-
Notifications
You must be signed in to change notification settings - Fork 0
/
sra-common-prerequisites-main.yaml
412 lines (404 loc) · 18.7 KB
/
sra-common-prerequisites-main.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
########################################################################
# Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
# SPDX-License-Identifier: MIT-0
########################################################################
AWSTemplateFormatVersion: 2010-09-09
Description:
This template creates the pre-requisite resources for staging the SRA solutions. - 'common_prerequisites' solution in the repo,
https://github.com/aws-samples/aws-security-reference-architecture-examples (sra-1ssgnse2h)
Metadata:
SRA:
Version: 1.2
Entry: Parameters for deploying solution without resolving SSM parameters
Order: 1
AWS::CloudFormation::Interface:
ParameterGroups:
- Label:
default: General Properties
Parameters:
- pSRASolutionName
- pSRASolutionVersion
- pSRAStagingS3BucketNamePrefix
- pCreateSRAStagingS3BucketInMemberAccounts
- pCreateSSMParametersInMemberAccounts
- Label:
default: Control Tower Properties
Parameters:
- pAuditAccountId
- pLogArchiveAccountId
- pRootOrganizationalUnitId
- pOrganizationId
- pHomeRegion
- Label:
Description: Region Properties
Parameters:
- pCustomerControlTowerRegions
- pCustomerControlTowerRegionsWithoutHomeRegion
- pEnabledRegions
- pEnabledRegionsWithoutHomeRegion
- Label:
default: Control Tower Role Properties
Parameters:
- pCreateAWSControlTowerExecutionRole
- Label:
default: General Lambda Function Properties
Parameters:
- pCreateLambdaLogGroup
- pLambdaLogGroupRetention
- pLambdaLogGroupKmsKey
- pLambdaLogLevel
ParameterLabels:
pAuditAccountId:
default: Audit Account ID
pCreateAWSControlTowerExecutionRole:
default: Create AWS Control Tower Execution Role
pCreateLambdaLogGroup:
default: Create Lambda Log Group
pCreateSRAStagingS3BucketInMemberAccounts:
default: Create SRA Staging S3 Bucket in Member Accounts
pCreateSSMParametersInMemberAccounts:
default: Create SSM Parameters in Member Accounts
pCustomerControlTowerRegions:
default: Customer Control Tower Regions
pCustomerControlTowerRegionsWithoutHomeRegion:
default: Customer Control Tower Regions without Home Region
pEnabledRegions:
default: Enabled Regions
pEnabledRegionsWithoutHomeRegion:
default: Enabled Regions without Home Region
pHomeRegion:
default: Control Tower Home Region
pLambdaLogGroupRetention:
default: Lambda Log Group Retention
pLambdaLogGroupKmsKey:
default: (Optional) Lambda Logs KMS Key
pLambdaLogLevel:
default: Lambda Log Level
pLogArchiveAccountId:
default: Log Archive Account ID
pOrganizationId:
default: Organization ID
pRootOrganizationalUnitId:
default: Root Organizational Unit ID
pSRASolutionName:
default: SRA Solution Name
pSRASolutionVersion:
default: SRA Solution Version
pSRAStagingS3BucketNamePrefix:
default: SRA Staging S3 Bucket Name Prefix
Parameters:
pAuditAccountId:
AllowedPattern: '^\d{12}$'
ConstraintDescription: Must be 12 digits.
Description: AWS Account ID of the Control Tower Audit account.
Type: String
pCreateAWSControlTowerExecutionRole:
AllowedValues: ['true', 'false']
Default: 'true'
Description: Indicates whether the AWS Control Tower Execution role should be created.
Type: String
pCreateLambdaLogGroup:
AllowedValues: ['true', 'false']
Default: 'false'
Description:
Indicates whether a CloudWatch Log Group should be explicitly created for the Lambda function, to allow for setting a Log Retention and/or KMS
Key for encryption.
Type: String
pCreateSRAStagingS3BucketInMemberAccounts:
AllowedValues: ['true', 'false']
Default: 'false'
Description: Indicates whether the SRA Staging S3 Bucket should be created in all member accounts.
