Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit6c9529b

Browse files
committed
readme updates
1 parent475c5ca commit6c9529b

File tree

1 file changed

+18
-12
lines changed

1 file changed

+18
-12
lines changed

‎security_controls_scp/README.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ The following SCPs should only be applied after the account has been configured
99
###Account
1010

1111
-[deny_region_interaction.tf](./modules/account/deny_region_interaction.tf) - Denies the ability to enable or disable a region.
12-
- By default, when new regions are enabled by AWS, you now have to enable that region before IAM will propagate.
13-
- This policy can be used to lock down the ability to launch resources in unapproved regions or deny a malicious actor from disabling a region in your account.
12+
- By default, when new regions are enabled by AWS, you now have to enable that region before IAM will propagate.
13+
- This policy can be used to lock down the ability to launch resources in unapproved regions or deny a malicious actor from disabling a region in your account.
1414
-*Important*: When a region is disabled, and there are IAM resources in that region, they will be removed. Please view the documentation[here](https://aws.amazon.com/blogs/security/setting-permissions-to-enable-accounts-for-upcoming-aws-regions/) for more information.
1515

1616
###AI Services
@@ -20,10 +20,16 @@ The following SCPs should only be applied after the account has been configured
2020
- Please review the documentation[here](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_ai-opt-out_syntax.html) on how to selectively opt in to data sharing.
2121
- Prior to applying, ensure that the AI services opt-out policy type is enabled for the organization.
2222

23+
###Amazon Comprehend
24+
25+
-[require_kms_cmks.tf](./modules/comprehend/require_kms_cmks.tf) - Requires all applicable Amazon Comprehend calls to pass in a Amazon Key Management Service (KMS) customer managed key (CMK). Per the[documentation](https://docs.aws.amazon.com/comprehend/latest/dg/kms-in-comprehend.html),_Amazon Comprehend can encrypt custom models using either its own KMS Key or a provided customer managed key (CMK)._ You can find a comparison of the two keys[here](https://docs.aws.amazon.com/whitepapers/latest/kms-best-practices/aws-managed-and-customer-managed-cmks.html), and CMKs provide greater control over your encyption keys.
26+
-[require_private_vpcs.tf](./modules/comprehend/require_private_vpcs.tf) - Amazon Comprehend supports running the job containers in a customer managed VPC. A VPC can be configured to not be exposed to internet, allows users to monitor networking traffic using flow logs, and can route traffic over private networks with VPC endpoints.
27+
- When Amazon Comprehend jobs are launched in a VPC, Amazon Comprehend creates Elastic Network Interfaces (ENIs) and attached them to the job containers. The ENIs provide network connectivity within the VPC.
28+
2329
###AWS Config
2430

25-
-[deny_interruption_actions.tf](./modules/awsconfig/deny_interruption_actions.tf) - Denies the ability to delete AWS Config rules and stop recording.
26-
- AWS Config is a service to monitor your resources for point-in-time configuration updates and compliance monitoring.
31+
-[deny_interruption_actions.tf](./modules/awsconfig/deny_interruption_actions.tf) - Denies the ability to delete AWS Config rules and stop recording.
32+
- AWS Config is a service to monitor your resources for point-in-time configuration updates and compliance monitoring.
2733
- Malicious actors may try to stop AWS Config recording and perform destructive behavior so it is important to deny AWS Config deletions.
2834

2935
###AWS Organizations
@@ -37,15 +43,15 @@ The following SCPs should only be applied after the account has been configured
3743

3844
###CloudTrail
3945

40-
-[deny_cloudtrail_actions.tf](./modules/cloudtrail/deny_cloudtrail_actions.tf) - Denies the ability to delete or manipulate CloudTrail trails.
41-
- CloudTrail monitors all API calls against (supported) resources.
46+
-[deny_cloudtrail_actions.tf](./modules/cloudtrail/deny_cloudtrail_actions.tf) - Denies the ability to delete or manipulate CloudTrail trails.
47+
- CloudTrail monitors all API calls against (supported) resources.
4248
- Please note that not all AWS services and resources are supported by CloudTrail.
4349
- Because CloudTrail is a record of all API calls made, it is commonly targeted to cover malicious actors' tracks.
4450

4551
###EC2
4652

4753
-[require_mfa_actions.tf](./modules/ec2/require_mfa_actions.tf) - Requires MFA when deleting or stopping EC2 instances.
48-
- A best practice is to protect your resources from accidental deletions and requiring MFA is one step in that direction.
54+
- A best practice is to protect your resources from accidental deletions and requiring MFA is one step in that direction.
4955
-[restrict_ami_owner.tf](./modules/ec2/restrict_ami_owner.tf) - Locks down the AMIs that can be launched to only the AMI creation account.
5056
- A common practice is to configure an AWS account for centralized AMI creations that you then share to the receiving accounts. Similar to a hub-and-spoke model.
5157
-[require_ami_tag.tf](./modules/ec2/require_ami_tag.tf) - Requires a resource tag key/value pair to launch EC2s.
@@ -59,14 +65,14 @@ The following SCPs should only be applied after the account has been configured
5965

6066
###GuardDuty
6167

62-
-[deny_guardduty_disassociate.tf](./modules/guardduty/deny_guardduty_disassociate.tf) - Denies the ability to remove the assigned account from the GuardDuty master.
63-
- Once GuardDuty is in place for an account, it should not be removed while in use.
68+
-[deny_guardduty_disassociate.tf](./modules/guardduty/deny_guardduty_disassociate.tf) - Denies the ability to remove the assigned account from the GuardDuty master.
69+
- Once GuardDuty is in place for an account, it should not be removed while in use.
6470

6571
###IAM
6672

67-
-[deny_actions_no_mfa.tf](./modules/iam/deny_actions_no_mfa.tf) - Requires MFA to be set before any action can be performed.
73+
-[deny_actions_no_mfa.tf](./modules/iam/deny_actions_no_mfa.tf) - Requires MFA to be set before any action can be performed.
6874
- The user will only be able to set a MFA device and then must log out / in to have normal access.
69-
- This is a blanket guardrail that should be used cautiously. Keep in mind that unless the user authenticated with MFA via the CLI, access keys will not be valid.
75+
- This is a blanket guardrail that should be used cautiously. Keep in mind that unless the user authenticated with MFA via the CLI, access keys will not be valid.
7076

7177
###Lambda
7278

@@ -101,4 +107,4 @@ The following SCPs should only be applied after the account has been configured
101107
###VPC
102108

103109
-[deny_flow_logs_delete.tf](./modules/vpc/deny_flow_logs_delete.tf) - Denies the ability to delete VPC Flow Logs.
104-
- VPC Flow Logs are your network monitoring logs and provide visibility into anomalous traffic during a security event.
110+
- VPC Flow Logs are your network monitoring logs and provide visibility into anomalous traffic during a security event.

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp