You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+14-12Lines changed: 14 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ A common misconception is that the AWS Secure Environment Accelerator only deplo
14
14
15
15
Additionally, while the Accelerator is initially responsible for deploying a prescribed architecture, it more importantly allows for organizations to operate, evolve, and maintain their cloud architecture and security controls over time and as they grow, with minimal effort, often using native AWS tools. While the Accelerator helps with the deployment of technical security controls, it’s important to understand that the Accelerator is only part of your security and compliance effort. We encourage customers to work with their AWS account team, AWS Professional Services or an AWS Partner to determine how to best meet the remainder of your compliance requirements.
16
16
17
-
The Accelerator is designed to enable customers to upgrade across Accelerator versions while maintaining a customer’s specific configuration and customizations, and without the need for any coding expertise or for Professional Services. Customers have been able to seamlessly upgrade their AWS multi-account environment from the very first Accelerator beta release to the latest release (across more than 50 releases), gaining the benefits of bug fixes and enhancements while having the option to enable new features, without any loss of existing customization or functionality.
17
+
The Accelerator is designed to enable customers to upgrade across Accelerator versions while maintaining a customer’s specific configuration and customizations, and without the need for any coding expertise or for professional services. Customers have been able to seamlessly upgrade their AWS multi-account environment from the very first Accelerator beta release to the latest release (across more than 50 releases), gaining the benefits of bug fixes and enhancements while having the option to enable new features, without any loss of existing customization or functionality.
18
18
19
19
Specifically the accelerator deploys and manages the following functionality, both at initial accelerator deployment and as new accounts are created, added, or onboarded in a completely automated but customizable manner:
20
20
@@ -28,23 +28,24 @@ Specifically the accelerator deploys and manages the following functionality, bo
28
28
- Security Tooling
29
29
- Workload Accounts - automated concurrent mass account creation or use AWS organizations to scale one account at a time. These accounts are used to host a customer's workloads and applications.
-**NEW** Optionally collect Organization and ASEA configuration and metadata in a new restricted log archive bucket
119
121
120
122
## Relationship with AWS Landing Zone Solution (ALZ)
121
123
122
124
The ALZ was an AWS Solution designed to deploy a multi-account AWS architecture for customers based on best practices and lessons learned from some of AWS' largest customers. The AWS Accelerator draws on design patterns from the Landing Zone, and re-uses several concepts and nomenclature, but it is not directly derived from it, nor does it leverage any code from the ALZ. The Accelerator is a standalone solution with no dependence on ALZ.
123
125
124
126
## Relationship with AWS Control Tower
125
127
126
-
The AWS Secure Environment Accelerator now leverages AWS Control Tower!**(NEW)**
128
+
The AWS Secure Environment Accelerator now leverages AWS Control Tower!
127
129
128
130
With the release of v1.5.0, the AWS Accelerator adds the capability to be deployed on top of AWS Control Tower. Customers get the benefits of the fully managed capabilities of AWS Control Tower combined with the power and flexibility of the Accelerators Networking and Security orchestration.
-**NEW** Optionally collect Organization and ASEA configuration and metadata in a new restricted log archive bucket
121
123
122
124
## 1.3. Relationship with AWS Landing Zone Solution (ALZ)
123
125
124
126
The ALZ was an AWS Solution designed to deploy a multi-account AWS architecture for customers based on best practices and lessons learned from some of AWS' largest customers. The AWS Accelerator draws on design patterns from the Landing Zone, and re-uses several concepts and nomenclature, but it is not directly derived from it, nor does it leverage any code from the ALZ. The Accelerator is a standalone solution with no dependence on ALZ.
125
127
126
128
## 1.4. Relationship with AWS Control Tower
127
129
128
-
The AWS Secure Environment Accelerator now leverages AWS Control Tower!**(NEW)**
130
+
The AWS Secure Environment Accelerator now leverages AWS Control Tower!
129
131
130
132
With the release of v1.5.0, the AWS Accelerator adds the capability to be deployed on top of AWS Control Tower. Customers get the benefits of the fully managed capabilities of AWS Control Tower combined with the power and flexibility of the Accelerators Networking and Security orchestration.
Copy file name to clipboardExpand all lines: src/mkdocs/docs/installation/install.md
+21-11Lines changed: 21 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ These installation instructions assume one of the prescribed architectures is be
15
15
- Management or root AWS Organization account (the AWS Accelerator cannot be deployed in an AWS sub-account)
16
16
- No additional AWS accounts need to be pre-created before Accelerator installation
17
17
- If required, a limit increase to support your desired number of new AWS sub-accounts (default limit is 10 sub-accounts)
18
-
-**recent changes to new AWS account limits are causing accelerator installation failures, please work with your local account team to increase your limits**
18
+
-**recent changes to new AWS account limits are causing accelerator installation failures, please work with your local account team to increase your limits**
19
19
- Valid Accelerator configuration file, updated to reflect your requirements (see below)
20
20
- Determine your primary or Accelerator `control` or `home` region, this is the AWS region in which you will most often operate
21
21
- Government of Canada customers are still required to do a standalone installation at this time, please request standalone installation instructions from your Account SA or TAM
@@ -142,7 +142,8 @@ Before installing, you must first:
142
142
- OU and account names can ONLY be customized during initial installation. These values MUST match with the values supplied in the Accelerator config file.
