Skip to content

Automate AWS Config rule deployment across multi-region, multi-account environments using GitHub Actions and CloudFormation — built for CIS/NIST/ISO compliance.

Notifications You must be signed in to change notification settings

Runc9/aws-config-rule-cicd-for-multi-region-grc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔐 Compliance-as-Code: Multi-Account AWS Config Rule Deployment (GRC Engineering Lab)

Framework: NIST 800-53 CIS Benchmarks Status Type Deploy Workflow


1. 🧠 Overview

Scenario: You're a GRC engineer managing 100+ AWS accounts across multiple regions. Your mission? Enforce compliance with CIS, NIST 800-53, and ISO 27001 — not manually, but through scalable, automated AWS Config rules delivered as code.

This repo demonstrates how to:

  • Transform written security controls into auditable AWS Config rules
  • Deploy rules using GitHub Actions + CloudFormation
  • Automate compliance enforcement across environments with traceability and version control

2. 🧩 Architecture Diagram

Architecture


3. 🎯 Lab Objectives

  • ✅ Define a managed AWS Config rule (IAM_PASSWORD_POLICY)
  • ✅ Convert it into JSON format with tagging metadata
  • ✅ Write a CloudFormation template for reusable deployments
  • ✅ Configure GitHub Actions to validate + deploy rules on push
  • ✅ Store AWS credentials securely using GitHub Secrets

5. How It Works

All AWS Config rules are defined as .json files inside the config-rules/ folder.

The rule is deployed via templates/config-rule-template.yaml.

On every Git push to config-rules/ or templates/, GitHub Actions automatically:

  • Validates the rule format
  • Loads AWS credentials from GitHub Secrets
  • Deploys the rule using aws cloudformation deploy

6. CI/CD Pipeline (GitHub Actions)

Stage Description
Checkout Fetches code from the GitHub repository
Configure AWS Credentials Loads secrets into the runner environment
CloudFormation Deploy Applies the config rule using AWS CLI

7. Skills Demonstrated

  • AWS Config (managed rule deployment)
  • CloudFormation (parameterized infrastructure as code)
  • GitHub Actions (CI/CD automation)
  • GitHub Secrets (secure credential handling)
  • Compliance-as-Code implementation
  • IAM control enforcement
  • Multi-region deployment automation

8. Resources

About

Automate AWS Config rule deployment across multi-region, multi-account environments using GitHub Actions and CloudFormation — built for CIS/NIST/ISO compliance.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published