Type: String
pCreateSSMParametersInMemberAccounts:
AllowedValues: ['true', 'false']
Default: 'true'
Description: Indicates whether the SSM Parameters should be created in all member accounts.
Type: String
pCustomerControlTowerRegions:
AllowedPattern: '^([a-z0-9-]{1,64})$|^(([a-z0-9-]{1,64},)*[a-z0-9-]{1,64})$'
ConstraintDescription:
Only lowercase letters, numbers, and hyphens ('-') allowed. (e.g. us-east-1) Additional AWS regions can be provided, separated by commas without
spaces. (e.g. us-east-1,ap-southeast-2)
Description: Customer Control Tower regions (2+ regions, separate by commas)
Type: String
pCustomerControlTowerRegionsWithoutHomeRegion:
AllowedPattern: '^$|^([a-z0-9-]{1,64})$|^(([a-z0-9-]{1,64},)*[a-z0-9-]{1,64})$'
ConstraintDescription:
Only lowercase letters, numbers, and hyphens ('-') allowed. (e.g. us-east-1) Additional AWS regions can be provided, separated by commas without
spaces. (e.g. us-east-1,ap-southeast-2)
Description:
Customer Control Tower regions without Home Region (2+ regions, separate by commas). Leave blank when only one region is governed by Control
Tower.
Type: String
pEnabledRegions:
AllowedPattern: '^([a-z0-9-]{1,64})$|^(([a-z0-9-]{1,64},)*[a-z0-9-]{1,64})$'
ConstraintDescription:
Only lowercase letters, numbers, and hyphens ('-') allowed. (e.g. us-east-1) Additional AWS regions can be provided, separated by commas without
spaces. (e.g. us-east-1,ap-southeast-2)
Description:
Enabled regions (2+ regions, separate by commas). Regions that are enabled within all accounts in the AWS Organization. This list should include
all enabled regions and not just the Control Tower governed regions. For example, it is recommended to enable GuardDuty in all active regions,
which might include regions not governed by Control Tower.
Type: String
pEnabledRegionsWithoutHomeRegion:
AllowedPattern: '^([a-z0-9-]{1,64})$|^(([a-z0-9-]{1,64},)*[a-z0-9-]{1,64})$'
ConstraintDescription:
Only lowercase letters, numbers, and hyphens ('-') allowed. (e.g. us-east-1) Additional AWS regions can be provided, separated by commas without
spaces. (e.g. us-east-1,ap-southeast-2)
Description: Enabled regions without Home Region (2+ regions, separate by commas)
Type: String
pHomeRegion:
AllowedPattern: '^[a-z0-9-]{1,64}$'
ConstraintDescription: AWS Region Example - 'us-east-1'
Description: Name of the Control Tower home region
Type: String
pLambdaLogGroupKmsKey:
AllowedPattern: '^$|^arn:(aws[a-zA-Z-]*){1}:kms:[a-z0-9-]+:\d{12}:key\/[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}$'
ConstraintDescription: 'Key ARN example: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab'
Default: ''
Description:
(Optional) KMS Key ARN to use for encrypting the Lambda logs data. If empty, encryption is enabled with CloudWatch Logs managing the server-side
encryption keys.
Type: String
pLambdaLogGroupRetention:
AllowedValues: [1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, 3653]
Default: 14
Description: Specifies the number of days you want to retain log events
Type: String
pLambdaLogLevel:
AllowedValues: [INFO, ERROR, DEBUG]
Default: INFO
Description: Lambda Function Logging Level
Type: String
pLogArchiveAccountId:
AllowedPattern: '^\d{12}$'
ConstraintDescription: Must be 12 digits.
Description: AWS Account ID of the Control Tower Log Archive account.
