Skip to content

Commit b993ad0

Browse files
authored
Merge pull request #88 from aws-samples/enhancement/documentation-updates
Documentation and instruction updates
2 parents b50ee7c + 7e09a01 commit b993ad0

File tree

86 files changed

+334
-257
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+334
-257
lines changed

CHANGELOG.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
## Table of Contents<!-- omit in toc -->
44

55
- [Introduction](#introduction)
6+
- [2022-03-29](#2022-03-29)
67
- [2022-03-16](#2022-03-16)
78
- [2022-03-14](#2022-03-14)
89
- [2022-01-07](#2022-01-07)
@@ -22,6 +23,22 @@ All notable changes to this project will be documented in this file.
2223

2324
---
2425

26+
## 2022-03-29
27+
28+
### Changed<!-- omit in toc -->
29+
30+
- Updated the [Common Prerequisites](aws_sra_examples/solutions/common/common_prerequisites) solution README to remove deploying the Staging S3 Bucket within the Solution Deployment steps. The
31+
[DOWNLOAD-AND-STAGE-SOLUTIONS.md](aws_sra_examples/docs/DOWNLOAD-AND-STAGE-SOLUTIONS.md) document now includes this step.
32+
- Updated the [DOWNLOAD-AND-STAGE-SOLUTIONS.md](aws_sra_examples/docs/DOWNLOAD-AND-STAGE-SOLUTIONS.md) document to include deploying the Staging S3 Bucket template. Also, added an AWS CLI command for deploying the template via the command line.
33+
- Updated the `Solution Deployment` instructions in all solution README files to include AWS CLI commands for deploying the main templates. The AWS CLI command can be used to deploy the template via the command line within tools like CloudShell.
34+
- Updated all main template parameters that allow a blank string to include a default empty string allowing the AWS CLI command to work without passing the `optional` parameters.
35+
- Added an allowed pattern for email address parameters.
36+
- All solution template description were updated.
37+
38+
### Removed<!-- omit in toc -->
39+
40+
- Removed the sra-common-cfct-setup-main-ssm.yaml template as it was the same as the other main template.
41+
2542
## 2022-03-16
2643

2744
### Fixed<!-- omit in toc -->

aws_sra_examples/docs/DOWNLOAD-AND-STAGE-SOLUTIONS.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,21 @@ Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-
88

99
1. [Install the prerequisites](#install-the-prerequisites).
1010
2. [Download the SRA examples code from GitHub](#download-the-sra-examples-code-from-github).
11-
3. [Authenticate to the AWS management account](#authenticate-to-the-aws-management-account).
12-
4. Package and stage all the AWS SRA example solutions. For more information see [Staging script details](#staging-script-details).
11+
12+
```bash
13+
git clone https://github.com/aws-samples/aws-security-reference-architecture-examples.git $HOME/aws-sra-examples
14+
cd $HOME/aws-sra-examples
15+
```
16+
17+
3. In the `management account (home region)`, launch an AWS CloudFormation **Stack** using the [sra-common-prerequisites-staging-s3-bucket.yaml](../solutions/common/common_prerequisites/templates/sra-common-prerequisites-staging-s3-bucket.yaml)
18+
template file as the source.
19+
20+
```bash
21+
aws cloudformation deploy --template-file $HOME/aws-sra-examples/aws_sra_examples/solutions/common/common_prerequisites/templates/sra-common-prerequisites-staging-s3-bucket.yaml --stack-name sra-common-prerequisites-staging-s3-bucket --capabilities CAPABILITY_NAMED_IAM
22+
```
23+
24+
4. [Authenticate to the AWS management account](#authenticate-to-the-aws-management-account).
25+
5. Package and stage all the AWS SRA example solutions. For more information see [Staging script details](#staging-script-details).
1326
<!-- markdownlint-disable-next-line MD031 -->
1427

