Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit02704dc

Browse files
authored
Merge branch 'main' into encrypted_efs
2 parents0d4dc07 +a818726 commit02704dc

File tree

68 files changed

+1032
-351
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+1032
-351
lines changed

‎.github/workflows/linter.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,13 +37,18 @@ jobs:
3737
##########################
3838
-name:Checkout Code
3939
uses:actions/checkout@v2
40+
with:
41+
# Full git history is needed to get a proper list of changed files within `super-linter`
42+
fetch-depth:0
4043

4144
################################
4245
# Run Linter against code base #
4346
################################
4447
-name:Lint Code Base
45-
uses:docker://github/super-linter:latest
48+
uses:github/super-linter@v3
4649
env:
50+
GITHUB_TOKEN:${{ secrets.GITHUB_TOKEN }}
4751
DEFAULT_BRANCH:'main'
4852
VALIDATE_ALL_CODEBASE:false
4953
VALIDATE_TERRAFORM:true
54+
VALIDATE_JSON:true

‎.github/workflows/terraform.yml

Lines changed: 176 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,42 +25,210 @@ jobs:
2525
# HIPAA Validation
2626
-name:Terraform fmt HIPAA
2727
run:terraform fmt
28-
working-directory:./hipaa_scp
28+
working-directory:./compliance_scp/hipaa
2929
continue-on-error:true
3030

3131
-name:Terraform Init HIPAA
3232
run:terraform init
33-
working-directory:./hipaa_scp
33+
working-directory:./compliance_scp/hipaa
3434

3535
-name:Terraform Validate HIPAA
3636
run:terraform validate -no-color
37-
working-directory:./hipaa_scp
37+
working-directory:./compliance_scp/hipaa
3838

3939
-name:Terraform Plan HIPAA
4040
run:terraform plan -no-color
4141
continue-on-error:false
42-
working-directory:./hipaa_scp
42+
working-directory:./compliance_scp/hipaa
4343
env:
4444
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
4545

4646
# PCI Validation
4747
-name:Terraform fmt PCI
4848
run:terraform fmt
49-
working-directory:./pci_scp
49+
working-directory:./compliance_scp/pci
5050
continue-on-error:true
5151

5252
-name:Terraform Init PCI
5353
run:terraform init
54-
working-directory:./pci_scp
54+
working-directory:./compliance_scp/pci
5555

5656
-name:Terraform Validate PCI
5757
run:terraform validate -no-color
58-
working-directory:./pci_scp
58+
working-directory:./compliance_scp/pci
5959

