You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This project is tracking change history using GitHub Releases located [here](https://github.com/aws-samples/aws-secure-environment-accelerator/releases).
1
+
# Change Log
2
+
3
+
All notable changes to this project will be documented in this file.
4
+
5
+
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
6
+
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
7
+
8
+
## [1.5.0] - 2021-10-01
9
+
10
+
### Added
11
+
12
+
- All files, initial AWS Solutions Version
13
+
- This project is tracking change history using GitHub Releases located [here](https://github.com/aws-samples/aws-secure-environment-accelerator/releases).
Copy file name to clipboardExpand all lines: README.md
+33-25Lines changed: 33 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,9 @@
2
2
3
3
The AWS Accelerator is a tool designed to help deploy and operate secure multi-account, multi-region AWS environments on an ongoing basis. The power of the solution is the configuration file that drives the architecture deployed by the tool. This enables extensive flexibility and for the completely automated deployment of a customized architecture within AWS without changing a single line of code.
4
4
5
-
While flexible, the AWS Accelerator is delivered with a sample configuration file which deploys an opinionated and prescriptive architecture designed to help meet the security and operational requirements of many governments around the world (initial focus was the Government of Canada). Tuning the parameters within the configuration file allows for the deployment of customized architectures and enables the solution to help meet the multitude of requirements of a broad range of governments and public sector organizations.
5
+
While flexible, the AWS Accelerator is delivered with a sample configuration file which deploys an opinionated and prescriptive architecture designed to help meet the security and operational requirements of many governments around the world. Tuning the parameters within the configuration file allows for the deployment of customized architectures and enables the solution to help meet the multitude of requirements of a broad range of governments and public sector organizations.
6
6
7
-
The installation of the provided prescriptive architecture is reasonably simple, deploying a customized architecture does require extensive understanding of the AWS platform.
7
+
The installation of the provided prescriptive architecture is reasonably simple, deploying a customized architecture does require extensive understanding of the AWS platform. The sample deployment specifically helps customers meet NIST 800-53 and/or CCCS Medium Cloud Control Profile (formerly PBMM).
@@ -22,13 +22,14 @@ Specifically the accelerator deploys and manages the following functionality, bo
22
22
- Shared Network
23
23
- Operations
24
24
- Perimeter
25
-
- Log-Archive
26
-
- Security-Audit
25
+
- LogArchive
26
+
- Security Tooling
27
27
- Workload Accounts - automated concurrent mass account creation or use AWS organizations to scale one account at a time. These accounts are used to host a customer's workloads and applications.
## Relationship with AWS Landing Zone Solution (ALZ)
111
116
112
-
The ALZ is an AWS Solution designed to deploy a multi-account AWS architecture for customers based on best practices and lessons learned from some of AWS' largest customers. The AWS Accelerator draws on design patterns from the Landing Zone, and re-uses several concepts and nomenclature, but it is not directly derived from it, nor does it leverage any code from the ALZ. The initial versions of the AWS Accelerator presupposed the existence of an AWS Landing Zone Solution in the AWS Organization; this requirement has since been removed as of release `v1.1.0`.
113
-
114
-
The Accelerator is now a completely standalone solution.
117
+
The ALZ was an AWS Solution designed to deploy a multi-account AWS architecture for customers based on best practices and lessons learned from some of AWS' largest customers. The AWS Accelerator draws on design patterns from the Landing Zone, and re-uses several concepts and nomenclature, but it is not directly derived from it, nor does it leverage any code from the ALZ. The Accelerator is a standalone solution with no dependence on ALZ.
115
118
116
119
## Relationship with AWS Control Tower
117
120
118
-
AWS Control Tower is the successor to the ALZ, but offered as an AWS managed service.
121
+
The AWS Secure Environment Accelerator now leverages AWS Control Tower! **(NEW)**
119
122
120
-
When appropriate, it is envisioned that the AWS Accelerator will add the capability to be deployed on top of AWS Control Tower, as we initially allowed with the ALZ.
123
+
With the release of v1.5.0, the AWS Accelerator adds the capability to be deployed on top of AWS Control Tower. Customers get the benefits of the fully managed capabilities of AWS Control Tower combined with the power and flexibility of the Accelerators Networking and Security orchestration.
121
124
122
-
## Accelerator Deployment Process (Summary)
125
+
## Accelerator Installation Process (Summary)
123
126
124
127
This summarizes the installation process, the full installation document can be found in the documentation section below.
125
128
126
-
- Create a config.json (or config.yaml) file to represent your organizations requirements (several samples provided)
127
-
- Create a Secrets Manager Secret which contains a GitHub token that provides access to the Accelerator code repo
128
-
- Create a unique S3 input bucket and place your config.json and any additional custom config files in the bucket
129
-
- Download and execute the latest installer CloudFormation template in your root accounts preferred 'primary' / 'home' region
129
+
- Create a config.json (or config.yaml) file to represent your organizations requirements ([several samples provided](./docs/installation/customization-index.md))
130
+
- Create a Secrets Manager Secret which contains a GitHub token that provides access to the Accelerator code repository
131
+
- Create a unique S3 input bucket in the management account of the region you wish to deploy the solution and place your config.json and any additional custom config files in the bucket
132
+
- Download and execute the latest [release](https://github.com/aws-samples/aws-secure-environment-accelerator/releases)installer CloudFormation template in your management accounts preferred 'primary' / 'home' region
130
133
- Wait for:
131
134
- CloudFormation to deploy and start the Code Pipeline (~5 mins)
132
-
- Code Pipeline to download the Accelerator codebase and install the Accelerator State Machine (~20 mins)
133
-
- The Accelerator State Machine to finish execution (~1.5 hrs)
Note: A ZIP file containing a PDF version of most documentation can be found [here](https://github.com/aws-samples/aws-secure-environment-accelerator/actions?query=workflow%3A%22Generate+Documentation%22).
171
+
Note: Two ZIP files are attached as assets of each [release](https://github.com/aws-samples/aws-secure-environment-accelerator/releases):
172
+
173
+
- one contains a PDF version of the above documentation
174
+
- the second contains a _DRAFT_ of the config file documentation, auto generated from a combination of the typescript schema and the field definitions added for the future GUI
175
+
- Extract and open src\lib\docs-gen\output-docs\en\index.html in your browser
0 commit comments