN, or PBMMAccel- in _any_ sub-accounts.- ALB automated deployments only supports Forward and not redirect rules.
442-
- AWS Config Aggregator is deployed in the Organization master account as enablement through Organizations is simpler to implement. AWS Organizations only supports deploying the Aggregator in the Org master account and not in a designated administrative account at this time. Once supported, we plan to update the code to move the Aggregator administrative account.
443-
- An Organization CloudTrail is deployed, which is created in the primary region in the master AWS account. All AWS account CloudTrails are centralized into this single CloudWatch Log Group. Starting in v1.1.9 this is where we deploy the CloudWatch Alarms which trigger for ALL accounts in the organization. Security Hub will erroneously report that the only account and/or region that is compliant with certain rules is the primary region of the master account. We are working with the Security Hub team to rectify this situation in future Security Hub/Accelerator releases.
443+
- AWS Config Aggregator is deployed in the Organization root account as enablement through Organizations is simpler to implement. AWS Organizations only supports deploying the Aggregator in the Org root account and not in a designated administrative account at this time. Once supported, we plan to update the code to move the Aggregator administrative account.
444+
- An Organization CloudTrail is deployed, which is created in the primary region in the root AWS account. All AWS account CloudTrails are centralized into this single CloudWatch Log Group. Starting in v1.1.9 this is where we deploy the CloudWatch Alarms which trigger for ALL accounts in the organization. Security Hub will erroneously report that the only account and/or region that is compliant with certain rules is the primary region of the root account. We are working with the Security Hub team to rectify this situation in future Security Hub/Accelerator releases.
444445
- Amazon Detective - we have chosen not to enable at this time.
445446
- Only 1 auto-deployed MAD per AWS account is supported today.
446447
- VPC Endpoints have no Name tags applied as CloudFormation does not currently support tagging VPC Endpoints.
447-
- If the master account coincidentally already has an ADC with the same domain name, we do not create/deploy a new ADC. You must manually create a new ADC (it won't cause issues).
448+
- If the root account coincidentally already has an ADC with the same domain name, we do not create/deploy a new ADC. You must manually create a new ADC (it won't cause issues).
448449
- Firewall updates are to be performed using the firewall OS based update capabilities. To update the AMI using the Accelerator, you must first remove the firewalls and then redeploy them (as the EIP's will block a parallel deployment), or deploy a second parallel FW cluster and deprovision the first cluster when ready.
449450

450451
# 4. AWS Internal - Accelerator Release Process
@@ -467,6 +468,8 @@ CloudWatch Log group deletion is prevented for security purposes. Users of the A
467468

468469
- Note: The `Publish` operation will run [the following GitHub Action][action], which merges the `release/vX.Y.Z` branch to `master`. **Branch Protection in GitHub will cause this to fail**. If so, simply disable branch protection for `master`, re-run the Action, and then re-enable.
469470

470-
[action]: https://github.com/aws-samples/aws-secure-environment-accelerator/blob/master/.github/workflows/publish.yml
471+
[action]: https://github.com/aws-samples/aws-secure-environment-accelerator/blob/master/.github/workflows/publish.yml
471472

472-
[...Return to Table of Contents](../index.md)
473+
---
474+
475+
[...Return to Accelerator Table of Contents](../index.md)

0 commit comments

Comments
 (0)