143
143
1. Go to the AWS Control Tower console and click `Set up landing zone`
144
144
2. Select your `home` region (i.e. `ca-central-1`) - the Accelerator home region must match the Control Tower home region
145
-
3. Select _all_ regions for `Additional AWS Regions for governance`, click `Next`
145
+
3. Leave the Region deny setting set to `Not enabled` - the Accelerator needs a customized region deny policy
146
+
4. Select _all_ regions for `Additional AWS Regions for governance`, click `Next`
146
147
- The Control Tower and Accelerator regions MUST be properly aligned
147
148
- If a region is not `governed` by Control Tower, it must NOT be listed in `control-tower-supported-regions`
148
149
- To manage a region requires the region:
@@ -152,15 +153,16 @@ Before installing, you must first:
152
153
- While we highly recommend guardrail deployment for all AWS enabled by default regions, at minimum
153
154
- the home region MUST be enabled in Control Tower and must be listed in `control-tower-supported-regions`
154
155
- both the home-region and ${GBL\*REGION} must be listed in `supported-regions`
155
-
4. For the `Foundational OU`, leave the default value `Security`
156
-
5. For the `Additional OU` provide the value `Infrastructure`, click `Next`
157
-
6. Enter the email addresses for your `Log Archive` and `Audit` accounts, change the `Audit` account name to `Security`, click `Next` - OU and account names can ONLY be customized during initial installation. OU names, account names and email addresses \_must\* match identically with the values supplied in the Accelerator config file.
158
-
7. Click setup and wait ~60 minutes for the Control Tower installation to complete
159
-
8. Select `Add or register organizational units`, Click `Add an OU`
160
-
9. Type `Dev`, click `Add`, wait until the OU is finished provisioning (or it will error)
161
-
10. Repeat step 9 for each OU (i.e. `Test`, `Prod`, `Central`, `Sandbox`)
12. In AWS Organizations, move the Management account from the `root` OU into the `Security` OU
156
+
5. For the `Foundational OU`, leave the default value `Security`
157
+
6. For the `Additional OU` provide the value `Infrastructure`, click `Next`
158
+
7. Enter the email addresses for your `Log Archive` and `Audit` accounts, change the `Audit` account name to `Security`, click `Next` - OU and account names can ONLY be customized during initial installation. OU names, account names and email addresses \_must\* match identically with the values supplied in the Accelerator config file.
159
+
8. Select `Enabled` for AWS CloudTrail configuration (if not selected), click `Next`
160
+
9. Click `Set up landing zone` and wait ~60 minutes for the Control Tower installation to complete
161
+
10. Select `Add or register organizational units`, Click `Add an OU`
162
+
11. Type `Dev`, click `Add`, wait until the OU is finished provisioning (or it will error)
163
+
12. Repeat step 9 for each OU (i.e. `Test`, `Prod`, `Central`, `Sandbox`)
14. In AWS Organizations, move the Management account from the `root` OU into the `Security` OU
164
166
4. Verify:
165
167
1. AWS Organizations is enabled in `All features` mode
166
168
- if required, navigate to AWS Organizations, click `Create Organization`, `Create Organization`
@@ -365,9 +367,17 @@ If deploying to an internal AWS employee account and installing the solution wit
365
367
366
368
Current Issues:
367
369
370
+
-**NEW 2022-08-07** An issue with the version of cfn-init in the "latest" AWS standard Windows AMI will cause the state machine to fail during a new installation when deploying an RDGW host. RDGW hosts in existing deployments will fail to fully initialize if the state machine is or has been recently run and the auto-scaling group subsequently refreshes the host (default every 7 days).
371
+
372
+
- To temporarily workaround this issue, assume an administrative role in your `operations` account, open Systems Manager Parameter Store, and `Create parameter` with a Name of `/asea/windows-ami` and a value of `ami-0d336ea070bc06fb8` (which is the previous good AMI), accepting the other default values. Update your config file to point to this new parameter by changing `image-path` (under \deployments\mad) to `/asea/windows-ami` instead of `/aws/service/ami-windows-latest/Windows_Server-2016-English-Full-Base`. Rerun your state machine. If you have an existing RDGW instance it should be terminated to allow the auto-scaling group to redeploy it.
373
+
- This config file entry should be reverted and state machine rerun once the next AWS Windows AMI is released (hopefully within the next week) to ensure you are always using the latest Windows AMI.
374
+
368
375
- If dns-resolver-logging is enabled, VPC names containing spaces are not supported at this time as the VPC name is used as part of the log group name and spaces are not supported in log group names. By default in many of the sample config files, the VPC name is auto-generated from the OU name using a variable. In this situation, spaces are also not permitted in OU names (i.e. if any account in the OU has a VPC with resolver logging enabled and the VPC is using the OU as part of its name)
376
+
369
377
- On larger deployments we are occasionally seeing state machine failures when `Creating Config Recorders`. Simply rerun the state machine with the input of `{"scope": "FULL", "mode": "APPLY"}`.
378
+
370
379
- Occasionally CloudFormation fails to return a completion signal. After the credentials eventually fail (1 hr), the state machine fails. Simply rerun the state machine with the input of `{"scope": "FULL", "mode": "APPLY"}`
380
+
371
381
- If the State Machine fails on an initial execution of NEW-ACCOUNTS, it must be re-run to target the failed accounts (i.e. with `{"scope": "FULL", "mode": "APPLY"}`) or the new sub-accounts will fail to be properly guardrailed
0 commit comments