Type: String
pOrganizationId:
AllowedPattern: '^o-[a-z0-9]{10,32}$'
ConstraintDescription: Must start with 'o-' followed by from 10 to 32 lowercase letters or digits. (e.g. o-abc1234567)
Description: AWS Organizations ID
Type: String
pRootOrganizationalUnitId:
AllowedPattern: '^r-[0-9a-z]{4,32}$'
ConstraintDescription: Must start with 'r-' followed by from 4 to 32 lowercase letters or digits. (e.g. r-abc123)
Description: Root Organizational Unit ID
Type: String
pSRASolutionName:
AllowedValues: [sra-common-prerequisites]
Default: sra-common-prerequisites
Description: The SRA solution name. The Description value is the folder name of the solution
Type: String
pSRASolutionVersion:
AllowedValues: [v1.2]
Default: v1.2
Description: The SRA solution version. Used to trigger updates on the nested StackSets.
Type: String
pSRAStagingS3BucketNamePrefix:
AllowedValues: [sra-staging]
Default: sra-staging
Description:
SRA Staging S3 bucket name prefix for the SRA artifacts relevant to the solutions. (e.g., lambda zips, CloudFormation templates). The account
and region are added to the prefix <bucket-name-prefix>-<account-id>-<region>. Example = sra-staging-123456789012-us-east-1.
Type: String
Conditions:
cCreateSRAStagingS3BucketInMemberAccounts: !Equals [!Ref pCreateSRAStagingS3BucketInMemberAccounts, 'true']
cCreateSSMParametersInMemberAccounts: !Equals [!Ref pCreateSSMParametersInMemberAccounts, 'true']
cCreateAWSControlTowerExecutionRole: !Equals [!Ref pCreateAWSControlTowerExecutionRole, 'true']
cMoreThanOneControlTowerGovernedRegion: !Not [!Equals [!Ref pCustomerControlTowerRegionsWithoutHomeRegion, '']]
Resources:
rControlTowerExecutionRoleStack:
Type: AWS::CloudFormation::Stack
Condition: cCreateAWSControlTowerExecutionRole
Properties:
TemplateURL: !Sub
- https://${SRAStagingS3BucketName}.s3.${AWS::Region}.${AWS::URLSuffix}/${pSRASolutionName}/templates/sra-common-prerequisites-control-tower-execution-role.yaml
- SRAStagingS3BucketName: !Sub ${pSRAStagingS3BucketNamePrefix}-${AWS::AccountId}-${AWS::Region}
Tags:
- Key: sra-solution
Value: !Ref pSRASolutionName
rSSMParametersMemberAccountsStackSet:
Condition: cCreateSSMParametersInMemberAccounts
Type: AWS::CloudFormation::StackSet
Properties:
StackSetName: sra-member-account-parameters
AutoDeployment:
Enabled: true
RetainStacksOnAccountRemoval: false
CallAs: SELF
# Using the Description with !GetAtt referencing the rControlTowerExecutionRoleStack to force the dependency, if cCreateAWSControlTowerExecutionRole is true.
Description: !If
- cCreateAWSControlTowerExecutionRole
- !Sub [
'${pSRASolutionVersion} Deploys SSM Parameters via ${SolutionName}',
SolutionName: !GetAtt rControlTowerExecutionRoleStack.Outputs.oSRASolutionName,
]
- !Sub ${pSRASolutionVersion} Deploys SSM Parameters via ${pSRASolutionName}
OperationPreferences:
FailureTolerancePercentage: 100
MaxConcurrentPercentage: 100
RegionConcurrencyType: PARALLEL
PermissionModel: SERVICE_MANAGED
StackInstancesGroup:
- DeploymentTargets:
OrganizationalUnitIds:
- !Ref pRootOrganizationalUnitId
Regions: !Split [',', !Ref pCustomerControlTowerRegions]
TemplateURL: !Sub
- https://${SRAStagingS3BucketName}.s3.${AWS::Region}.${AWS::URLSuffix}/${pSRASolutionName}/templates/sra-common-prerequisites-member-account-parameters.yaml
- SRAStagingS3BucketName: !Sub ${pSRAStagingS3BucketNamePrefix}-${AWS::AccountId}-${AWS::Region}
