Skip to content

Commit

Permalink
Add v2.0.2
Browse files Browse the repository at this point in the history
  • Loading branch information
weitzjdevk committed Feb 27, 2020
1 parent 61ee093 commit 1043071
Show file tree
Hide file tree
Showing 29 changed files with 5,928 additions and 128 deletions.
4 changes: 2 additions & 2 deletions unzip/add-on/aws-ad-with-rdgw-ad-connector.template
Original file line number Diff line number Diff line change
Expand Up @@ -207,7 +207,7 @@ Mappings:
SourceBucketName:
Name: solutions-reference
SourceKeyName:
Name: aws-landing-zone/v2.0.1/add-on/aws-ad-with-rdgw-ad-connector.zip
Name: aws-landing-zone/v2.0.2/add-on/aws-ad-with-rdgw-ad-connector.zip
DestinationKeyName:
Name: aws-landing-zone-configuration.zip
LambdaFunction:
Expand All @@ -223,7 +223,7 @@ Resources:
log_level: !FindInMap [LambdaFunction, Logging, Level]
Code:
S3Bucket: !Sub solutions-${AWS::Region}
S3Key: aws-landing-zone/v2.0.1/aws-landing-zone-add-on-config-deployer.zip
S3Key: aws-landing-zone/v2.0.2/aws-landing-zone-add-on-config-deployer.zip
Description: AWS Landing Zone Add-On Deployment Lambda
Handler: add_on_config_deployer.lambda_handler
MemorySize: '512'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -181,7 +181,7 @@ Resources:
sm_arn_handshake_sm: !Ref HandshakeStateMachine
Code:
S3Bucket: !Sub solutions-${AWS::Region}
S3Key: aws-landing-zone/v2.0.1/aws-landing-zone-avm.zip
S3Key: aws-landing-zone/v2.0.2/aws-landing-zone-avm.zip
Description: AWS Lambda-backed Custom Resources for AVM
FunctionName: LandingZoneADConnector
Handler: lambda_custom_resource.lambda_handler
Expand All @@ -201,7 +201,7 @@ Resources:
log_level: 'info'
Code:
S3Bucket: !Sub solutions-${AWS::Region}
S3Key: aws-landing-zone/v2.0.1/aws-landing-zone-state-machine.zip
S3Key: aws-landing-zone/v2.0.2/aws-landing-zone-state-machine.zip
Description: AWS Landing Zone State Machine Handler
FunctionName: LandingZoneStateMachineLambdaADConnector
Handler: state_machine_router.lambda_handler
Expand Down Expand Up @@ -623,7 +623,7 @@ Resources:
wait_time: 15
Code:
S3Bucket: !Sub solutions-${AWS::Region}
S3Key: aws-landing-zone/v2.0.1/aws-landing-zone-handshake-state-machine.zip
S3Key: aws-landing-zone/v2.0.2/aws-landing-zone-handshake-state-machine.zip
Description: AWS Lambda-backed Custom Resources for Handshake Mechanism
FunctionName: LandingZoneHandshakeSMLambdaADConnector
Handler: handshake_sm_router.lambda_handler
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -198,7 +198,7 @@
"S3KeyPrefix": {
"AllowedPattern": "^[0-9a-zA-Z-/.]*$",
"ConstraintDescription": "Quick Start key prefix can include numbers, lowercase letters, uppercase letters, hyphens (-), and forward slash (/).",
"Default": "aws-landing-zone/v2.0.1/scripts/",
"Default": "aws-landing-zone/v2.0.2/scripts/",
"Description": "S3 key prefix for the Quick Start assets. Quick Start key prefix can include numbers, lowercase letters, uppercase letters, hyphens (-), and forward slash (/).",
"Type": "String"
},
Expand Down
4 changes: 2 additions & 2 deletions unzip/add-on/aws-centralized-logging-soution.template
Original file line number Diff line number Diff line change
Expand Up @@ -125,7 +125,7 @@ Mappings:
SourceBucketName:
Name: solutions-reference
SourceKeyName:
Name: aws-landing-zone/v2.0.1/add-on/aws-centralized-logging-solution.zip
Name: aws-landing-zone/v2.0.2/add-on/aws-centralized-logging-solution.zip
DestinationKeyName:
Name: aws-landing-zone-configuration.zip
LambdaFunction:
Expand All @@ -141,7 +141,7 @@ Resources:
log_level: !FindInMap [LambdaFunction, Logging, Level]
Code:
S3Bucket: !Sub solutions-${AWS::Region}
S3Key: aws-landing-zone/v2.0.1/aws-landing-zone-add-on-config-deployer.zip
S3Key: aws-landing-zone/v2.0.2/aws-landing-zone-add-on-config-deployer.zip
Description: AWS Landing Zone Add-On Deployment Lambda
Handler: add_on_config_deployer.lambda_handler
MemorySize: '512'
Expand Down
Binary file not shown.
Binary file not shown.
Original file line number Diff line number Diff line change
@@ -1,19 +1,19 @@
---
#Default region for deploying AWS Landing Zone assets: Code Pipeline, Step functions, Lambda, SSM parameters, Service Catalog Portfolio/Products and StackSets
region: us-east-1
region: {{ region }}
version: 2018-06-14
lock_down_stack_sets_role: Yes
lock_down_stack_sets_role: {{ lock_down_stack_sets_role }}

