You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: security_controls_scp/README.md
+18-12Lines changed: 18 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -9,8 +9,8 @@ The following SCPs should only be applied after the account has been configured
9
9
###Account
10
10
11
11
-[deny_region_interaction.tf](./modules/account/deny_region_interaction.tf) - Denies the ability to enable or disable a region.
12
-
- By default, when new regions are enabled by AWS, you now have to enable that region before IAM will propagate.
13
-
- This policy can be used to lock down the ability to launch resources in unapproved regions or deny a malicious actor from disabling a region in your account.
12
+
- By default, when new regions are enabled by AWS, you now have to enable that region before IAM will propagate.
13
+
- This policy can be used to lock down the ability to launch resources in unapproved regions or deny a malicious actor from disabling a region in your account.
14
14
-*Important*: When a region is disabled, and there are IAM resources in that region, they will be removed. Please view the documentation[here](https://aws.amazon.com/blogs/security/setting-permissions-to-enable-accounts-for-upcoming-aws-regions/) for more information.
15
15
16
16
###AI Services
@@ -20,10 +20,16 @@ The following SCPs should only be applied after the account has been configured
20
20
- Please review the documentation[here](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_ai-opt-out_syntax.html) on how to selectively opt in to data sharing.
21
21
- Prior to applying, ensure that the AI services opt-out policy type is enabled for the organization.
22
22
23
+
###Amazon Comprehend
24
+
25
+
-[require_kms_cmks.tf](./modules/comprehend/require_kms_cmks.tf) - Requires all applicable Amazon Comprehend calls to pass in a Amazon Key Management Service (KMS) customer managed key (CMK). Per the[documentation](https://docs.aws.amazon.com/comprehend/latest/dg/kms-in-comprehend.html),_Amazon Comprehend can encrypt custom models using either its own KMS Key or a provided customer managed key (CMK)._ You can find a comparison of the two keys[here](https://docs.aws.amazon.com/whitepapers/latest/kms-best-practices/aws-managed-and-customer-managed-cmks.html), and CMKs provide greater control over your encyption keys.
26
+
-[require_private_vpcs.tf](./modules/comprehend/require_private_vpcs.tf) - Amazon Comprehend supports running the job containers in a customer managed VPC. A VPC can be configured to not be exposed to internet, allows users to monitor networking traffic using flow logs, and can route traffic over private networks with VPC endpoints.
27
+
- When Amazon Comprehend jobs are launched in a VPC, Amazon Comprehend creates Elastic Network Interfaces (ENIs) and attached them to the job containers. The ENIs provide network connectivity within the VPC.
28
+
23
29
###AWS Config
24
30
25
-
-[deny_interruption_actions.tf](./modules/awsconfig/deny_interruption_actions.tf) - Denies the ability to delete AWS Config rules and stop recording.
26
-
- AWS Config is a service to monitor your resources for point-in-time configuration updates and compliance monitoring.
31
+
-[deny_interruption_actions.tf](./modules/awsconfig/deny_interruption_actions.tf) - Denies the ability to delete AWS Config rules and stop recording.
32
+
- AWS Config is a service to monitor your resources for point-in-time configuration updates and compliance monitoring.
27
33
- Malicious actors may try to stop AWS Config recording and perform destructive behavior so it is important to deny AWS Config deletions.
28
34
29
35
###AWS Organizations
@@ -37,15 +43,15 @@ The following SCPs should only be applied after the account has been configured
37
43
38
44
###CloudTrail
39
45
40
-
-[deny_cloudtrail_actions.tf](./modules/cloudtrail/deny_cloudtrail_actions.tf) - Denies the ability to delete or manipulate CloudTrail trails.
41
-
- CloudTrail monitors all API calls against (supported) resources.
46
+
-[deny_cloudtrail_actions.tf](./modules/cloudtrail/deny_cloudtrail_actions.tf) - Denies the ability to delete or manipulate CloudTrail trails.
47
+
- CloudTrail monitors all API calls against (supported) resources.
42
48
- Please note that not all AWS services and resources are supported by CloudTrail.
43
49
- Because CloudTrail is a record of all API calls made, it is commonly targeted to cover malicious actors' tracks.
44
50
45
51
###EC2
46
52
47
53
-[require_mfa_actions.tf](./modules/ec2/require_mfa_actions.tf) - Requires MFA when deleting or stopping EC2 instances.
48
-
- A best practice is to protect your resources from accidental deletions and requiring MFA is one step in that direction.
54
+
- A best practice is to protect your resources from accidental deletions and requiring MFA is one step in that direction.
49
55
-[restrict_ami_owner.tf](./modules/ec2/restrict_ami_owner.tf) - Locks down the AMIs that can be launched to only the AMI creation account.
50
56
- A common practice is to configure an AWS account for centralized AMI creations that you then share to the receiving accounts. Similar to a hub-and-spoke model.
51
57
-[require_ami_tag.tf](./modules/ec2/require_ami_tag.tf) - Requires a resource tag key/value pair to launch EC2s.
@@ -59,14 +65,14 @@ The following SCPs should only be applied after the account has been configured
59
65
60
66
###GuardDuty
61
67
62
-
-[deny_guardduty_disassociate.tf](./modules/guardduty/deny_guardduty_disassociate.tf) - Denies the ability to remove the assigned account from the GuardDuty master.
63
-
- Once GuardDuty is in place for an account, it should not be removed while in use.
68
+
-[deny_guardduty_disassociate.tf](./modules/guardduty/deny_guardduty_disassociate.tf) - Denies the ability to remove the assigned account from the GuardDuty master.
69
+
- Once GuardDuty is in place for an account, it should not be removed while in use.
64
70
65
71
###IAM
66
72
67
-
-[deny_actions_no_mfa.tf](./modules/iam/deny_actions_no_mfa.tf) - Requires MFA to be set before any action can be performed.
73
+
-[deny_actions_no_mfa.tf](./modules/iam/deny_actions_no_mfa.tf) - Requires MFA to be set before any action can be performed.
68
74
- The user will only be able to set a MFA device and then must log out / in to have normal access.
69
-
- This is a blanket guardrail that should be used cautiously. Keep in mind that unless the user authenticated with MFA via the CLI, access keys will not be valid.
75
+
- This is a blanket guardrail that should be used cautiously. Keep in mind that unless the user authenticated with MFA via the CLI, access keys will not be valid.
70
76
71
77
###Lambda
72
78
@@ -101,4 +107,4 @@ The following SCPs should only be applied after the account has been configured
101
107
###VPC
102
108
103
109
-[deny_flow_logs_delete.tf](./modules/vpc/deny_flow_logs_delete.tf) - Denies the ability to delete VPC Flow Logs.
104
-
- VPC Flow Logs are your network monitoring logs and provide visibility into anomalous traffic during a security event.
110
+
- VPC Flow Logs are your network monitoring logs and provide visibility into anomalous traffic during a security event.