1528
```bash

aws_sra_examples/solutions/cloudtrail/cloudtrail_org/README.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -148,8 +148,17 @@ In the `management account (home region)`, launch an AWS CloudFormation **Stack*
148148

149149
- **Option 1:** (Recommended) Use the [sra-cloudtrail-org-main-ssm.yaml](templates/sra-cloudtrail-org-main-ssm.yaml) template. This is a more automated approach where some of the CloudFormation parameters are populated from SSM parameters created by
150150
the [SRA Prerequisites Solution](../../common/common_prerequisites/).
151+
152+
```bash
153+
aws cloudformation deploy --template-file $HOME/aws-sra-examples/aws_sra_examples/solutions/cloudtrail/cloudtrail_org/templates/sra-cloudtrail-org-main-ssm.yaml --stack-name sra-cloudtrail-org-main-ssm --capabilities CAPABILITY_NAMED_IAM
154+
```
155+
151156
- **Option 2:** Use the [sra-cloudtrail-org-main.yaml](templates/sra-cloudtrail-org-main.yaml) template. Input is required for the CloudFormation parameters where the default is not set.
152157

158+
```bash
159+
aws cloudformation deploy --template-file $HOME/aws-sra-examples/aws_sra_examples/solutions/cloudtrail/cloudtrail_org/templates/sra-cloudtrail-org-main.yaml --stack-name sra-cloudtrail-org-main --capabilities CAPABILITY_NAMED_IAM --parameter-overrides pAuditAccountId=<AUDIT_ACCOUNT_ID> pLogArchiveAccountId=<LOG_ARCHIVE_ACCOUNT_ID> pOrganizationId=<ORGANIZATION_ID> pSRAStagingS3BucketName=<SRA_STAGING_S3_BUCKET_NAME>
160+
```
161+
153162
#### Verify Solution Deployment<!-- omit in toc -->
154163

155164
1. Log into the `management account` and navigate to the CloudTrail page

aws_sra_examples/solutions/cloudtrail/cloudtrail_org/templates/sra-cloudtrail-org-bucket.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
AWSTemplateFormatVersion: 2010-09-09
66
Description:
77
This template enables and configures an AWS S3 bucket for the CloudTrail Organization trail in the Control Tower Log Archive account. -
8-
'cloudtrail_org' solution in the repo, https://github.com/aws-samples/aws-security-reference-architecture-examples
8+
'cloudtrail_org' solution in the repo, https://github.com/aws-samples/aws-security-reference-architecture-examples (sra-1ssgnse0i)
99

1010
Metadata:
1111
SRA:

aws_sra_examples/solutions/cloudtrail/cloudtrail_org/templates/sra-cloudtrail-org-kms.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
AWSTemplateFormatVersion: 2010-09-09
66
Description:
77
This template enables and configures an AWS KMS Key for the CloudTrail Organization trail in the Control Tower Audit account. - 'cloudtrail_org'
8-
solution in the repo, https://github.com/aws-samples/aws-security-reference-architecture-examples
8+
solution in the repo, https://github.com/aws-samples/aws-security-reference-architecture-examples (sra-1ssgnse0i)
99

1010
Metadata:
1111
SRA:

aws_sra_examples/solutions/cloudtrail/cloudtrail_org/templates/sra-cloudtrail-org-main-ssm.yaml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ AWSTemplateFormatVersion: 2010-09-09
66
Description:
77
This template enables an AWS Organizations CloudTrail in the Control Tower Management account with a customer managed KMS key created in the Audit
88
account sending the encrypted logs to an S3 bucket created within the Log Archive account. - 'cloudtrail_org' solution in the repo,
9-
https://github.com/aws-samples/aws-security-reference-architecture-examples
9+
https://github.com/aws-samples/aws-security-reference-architecture-examples (sra-1ssgnse0i)
1010

1111
Metadata:
1212
SRA:
@@ -111,6 +111,7 @@ Parameters:
111111
pCloudTrailLogGroupKmsKey:
112112
AllowedPattern: ^$|^arn:(aws[a-zA-Z-]*){1}:kms:[a-z0-9-]+:\d{12}:key\/[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}$
113113
ConstraintDescription: 'Key ARN example: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab'
114+
Default: ''
114115
Description:
115116
(Optional) KMS Key ARN to use for encrypting the CloudTrail log group data. If empty, encryption is enabled with CloudWatch Logs managing the
116117
server-side encryption keys.
@@ -161,6 +162,7 @@ Parameters:
161162
pLambdaLogGroupKmsKey:
162163
AllowedPattern: ^$|^arn:(aws[a-zA-Z-]*){1}:kms:[a-z0-9-]+:\d{12}:key\/[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}$
163164
ConstraintDescription: 'Key ARN example: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab'
165+
Default: ''
164166
Description:
165167
(Optional) KMS Key ARN to use for encrypting the Lambda logs data. If empty, encryption is enabled with CloudWatch Logs managing the server-side
166168
encryption keys.

aws_sra_examples/solutions/cloudtrail/cloudtrail_org/templates/sra-cloudtrail-org-main.yaml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ AWSTemplateFormatVersion: 2010-09-09
66
Description:
77
This template enables an AWS Organizations CloudTrail in the Control Tower Management account with a customer managed KMS key created in the Audit
88
account sending the encrypted logs to an S3 bucket created within the Log Archive account. - 'cloudtrail_org' solution in the repo,
9-
https://github.com/aws-samples/aws-security-reference-architecture-examples
9+
https://github.com/aws-samples/aws-security-reference-architecture-examples (sra-1ssgnse0i)
1010

1111
Metadata:
1212
SRA:
@@ -107,6 +107,7 @@ Parameters:
107107
pCloudTrailLogGroupKmsKey:
108108
AllowedPattern: ^$|^arn:(aws[a-zA-Z-]*){1}:kms:[a-z0-9-]+:\d{12}:key\/[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}$
109109
ConstraintDescription: 'Key ARN example: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab'
110+
Default: ''
110111
Description:
111112
(Optional) KMS Key ARN to use for encrypting the CloudTrail log group data. If empty, encryption is enabled with CloudWatch Logs managing the
