Skip to content

Commit ed0e715

Browse files
authored
feat(core): Update SCPs for Standalone Version (#353)
* Update SCPs for Standalone Version * typo
1 parent 15e5779 commit ed0e715

8 files changed

+55
-59
lines changed

reference-artifacts/SCPs/PBMMAccel-Guardrails-Part1.json

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,7 @@
6060
"s3:PutEncryptionConfiguration",
6161
"s3:PutLifecycleConfiguration",
6262
"s3:PutReplicationConfiguration",
63+
"s3:PutBucketLogging",
6364
"s3:PutBucketPolicy",
6465
"s3:ReplicateDelete",
6566
"s3:PutObjectRetention",
@@ -76,7 +77,7 @@
7677
}
7778
},
7879
{
79-
"Sid": "ProtectCloudFormation",
80+
"Sid": "DenyCFN",
8081
"Effect": "Deny",
8182
"Action": ["cloudformation:*"],
8283
"Resource": [
@@ -94,7 +95,7 @@
9495
}
9596
},
9697
{
97-
"Sid": "DenyAlarmDeletion",
98+
"Sid": "DenyAlarms",
9899
"Effect": "Deny",
99100
"Action": [
100101
"cloudwatch:DeleteAlarms",
@@ -120,7 +121,7 @@
120121
}
121122
},
122123
{
123-
"Sid": "ProtectKeyRoles",
124+
"Sid": "DenyKeyRoles",
124125
"Effect": "Deny",
125126
"Action": ["iam:*"],
126127
"Resource": [
@@ -194,7 +195,7 @@
194195
"Resource": "*"
195196
},
196197
{
197-
"Sid": "DenyLambdaDel",
198+
"Sid": "DenyLambda",
198199
"Effect": "Deny",
199200
"Action": [
200201
"lambda:AddPermission",
@@ -223,7 +224,7 @@
223224
}
224225
},
225226
{
226-
"Sid": "BlockOther",
227+
"Sid": "DenyOther",
227228
"Effect": "Deny",
228229
"Action": [
229230
"aws-portal:ModifyAccount",

reference-artifacts/SCPs/PBMMAccel-Guardrails-Part2.json

Lines changed: 26 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,13 @@
2424
"Sid": "DenyRoot",
2525
"Effect": "Deny",
2626
"NotAction": [
27-
"iam:CreateVirtualMFADevice",
28-
"iam:EnableMFADevice",
29-
"iam:GetUser",
30-
"iam:ListMFADevices",
31-
"iam:ListVirtualMFADevices",
32-
"iam:ResyncMFADevice",
33-
"sts:GetSessionToken"
27+
"iam:CreateVirtualMFADevice",
28+
"iam:EnableMFADevice",
29+
"iam:GetUser",
30+
"iam:ListMFADevices",
31+
"iam:ListVirtualMFADevices",
32+
"iam:ResyncMFADevice",
33+
"sts:GetSessionToken"
3434
],
3535
"Resource": "*",
3636
"Condition": {
@@ -119,6 +119,8 @@
119119
"guardduty:UpdateDetector",
120120
"guardduty:UpdateFindingsFeedback",
121121
"guardduty:UpdatePublishingDestination",
122+
"guardduty:UpdateOrganizationConfiguration",
123+
"guardduty:DisableOrganizationAdminAccount",
122124
"guardduty:CreateMembers",
123125
"guardduty:InviteMembers",
124126
"securityhub:AcceptInvitation",
@@ -133,6 +135,23 @@
133135
"securityhub:DisassociateMembers",
134136
"securityhub:DeleteActionTarget",
135137
"securityhub:BatchDisableStandards",
138+
"securityhub:UpdateSecurityHubConfiguration",
139+
"securityhub:UpdateStandardsControl",
140+
"macie2:AcceptInvitation",
141+
"macie2:CreateInvitations",
142+
"macie2:CreateMember",
143+
"macie2:DeclineInvitations",
144+
"macie2:DeleteInvitations",
145+
"macie2:DeleteMember",
146+
"macie2:DisableMacie",
147+
"macie2:DisableOrganizationAdminAccount",
148+
"macie2:DisassociateFromMasterAccount",
149+
"macie2:DisassociateMember",
150+
"macie2:EnableMacie",
151+
"macie2:EnableOrganizationAdminAccount",
152+
"macie2:UpdateMacieSession",
153+
"macie2:UpdateMemberSession",
154+
"macie2:UpdateOrganizationConfiguration",
136155
"fms:DisassociateAdminAccount",
137156
"access-analyzer:DeleteAnalyzer",
138157
"account:EnableRegion",