# Landing Zone Core Account Structure
organizational_units:
# Landing Zone OU for Core accounts
- name: core
- name: {{ core_ou }}
include_in_baseline_products:
- AWS-Landing-Zone-Account-Vending-Machine
core_accounts:
# Security account
- name: security
email: email+lz-security_at_company_dot_com
email: {{ security_email }}
ssm_parameters:
- name: /org/member/security/account_id
value: $[AccountId]
Expand All @@ -33,21 +33,9 @@ organizational_units:
deploy_method: stack_set
# This SNS Topic needs to be deployed in ALL the regions where AWS Config service is enabled. (See baseline_resources: EnableConfig)
regions:
- ap-northeast-1
- ap-northeast-2
- ap-south-1
- ap-southeast-1
- ap-southeast-2
- ca-central-1
- eu-central-1
- eu-west-1
- eu-west-2
- eu-west-3
- sa-east-1
- us-east-1
- us-east-2
- us-west-1
- us-west-2
{%- for region in sns_region_list %}
- {{ region }}
{%- endfor %}
ssm_parameters:
- name: /org/primary/sns_topic_arn
value: $[output_TopicARN]
Expand All @@ -58,24 +46,12 @@ organizational_units:
parameter_file: parameters/core_accounts/aws-landing-zone-guardduty-master.json
deploy_method: stack_set
regions:
- ap-northeast-1
- ap-northeast-2
- ap-south-1
- ap-southeast-1
- ap-southeast-2
- ca-central-1
- eu-central-1
- eu-west-1
- eu-west-2
- eu-west-3
- sa-east-1
- us-east-1
- us-east-2
- us-west-1
- us-west-2
{%- for region in guardduty_region_list %}
- {{ region }}
{%- endfor %}
# Logging account
- name: log-archive
email: email+lz-logging_at_company_dot_com
email: {{ logging_email }}
ssm_parameters:
- name: /org/member/logging/account_id
value: $[AccountId]
Expand All @@ -89,7 +65,7 @@ organizational_units:
value: $[output_BucketName]
# Shared Services account
- name: shared-services
email: email+lz-shared_at_company_dot_com
email: {{ shared_services_email }}
ssm_parameters:
- name: /org/member/sharedservices/account_id
value: $[AccountId]
Expand All @@ -99,7 +75,7 @@ organizational_units:
parameter_file: parameters/core_accounts/aws-landing-zone-shared-services-vpc.json
deploy_method: stack_set
regions:
- us-east-2
- {{ region }}
ssm_parameters:
- name: /org/member/sharedservices/vpc_region
value: $[output_VPCRegion]
Expand Down Expand Up @@ -138,20 +114,26 @@ organizational_units:
- name: /org/primary/organization_id
value: $[OrganizationId]
core_resources: []
- name: applications
{%- for ou in ou_list %}
{%- if ou %}
- name: {{ ou | replace(" ","-") }}
include_in_baseline_products:
- AWS-Landing-Zone-Account-Vending-Machine

{% endif %}
{%- endfor %}
# Landing Zone Service Control Policies
organization_policies:
- name: protect-cloudtrail-config
description: To prevent from deleting or disabling CloudTrail and Config
policy_file: policies/prevent_deleting_cloudtrails_config.json
#Apply to accounts in the following OU(s)
apply_to_accounts_in_ou:
- core
- applications

- {{ core_ou }}
{%- for ou in ou_list %}
{%- if ou %}
- {{ ou | replace(" ","-") }}
{% endif %}
{%- endfor %}
# Landing Zone Service Catalog portolfios/products (Optional/Baseline)
portfolios:
- name: AWS Landing Zone - Baseline
Expand All @@ -171,9 +153,12 @@ portfolios:
product_type: baseline
# Do you wish to auto-apply this baseline to accounts everytime a new version of AVM product is created by pipeline?
apply_baseline_to_accounts_in_ou:
- core
- applications