6060
-name:Terraform Plan PCI
6161
run:terraform plan -no-color
6262
continue-on-error:false
63-
working-directory:./pci_scp
63+
working-directory:./compliance_scp/pci
64+
env:
65+
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
66+
67+
# SOC Validation
68+
-name:Terraform fmt SOC
69+
run:terraform fmt
70+
working-directory:./compliance_scp/soc
71+
continue-on-error:true
72+
73+
-name:Terraform Init SOC
74+
run:terraform init
75+
working-directory:./compliance_scp/soc
76+
77+
-name:Terraform Validate SOC
78+
run:terraform validate -no-color
79+
working-directory:./compliance_scp/soc
80+
81+
-name:Terraform Plan SOC
82+
run:terraform plan -no-color
83+
continue-on-error:false
84+
working-directory:./compliance_scp/soc
85+
env:
86+
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
87+
88+
# ISO Validation
89+
-name:Terraform fmt ISO
90+
run:terraform fmt
91+
working-directory:./compliance_scp/iso
92+
continue-on-error:true
93+
94+
-name:Terraform Init ISO
95+
run:terraform init
96+
working-directory:./compliance_scp/iso
97+
98+
-name:Terraform Validate ISO
99+
run:terraform validate -no-color
100+
working-directory:./compliance_scp/iso
101+
102+
-name:Terraform Plan ISO
103+
run:terraform plan -no-color
104+
continue-on-error:false
105+
working-directory:./compliance_scp/iso
106+
env:
107+
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
108+
109+
# FedRAMP Medium Validation
110+
-name:Terraform fmt FedRAMP Med
111+
run:terraform fmt
112+
working-directory:./compliance_scp/fedrampMed
113+
continue-on-error:true
114+
115+
-name:Terraform Init FedRAMP Med
116+
run:terraform init
117+
working-directory:./compliance_scp/fedrampMed
118+
119+
-name:Terraform Validate FedRAMP Med
120+
run:terraform validate -no-color
121+
working-directory:./compliance_scp/fedrampMed
122+
123+
-name:Terraform Plan FedRAMP Med
124+
run:terraform plan -no-color
125+
continue-on-error:false
126+
working-directory:./compliance_scp/fedrampMed
127+
env:
128+
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
129+
130+
# FedRAMP High Validation
131+
-name:Terraform fmt FedRAMP High
132+
run:terraform fmt
133+
working-directory:./compliance_scp/fedrampHigh
134+
continue-on-error:true
135+
136+
-name:Terraform Init FedRAMP High
137+
run:terraform init
138+
working-directory:./compliance_scp/fedrampHigh
139+
140+
-name:Terraform Validate FedRAMP High
141+
run:terraform validate -no-color
142+
working-directory:./compliance_scp/fedrampHigh
143+
144+
-name:Terraform Plan FedRAMP High
145+
run:terraform plan -no-color
146+
continue-on-error:false
147+
working-directory:./compliance_scp/fedrampHigh
148+
env:
149+
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
150+
151+
# DoD CC SRG IL2 (East/West) Validation
152+
-name:Terraform fmt DoD CC SRG IL2 (East/West)
153+
run:terraform fmt
154+
working-directory:./compliance_scp/dodCcSrgIl2Ew
155+
continue-on-error:true
156+
157+
-name:Terraform Init DoD CC SRG IL2 (East/West)
158+
run:terraform init
159+
working-directory:./compliance_scp/dodCcSrgIl2Ew
160+
161+
-name:Terraform Validate DoD CC SRG IL2 (East/West)
162+
run:terraform validate -no-color
163+
working-directory:./compliance_scp/dodCcSrgIl2Ew
164+
165+
-name:Terraform Plan DoD CC SRG IL2 (East/West)h
166+
run:terraform plan -no-color
167+
continue-on-error:false
168+
working-directory:./compliance_scp/dodCcSrgIl2Ew
169+
env:
170+
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
171+
172+
# DoD CC SRG IL2 (GovCloud) Validation
173+
-name:Terraform fmt DoD CC SRG IL2 (GovCloud)
174+
run:terraform fmt
175+
working-directory:./compliance_scp/dodCcSrgIl2Gc
176+
continue-on-error:true
177+
178+
-name:Terraform Init DoD CC SRG IL2 (GovCloud)
179+
run:terraform init
180+
working-directory:./compliance_scp/dodCcSrgIl2Gc
181+
182+
-name:Terraform Validate DoD CC SRG IL2 (GovCloud)
183+
run:terraform validate -no-color
184+
working-directory:./compliance_scp/dodCcSrgIl2Gc
185+
186+
-name:Terraform Plan DoD CC SRG IL2 (GovCloud)
187+
run:terraform plan -no-color
188+
continue-on-error:false
189+
working-directory:./compliance_scp/dodCcSrgIl2Gc
190+
env:
191+
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
192+
193+
# DoD CC SRG IL4 (GovCloud) Validation
194+
-name:Terraform fmt DoD CC SRG IL4 (GovCloud)
195+
run:terraform fmt
196+
working-directory:./compliance_scp/dodCcSrgIl4Gc
197+
continue-on-error:true
198+
199+
-name:Terraform Init DoD CC SRG IL4 (GovCloud)
200+
run:terraform init
201+
working-directory:./compliance_scp/dodCcSrgIl4Gc
202+
203+
-name:Terraform Validate DoD CC SRG IL4 (GovCloud)
204+
run:terraform validate -no-color
205+
working-directory:./compliance_scp/dodCcSrgIl4Gc
206+
207+
-name:Terraform Plan DoD CC SRG IL4 (GovCloud)
208+
run:terraform plan -no-color
209+
continue-on-error:false
210+
working-directory:./compliance_scp/dodCcSrgIl4Gc
211+
env:
212+
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
213+
214+
# DoD CC SRG IL5 (GovCloud) Validation
215+
-name:Terraform fmt DoD CC SRG IL5 (GovCloud)
216+
run:terraform fmt
217+
working-directory:./compliance_scp/dodCcSrgIl5Gc
218+
continue-on-error:true
219+
220+
-name:Terraform Init DoD CC SRG IL5 (GovCloud)
221+
run:terraform init
222+
working-directory:./compliance_scp/dodCcSrgIl5Gc
223+
224+
-name:Terraform Validate DoD CC SRG IL5 (GovCloud)
225+
run:terraform validate -no-color
226+
working-directory:./compliance_scp/dodCcSrgIl5Gc
227+
228+
-name:Terraform Plan DoD CC SRG IL5 (GovCloud)
229+
run:terraform plan -no-color
230+
continue-on-error:false
231+
working-directory:./compliance_scp/dodCcSrgIl5Gc
64232
env:
65233
TF_VAR_target_id:${{ secrets.TARGET_ID }}"'
66234