reference-artifacts/SCPs/Quarantine-Deny-All.json

Lines changed: 0 additions & 19 deletions
This file was deleted.
Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
11
{
22
"Version": "2012-10-17",
33
"Statement": [
4-
{
5-
"Sid": "DenyAllAWSServicesExceptBreakglassRoles",
6-
"Effect": "Deny",
7-
"Action": "*",
8-
"Resource": "*",
9-
"Condition": {
10-
"ArnNotLike": {
11-
"aws:PrincipalARN": [
12-
"arn:aws:iam::*:role/AWSCloudFormationStackSetExecutionRole",
13-
"arn:aws:iam::*:role/aws*",
14-
"arn:aws:iam::*:role/PBMMAccel-*"
15-
]
16-
}
17-
}
4+
{
5+
"Sid": "DenyAllAWSServicesExceptBreakglassRoles",
6+
"Effect": "Deny",
7+
"Action": "*",
8+
"Resource": "*",
9+
"Condition": {
10+
"ArnNotLike": {
11+
"aws:PrincipalARN": [
12+
"arn:aws:iam::*:role/AWSCloudFormationStackSetExecutionRole",
13+
"arn:aws:iam::*:role/aws*",
14+
"arn:aws:iam::*:role/PBMMAccel-*"
15+
]
16+
}
1817
}
18+
}
1919
]
20-
}
20+
}

reference-artifacts/SCPs/aws-landing-zone-core-mandatory-preventive-guardrails-Accel.json

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@
1515
"sns:Unsubscribe"
1616
],
1717
"Resource":[
18-
"arn:aws:sns:*:*:AWS-Landing-Zone*"
18+
"arn:aws:sns:*:*:AWS-Landing-Zone*",
19+
"arn:aws:sns:*:*:PBMMAccel-*"
1920
],
2021
"Effect":"Deny",
2122
"Sid":"GRSNSSUBSCRIPTIONPOLICY"
@@ -36,7 +37,8 @@
3637
"cloudtrail:UpdateTrail"
3738
],
3839
"Resource":[
39-
"arn:aws:cloudtrail:*:*:trail/*AWS-Landing-Zone-*"
40+
"arn:aws:cloudtrail:*:*:trail/*AWS-Landing-Zone-*",
41+
"arn:aws:cloudtrail:*:*:trail/PBMMAccel-*"
4042
],
4143
"Effect":"Deny",
4244
"Sid":"GRCLOUDTRAILENABLED"
@@ -58,7 +60,8 @@
5860
"sns:SetTopicAttributes"
5961
],
6062
"Resource":[
61-
"arn:aws:sns:*:*:AWS-Landing-Zone-*"
63+
"arn:aws:sns:*:*:AWS-Landing-Zone-*",
64+
"arn:aws:sns:*:*:PBMMAccel-*"
6265
],
6366
"Effect":"Deny",
6467
"Sid":"GRSNSTOPICPOLICY"
@@ -162,7 +165,8 @@
162165
"events:DeleteRule"
163166
],
164167
"Resource":[
165-
"arn:aws:events:*:*:rule/AWS-Landing-Zone-*"
168+
"arn:aws:events:*:*:rule/AWS-Landing-Zone-*",
169+
"arn:aws:events:*:*:rule/PBMMAccel-*"
166170
],
167171
"Effect":"Deny",
168172
"Sid":"GRCLOUDWATCHEVENTPOLICY"

reference-artifacts/config-pbmm-standalone-full.json

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1173,9 +1173,6 @@
11731173
},
11741174
"log-retention": 180,
11751175
"limits": {
1176-
"AWS Organizations/Maximum accounts": {
1177-
"value": 20
1178-
}
11791176
},
11801177
"iam": {
11811178
"users": [

reference-artifacts/config-pbmm-standalone-lite.json

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1116,9 +1116,6 @@
11161116
},
11171117
"log-retention": 180,
11181118
"limits": {
1119-
"AWS Organizations/Maximum accounts": {
1120-
"value": 20
1121-
}
11221119
},
11231120
"iam": {
11241121
"users": [

reference-artifacts/config.example.json

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1185,9 +1185,6 @@
11851185
},
11861186
"log-retention": 180,
11871187
"limits": {
1188-
"AWS Organizations/Maximum accounts": {
1189-
"value": 20
1190-
}
11911188
},
11921189
"iam": {
11931190
"users": [

0 commit comments

Comments
 (0)