Tags:
- Key: sra-solution
Value: !Ref pSRASolutionName
Parameters:
- ParameterKey: pAuditAccountId
ParameterValue: !Ref pAuditAccountId
- ParameterKey: pCustomerControlTowerRegions
ParameterValue: !Ref pCustomerControlTowerRegions
- ParameterKey: pCustomerControlTowerRegionsWithoutHomeRegion
ParameterValue: !If [cMoreThanOneControlTowerGovernedRegion, !Split [',', pCustomerControlTowerRegionsWithoutHomeRegion], 'NONE']
- ParameterKey: pEnabledRegions
ParameterValue: !Ref pEnabledRegions
- ParameterKey: pEnabledRegionsWithoutHomeRegion
ParameterValue: !Ref pEnabledRegionsWithoutHomeRegion
- ParameterKey: pHomeRegion
ParameterValue: !Ref pHomeRegion
- ParameterKey: pLogArchiveAccountId
ParameterValue: !Ref pLogArchiveAccountId
- ParameterKey: pManagementAccountId
ParameterValue: !Ref AWS::AccountId
- ParameterKey: pOrganizationId
ParameterValue: !Ref pOrganizationId
- ParameterKey: pRootOrganizationalUnitId
ParameterValue: !Ref pRootOrganizationalUnitId
rStagingS3BucketManagementAccountStackSet:
Condition: cMoreThanOneControlTowerGovernedRegion
Type: AWS::CloudFormation::StackSet
Properties:
StackSetName: sra-staging-s3-bucket-management-account-regions
AdministrationRoleARN: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/service-role/AWSControlTowerStackSetRole
CallAs: SELF
Capabilities:
- CAPABILITY_NAMED_IAM
# Using the Description with !GetAtt referencing the rControlTowerExecutionRoleStack to force the dependency, if cCreateAWSControlTowerExecutionRole is true.
Description: !If
- cCreateAWSControlTowerExecutionRole
- !Sub [
'${pSRASolutionVersion} Deploys an SRA Staging S3 Bucket via ${SolutionName}',
SolutionName: !GetAtt rControlTowerExecutionRoleStack.Outputs.oSRASolutionName,
]
- !Sub ${pSRASolutionVersion} Deploys an SRA Staging S3 Bucket via ${pSRASolutionName}
ExecutionRoleName: AWSControlTowerExecution
OperationPreferences:
FailureTolerancePercentage: 0
MaxConcurrentPercentage: 100
RegionConcurrencyType: PARALLEL
PermissionModel: SELF_MANAGED
StackInstancesGroup:
- DeploymentTargets:
Accounts:
- !Ref AWS::AccountId
Regions: !Split [',', pCustomerControlTowerRegionsWithoutHomeRegion]
TemplateURL: !Sub
- https://${SRAStagingS3BucketName}.s3.${AWS::Region}.${AWS::URLSuffix}/${pSRASolutionName}/templates/sra-common-prerequisites-staging-s3-bucket.yaml
- SRAStagingS3BucketName: !Sub ${pSRAStagingS3BucketNamePrefix}-${AWS::AccountId}-${AWS::Region}
Parameters:
- ParameterKey: pCreateLambdaLogGroup
ParameterValue: !Ref pCreateLambdaLogGroup
- ParameterKey: pLambdaLogGroupKmsKey
ParameterValue: !Ref pLambdaLogGroupKmsKey
- ParameterKey: pLambdaLogGroupRetention
ParameterValue: !Ref pLambdaLogGroupRetention
- ParameterKey: pLambdaLogLevel
ParameterValue: !Ref pLambdaLogLevel
- ParameterKey: pOrganizationId
ParameterValue: !Ref pOrganizationId
Tags:
- Key: sra-solution
Value: !Ref pSRASolutionName
rStagingS3BucketMemberAccountsStackSet:
Condition: cCreateSRAStagingS3BucketInMemberAccounts
Type: AWS::CloudFormation::StackSet
Properties:
StackSetName: sra-staging-s3-bucket-member-accounts
AutoDeployment:
Enabled: true
RetainStacksOnAccountRemoval: false
CallAs: SELF
Capabilities:
- CAPABILITY_NAMED_IAM
# Using the Description with !GetAtt referencing the rControlTowerExecutionRoleStack to force the dependency, if cCreateAWSControlTowerExecutionRole is true.