‎.gitignore

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@
2929
/nbdist/
3030
/.nb-gradle/
3131
/build/
32-
.terraform/*
33-
*/.terraform/*
34-
*/*/.terraform/*
32+
.terraform*
33+
*/.terraform*
34+
*/*/.terraform*
3535
terraform.tfstate
3636
terraform.tfstate.lock
3737

@@ -386,3 +386,5 @@ MigrationBackup/
386386
.DS_Store
387387
*/.DS_Store
388388
*/*/.DS_Store
389+
selections.json
390+
terraform-provider-*

‎README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,8 @@ This repo is a collection of AWS Service Control Policies (SCPs) written in Hash
3434
- Select the`aws_iam_policy_document` you want and combine into one large data document.
3535
- Pick and choose 5 modules to deploy and remove the others.
3636
- Remove`aws_organizations_policy_attachment` from the modules'`main.tf` file and apply. You would then need to manually attach the SCPs.
37-
- The[hipaa_scp](hipaa_scp/) folder is a service control policy that whitelists HIPAA compliant AWS services based off ofhttps://aws.amazon.com/compliance/hipaa-eligible-services-reference/.
38-
- The[pci_scp](pci_scp/) folder is a service control policy that whitelists PCI compliant AWS services based off ofhttps://aws.amazon.com/compliance/services-in-scope/.
37+
- The[hipaa_scp](compliance_scp/hipaa_scp/) folder is a service control policy that whitelists HIPAA compliant AWS services based off ofhttps://aws.amazon.com/compliance/hipaa-eligible-services-reference/.
38+
- The[pci_scp](compliance_scp/pci_scp/) folder is a service control policy that whitelists PCI compliant AWS services based off ofhttps://aws.amazon.com/compliance/services-in-scope/.
3939

4040
##Usage
4141

‎compliance_scp/dodCcSrgIl2Ew/main.tf

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
# The below approved services are based off the list located here: https://aws.amazon.com/compliance/services-in-scope/
2+
3+
data"template_file""dodccsrgil2ew_policy" {
4+
template=file("../templates/dodccsrgIl2Ew.json")
5+
}
6+
7+
resource"aws_organizations_policy""allow_dodccsrgil2ew_services_policy" {
8+
name="Allow DoD CC SRG IL2 (East/West) Services"
9+
description="Only allow DoD CC SRG IL2 (East/West) services as of 03/2021"
10+
11+
content=data.template_file.dodccsrgil2ew_policy.rendered
12+
}
13+
14+
resource"aws_organizations_policy_attachment""allow_dodccsrgil2ew_services_attachment" {
15+
policy_id=aws_organizations_policy.allow_dodccsrgil2ew_services_policy.id
16+
target_id=var.target_id
17+
}
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
variable"target_id" {
2+
description="The Root ID, Organizational Unit ID, or AWS Account ID to apply SCPs."
3+
type=string
4+
}
Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
21
terraform {
32
required_version=">= 0.12"
43
}

‎compliance_scp/dodCcSrgIl2Gc/main.tf

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
# The below approved services are based off the list located here: https://aws.amazon.com/compliance/services-in-scope/
2+
3+
data"template_file""dodccsrgil2gc_policy" {
4+
template=file("../templates/dodccsrgIl2Gc.json")
5+
}
6+
7+
resource"aws_organizations_policy""allow_dodccsrgil2gc_services_policy" {
8+
name="Allow DoD CC SRG IL2 (GovCloud) Services"
9+
description="Only allow DoD CC SRG IL2 (GovCloud) services as of 03/2021"
10+
11+
content=data.template_file.dodccsrgil2gc_policy.rendered
12+
}
13+
14+
resource"aws_organizations_policy_attachment""allow_dodccsrgil2gc_services_attachment" {
15+
policy_id=aws_organizations_policy.allow_dodccsrgil2gc_services_policy.id
16+
target_id=var.target_id
17+
}
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
variable"target_id" {
2+
description="The Root ID, Organizational Unit ID, or AWS Account ID to apply SCPs."
3+
type=string
4+
}
Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
21
terraform {
32
required_version=">= 0.12"
43
}

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp