Skip to content

Commit 3d54adf

Browse files
authored
Merge pull request #11 from timoguin/feat/terraform-state-modules
feat (partial): Inital spec and Terraform modules
2 parents 9deca72 + 7072a9b commit 3d54adf

35 files changed

+1511
-275
lines changed

README.md

+14
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,20 @@ are owed NOTHING! But we're going to follow semver once things are rolling.
2020
You can view the doc on [GitHub Pages]. The Markdown sources are all in the
2121
[docs] directory.
2222

23+
## Building the Docs
24+
25+
Requirements:
26+
27+
- Poetry: This project uses poetry for managing Python requirements
28+
- make: Used for convenience in building/deploying the docs
29+
30+
A static site is generated from the Markdown sources by using mkdocs. To build,
31+
a simple `make build` should do.
32+
33+
To run a local server that will auto-generate and reload the static site when
34+
the Markdown sources or mkdocs configs are modified. Use `make serve` to run
35+
it, and access it on https://localhost:3000
36+
2337
## Contributing
2438

2539
View the [Contributing Guide] if you're interested in. . . contributing. Check

docs/code/index.md

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
# Infrastructure Code
2+
3+
Document infrastructure code.

docs/index.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -7,5 +7,4 @@ Baseline essentials for an AWS account: documented and codified.
77
<br /><br /><br />
88
Used in a sentence:
99

10-
_I am trying to implement some new AWS accounts using
11-
the aws-baseline spec_.
10+
_I am trying to implement some new AWS accounts using the aws-baseline spec_.

docs/spec/cloudtrail/index.md

+24
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
# CloudTrail
2+
3+
CloudTrail is an AWS service that records API calls and other events that occur within
4+
an account. Accounts should have a mechanism in place to quickly and easy analyze the
5+
large variety of API calls and events that flow through the system.
6+
7+
## Recommended
8+
9+
- Create a single trail for global events (IAM) in us-east-1
10+
- Create a trail in each region for read events
11+
- Create a trail in each region for write events
12+
- Create a trail in each region for S3 Object events
13+
- Create a trail in each region for Lambda events
14+
15+
## Service Events
16+
17+
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-aws-service-specific-topics.html
18+
19+
## AWS Organizations SCPs
20+
21+
If your account is part of an AWS Organization, Service Control Policies can be used to
22+
ensure use of CloudTrail, as well as ensure critical resources cannot be changed.
23+
24+
TODO: Add example SCP for CloudTrail

docs/spec/config/index.md

+35
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
# Config
2+
3+
Config is an AWS service that tracks the configuration of resources. Any modifications
4+
to resources supported by Config will be captured and presented on a timeline, along
5+
with a diff of config changes and details about what principal modified the resource.
6+
7+
Config Rules allow tracking compliance requirements. There is a list of built-in rules
8+
that can be enabled, and custom rules can be created via Lambda functions.
9+
10+
Config delivers logs to S3 and sends a notification to SNS upon delivery. Rules can be
11+
configured to send notifications, perform remediation, or perform other customizable
12+
actions.
13+
14+
## Recommended
15+
16+
-
17+
18+
### Built-in Rules
19+
20+
TODO: Build list of recommended Config Rules
21+
22+
-
23+
24+
### Custom Rules
25+
26+
TODO: Add recommendations for how to use custom rules, including any that should be
27+
enabled by default.
28+
29+
## AWS Organizations SCPs
30+
31+
If your account is part of an AWS Organization, Service Control Policies can be used to
32+
ensure the usage of Config and Config Rules, as well as ensure critical resources
33+
cannot be changed.
34+
35+
TODO: Add example SCP for Config

docs/spec/iam/roles.md

Whitespace-only changes.

docs/spec.md docs/spec/index.md

File renamed without changes.

docs/spec/infrastructure-as-code/terraform-remote-state.md

Whitespace-only changes.

docs/spec/logging.md

+38
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
# Logging
2+
3+
All accounts should have multiple logging pipelines available that can be used with
4+
little thought. Accounts should all have the tooling necessary to retain and analyze
5+
logs for a set retention period. All logging buckets should be replicated to another
6+
account for longer-term retention and analysis.
7+
8+
See the [s3](s3/index.md) spec for details on bucket configurations necessary to
9+
support log collection from various sources.
10+
11+
## AWS Service Logs
12+
13+
- All logs should be delivered to S3
14+
- Use SNS to receive log delivery events
15+
- Send events to SQS queues
16+
- Subscribe Lambdas to the queues (invoked in parallel batches by SQS)
17+
18+
## Processing
19+
20+
Methods of log processing and delivery will vary depending on the volume of data there
21+
is to process. Things like CloudTrail and ELB logs can become quite large with active
22+
accounts and services.
23+
24+
- Lambdas should process the messages, build a list of files to process, route the list
25+
to other destinations (if necessary), and deliver the processed log data to another
26+
S3 bucket
27+
- Use Athena's "Create Table As" query to convert logs to parquet and manage the
28+
associated Glue catalogs.
29+
- Replicate processed logs between regions
30+
- Replicate processed logs to another account
31+
32+
## Controlling Cost
33+
34+
## Monitoring
35+
36+
- Use S3 Inventory reports to periodically compare the processed S3 Events with the
37+
actual objects in the bucket. This ensures that we still process any objects in the
38+
event that S3 fails to properly fire and/or delivery an event.