Description: !If
- cCreateAWSControlTowerExecutionRole
- !Sub [
'${pSRASolutionVersion} Deploys an SRA Staging S3 Bucket via ${SolutionName}',
SolutionName: !GetAtt rControlTowerExecutionRoleStack.Outputs.oSRASolutionName,
]
- !Sub ${pSRASolutionVersion} Deploys an SRA Staging S3 Bucket via ${pSRASolutionName}
OperationPreferences:
FailureTolerancePercentage: 100
MaxConcurrentPercentage: 100
RegionConcurrencyType: PARALLEL
PermissionModel: SERVICE_MANAGED
StackInstancesGroup:
- DeploymentTargets:
OrganizationalUnitIds:
- !Ref pRootOrganizationalUnitId
Regions: !Split [',', !Ref pCustomerControlTowerRegions]
TemplateURL: !Sub
- https://${SRAStagingS3BucketName}.s3.${AWS::Region}.${AWS::URLSuffix}/${pSRASolutionName}/templates/sra-common-prerequisites-staging-s3-bucket.yaml
- SRAStagingS3BucketName: !Sub ${pSRAStagingS3BucketNamePrefix}-${AWS::AccountId}-${AWS::Region}
Parameters:
- ParameterKey: pCreateLambdaLogGroup
ParameterValue: !Ref pCreateLambdaLogGroup
- ParameterKey: pLambdaLogGroupKmsKey
ParameterValue: !Ref pLambdaLogGroupKmsKey
- ParameterKey: pLambdaLogGroupRetention
ParameterValue: !Ref pLambdaLogGroupRetention
- ParameterKey: pLambdaLogLevel
ParameterValue: !Ref pLambdaLogLevel
- ParameterKey: pOrganizationId
ParameterValue: !Ref pOrganizationId
Tags:
- Key: sra-solution
Value: !Ref pSRASolutionName
rSecretsKMSKeyStackSet:
Type: AWS::CloudFormation::StackSet
Properties:
StackSetName: sra-common-prerequisites-secrets-kms
AdministrationRoleARN: !Sub arn:${AWS::Partition}:iam::${AWS::AccountId}:role/service-role/AWSControlTowerStackSetRole
CallAs: SELF
# Using the Description with !GetAtt referencing the rControlTowerExecutionRoleStack to force the dependency, if cCreateAWSControlTowerExecutionRole is true.
Description: !If
- cCreateAWSControlTowerExecutionRole
- !Sub [
'${pSRASolutionVersion} Creates a KMS key within the Audit account for encrypting SRA secrets shared to the Management account via
${SolutionName}',
SolutionName: !GetAtt rControlTowerExecutionRoleStack.Outputs.oSRASolutionName,
]
- !Sub ${pSRASolutionVersion} Creates a KMS key within the Audit account for encrypting SRA secrets shared to the Management account via
${pSRASolutionName}
ExecutionRoleName: AWSControlTowerExecution
OperationPreferences:
FailureTolerancePercentage: 0
MaxConcurrentPercentage: 100
RegionConcurrencyType: PARALLEL
PermissionModel: SELF_MANAGED
StackInstancesGroup:
- DeploymentTargets:
Accounts:
- !Ref pAuditAccountId
Regions:
- !Ref AWS::Region
TemplateURL: !Sub
- https://${SRAStagingS3BucketName}.s3.${AWS::Region}.${AWS::URLSuffix}/${pSRASolutionName}/templates/sra-common-prerequisites-secrets-kms.yaml
- SRAStagingS3BucketName: !Sub ${pSRAStagingS3BucketNamePrefix}-${AWS::AccountId}-${AWS::Region}
Parameters:
- ParameterKey: pManagementAccountId
ParameterValue: !Ref AWS::AccountId
- ParameterKey: pOrganizationId
ParameterValue: !Ref pOrganizationId
Tags:
- Key: sra-solution
Value: !Ref pSRASolutionName