112113
server-side encryption keys.
@@ -148,6 +149,7 @@ Parameters:
148149
pLambdaLogGroupKmsKey:
149150
AllowedPattern: ^$|^arn:(aws[a-zA-Z-]*){1}:kms:[a-z0-9-]+:\d{12}:key\/[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}$
150151
ConstraintDescription: 'Key ARN example: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab'
152+
Default: ''
151153
Description:
152154
(Optional) KMS Key ARN to use for encrypting the Lambda logs data. If empty, encryption is enabled with CloudWatch Logs managing the server-side
153155
encryption keys.

aws_sra_examples/solutions/cloudtrail/cloudtrail_org/templates/sra-cloudtrail-org.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
AWSTemplateFormatVersion: 2010-09-09
66
Description:
77
This template enables and configures an AWS CloudTrail Organization trail in the Control Tower Management account. - 'cloudtrail_org' solution in
8-
the repo, https://github.com/aws-samples/aws-security-reference-architecture-examples
8+
the repo, https://github.com/aws-samples/aws-security-reference-architecture-examples (sra-1ssgnse0i)
99

1010
Metadata:
1111
SRA:

aws_sra_examples/solutions/common/common_cfct_setup/README.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,15 @@ Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-
1111

1212
## Introduction
1313

14-
The `SRA Customizations for Control Tower (CFCT) Solution` deploys the [Customizations for AWS Control Tower](https://aws.amazon.com/solutions/implementations/customizations-for-aws-control-tower/) (CFCT) solution. This provides a method to simplify the deployment of SRA solutions and customer customizations within an AWS Control Tower environment.
14+
The `SRA Customizations for Control Tower (CFCT) Solution` deploys the [Customizations for AWS Control Tower](https://aws.amazon.com/solutions/implementations/customizations-for-aws-control-tower/) (CFCT) solution. This provides a method to simplify
15+
the deployment of SRA solutions and customer customizations within an AWS Control Tower environment.
1516

16-
The Customizations for AWS Control Tower solution combines AWS Control Tower and other highly-available, trusted AWS services to help customers more quickly set up a secure, multi-account AWS environment using AWS best practices. Before deploying this solution, you must have an AWS Control Tower landing zone deployed in your account.
17+
The Customizations for AWS Control Tower solution combines AWS Control Tower and other highly-available, trusted AWS services to help customers more quickly set up a secure, multi-account AWS environment using AWS best practices. Before deploying
18+
this solution, you must have an AWS Control Tower landing zone deployed in your account.
1719

18-
You can easily add customizations to your AWS Control Tower landing zone using an AWS CloudFormation template and service control policies (SCPs). You can deploy the custom template and policies to individual accounts and organizational units (OUs) within your organization. This solution integrates with AWS Control Tower lifecycle events to ensure that resource deployments stay in sync with your landing zone. For example, when a new account is created using the AWS Control Tower account factory, the solution ensures that all resources attached to the account's OUs will be automatically deployed.
20+
You can easily add customizations to your AWS Control Tower landing zone using an AWS CloudFormation template and service control policies (SCPs). You can deploy the custom template and policies to individual accounts and organizational units (OUs)
21+
within your organization. This solution integrates with AWS Control Tower lifecycle events to ensure that resource deployments stay in sync with your landing zone. For example, when a new account is created using the AWS Control Tower account
22+
factory, the solution ensures that all resources attached to the account's OUs will be automatically deployed.
1923

2024
## Deployed Resource Details
2125

@@ -47,9 +51,12 @@ You can easily add customizations to your AWS Control Tower landing zone using a
4751

4852
### Solution Deployment<!-- omit in toc -->
4953

50-
1. In the `management account (home region)`, launch the AWS CloudFormation **Stack** using the template file as the source from the below chosen options:
51-
- **Option 1:** (Recommended) Use this template, [sra-common-cfct-setup-main-ssm.yaml](templates/sra-common-cfct-setup-main-ssm.yaml), for a more automated approach where CloudFormation parameters resolve SSM parameters.
52-
- **Option 2:** Use this template, [sra-common-cfct-setup-main.yaml](templates/sra-common-cfct-setup-main.yaml), where input is required for the CloudFormation parameters, without resolving SSM parameters.
54+
1. In the `management account (home region)`, launch an AWS CloudFormation **Stack** using the [sra-common-cfct-setup-main.yaml](templates/sra-common-cfct-setup-main.yaml) template file as the source.
55+
56+
```bash
57+
aws cloudformation deploy --template-file $HOME/aws-sra-examples/aws_sra_examples/solutions/common/common_cfct_setup/templates/sra-common-cfct-setup-main.yaml --stack-name sra-common-cfct-setup-main --capabilities CAPABILITY_NAMED_IAM
58+
```
59+
5360
2. For CodeCommit setup follow these steps: [AWS CodeCommit Repo](../../../docs/CFCT-DEPLOYMENT-INSTRUCTIONS.md#aws-codecommit-repo)
5461

5562
### Solution Delete Instructions<!-- omit in toc -->

aws_sra_examples/solutions/common/common_cfct_setup/templates/sra-common-cfct-setup-main-ssm.yaml

Lines changed: 0 additions & 158 deletions
This file was deleted.

0 commit comments

Comments
 (0)