- {{ core_ou }}
{%- for ou in ou_list %}
{%- if ou %}
- {{ ou | replace(" ","-") }}
{% endif %}
{%- endfor %}
launch_constraint_role: $[alfred_ssm_/org/primary/service_catalog/constraint/role_arn]

# Landing Zone Service Baseline Resources
Expand Down Expand Up @@ -204,22 +189,12 @@ baseline_resources:
template_file: templates/aws_baseline/aws-landing-zone-enable-config.template
parameter_file: parameters/aws_baseline/aws-landing-zone-enable-config.json
deploy_method: stack_set
{%- if enable_config_all_regions.lower() == 'yes' %}
regions:
- ap-northeast-1
- ap-northeast-2
- ap-south-1
- ap-southeast-1
- ap-southeast-2
- ca-central-1
- eu-central-1
- eu-west-1
- eu-west-2
- eu-west-3
- sa-east-1
- us-east-1
- us-east-2
- us-west-1
- us-west-2
{%- for region in config_region_list %}
- {{ region }}
{%- endfor %}
{%- endif %}

# This template deploys the Config Rules that monitor the Global resources i.e. IAM
# It needs to be deployed in Home region ONLY
Expand All @@ -242,22 +217,12 @@ baseline_resources:
template_file: templates/aws_baseline/aws-landing-zone-config-rules.template
parameter_file: parameters/aws_baseline/aws-landing-zone-config-rules.json
deploy_method: stack_set
{%- if enable_config_all_regions.lower() == 'yes' %}
regions:
- ap-northeast-1
- ap-northeast-2
- ap-south-1
- ap-southeast-1
- ap-southeast-2
- ca-central-1
- eu-central-1
- eu-west-1
- eu-west-2
- eu-west-3
- sa-east-1
- us-east-1
- us-east-2
- us-west-1
- us-west-2
{%- for region in config_region_list %}
- {{ region }}
{%- endfor %}
{%- endif %}

- name: EnableNotifications
baseline_products:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
[
{
"ParameterKey": "EnableRootMfaRule",
"ParameterValue": "true"
"ParameterValue": {{ enable_root_mfa_rule | replace("Yes","true") | replace("No","false") }}
},
{
"ParameterKey": "EnableIamPasswordPolicyRule",
"ParameterValue": "true"
"ParameterValue": {{ enable_iam_password_policy_rule | replace("Yes","true") | replace("No","false") }}
},
{
"ParameterKey": "KMSId",
Expand Down Expand Up @@ -43,4 +43,4 @@
"ParameterKey": "MaxPasswordAge",
"ParameterValue": "90"
}
]
]
Original file line number Diff line number Diff line change
@@ -1,31 +1,31 @@
[
{
"ParameterKey": "EnableEncryptedVolumesRule",
"ParameterValue": "true"
"ParameterValue": {{ enable_encrypted_volumes_rule | replace("Yes","true") | replace("No","false") }}
},
{
"ParameterKey": "EnableRdsEncryptionRule",
"ParameterValue": "true"
"ParameterValue": {{ enable_rds_encryption_rule | replace("Yes","true") | replace("No","false") }}
},
{
"ParameterKey": "EnableS3PublicReadRule",
"ParameterValue": "true"
"ParameterValue": {{ enable_s3_public_read_rule | replace("Yes","true") | replace("No","false") }}
},
{
"ParameterKey": "EnableS3PublicWriteRule",
"ParameterValue": "true"
"ParameterValue": {{ enable_s3_public_write_rule | replace("Yes","true") | replace("No","false") }}
},
{
"ParameterKey": "EnableS3ServerSideEncryptionRule",
"ParameterValue": "true"
"ParameterValue": {{ enable_s3_server_side_encryption_rule | replace("Yes","true") | replace("No","false") }}
},
{
"ParameterKey": "EnableRestrictedCommonPortsRule",
"ParameterValue": "true"
"ParameterValue": {{ enable_restricted_common_ports_rule | replace("Yes","true") | replace("No","false") }}
},
{
"ParameterKey": "EnableRestrictedSshRule",
"ParameterValue": "true"
"ParameterValue": {{ enable_restricted_ssh_rule | replace("Yes","true") | replace("No","false") }}
},
{
"ParameterKey": "KMSId",
Expand Down Expand Up @@ -55,4 +55,4 @@
"ParameterKey": "blockedPort5",
"ParameterValue": "4333"
}
]
]
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,6 @@
},
{
"ParameterKey": "SubscribeToAllConfigurationTopic",
"ParameterValue": "false"
"ParameterValue": {{ subscribe_to_all_configuration_topic | replace("Yes","true") | replace("No","false") }}
}
]
]
Loading

0 comments on commit 1043071

Please sign in to comment.