docs/spec/route53/index.md

+4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
# Route53
2+
3+
- Enable query logging to CloudWatch Logs
4+
- Steam logs to Kinesis Firehose for further processing

docs/spec/s3/index.md

+83
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
# S3
2+
3+
- Buckets for AWS service logs in each region (w/ S3 Object Lock)
4+
- Bucket for AWS S3 access logs in each region (w/ S3 Object Lock)
5+
- Replicate logging buckets to another account for longer retention and auditing
6+
7+
S3 access logs are an outlier in that the object ownership and ACLs are special for the
8+
S3 service. Cross-account access requires role assumption and changes to object
9+
ownership.
10+
11+
## Patterns
12+
13+
### Single Bucket
14+
15+
Bucket name: <account_id>-<environment>-aws-service-logs-<region>
16+
Bucket name example: 123456789012-dev-aws-service-logs-us-east-1
17+
18+
Log types and prefixes:
19+
20+
- CloudTrail: cloudtrail/
21+
- Config: config/
22+
- ALB/ELB/NLB: lb/, alb/, elb/, nlb/ (pull from any and process the same)
23+
24+
### Multiple Per-Service Buckets
25+
26+
- CloudTrail: <account_id>-<environment>-cloudtrail-logs-<region>
27+
- Config: <account_id>-<environment>-config-logs-<region>
28+
- ELB: <account_id>-<environment>-elb-access-logs-<region>
29+
- S3: <account_id>-<environment>-s3-access-logs-<region>
30+
31+
### Delivery Notications
32+
33+
- CloudTrail: send to SNS
34+
- Config: send to SNS
35+
- ELB: S3 events to SNS
36+
- S3: S3 events to SNS
37+
38+
#### Plumbing
39+
40+
- Use S3 Events (optional) -> SNS -> SQS to retain a queue of events to process
41+
- SNS can also fan out to other destinations
42+
- SNS Event Forking to SAM applications (parallel processing and filtering)
43+
- SNS topics and SQS queues send failures to deadletter queues
44+
- Lambda to process the deadletter queues
45+
46+
### Security
47+
48+
- Each bucket only allows access from specific AWS services in the same region
49+
- All buckets encrypted with KMS, forced via the bucket policy
50+
- Public access blocked
51+
- Object Lock enabled (use compliance mode)
52+
- VPC Endpoint for S3
53+
54+
#### Special Notes for S3 Access Logs
55+
56+
Logging buckets for S3 access logs _cannot_ be encrypted. The bucket owner for the
57+
objects is also specific to the logging service. Objects cannot be accessed from
58+
another account without assuming a role into the account with the bucket.
59+
60+
To allow these logs to be processed in the same manner as other service logs, use a
61+
Lambda (or some other form of automation) to copy the logs to another bucket and update
62+
the object ownerships.
63+
64+
NOTE: Research S3 bucket replication in the context of S3 access logs. Could enable
65+
getting around the need for Lambda processing.
66+
67+
#### Bucket Policies
68+
69+
Specific AWS services vary on how to grant permissions to use the buckets:
70+
71+
- CloudTrail uses a service principal (cloudtrail.amazonaws.com) to put logs and check bucket ACLs
72+
- Config uses an IAM role to do the same
73+
- ELB uses AWS account IDs (root) for the ELB service, different ones in each region
74+
75+
### Durability
76+
77+
- Replication (replicate buckets to another region and/or account for longer-term storage and analysis)
78+
- Versioning enabled (required for replication and object lock)
79+
80+
### Cost Controls
81+
82+
- Lifecycle policies to transition objects into cheaper storage (and/or eventually delete)
83+
-

docs/spec/tagging/index.md

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
# Tagging Standards

mkdocs.yml

+7-2
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,13 @@ remote_name: null
2424
nav:
2525
- Overview: overview.md
2626
- Goals: goals.md
27-
- Specification: spec.md
28-
- Code: code.md
27+
- Spec:
28+
- Index: spec/index.md
29+
- CloudTrail: spec/cloudtrail/index.md
30+
- Config: spec/config/index.md
31+
- S3: spec/s3/index.md
32+
- Logging: spec/logging.md
33+
- Code: code/index.md
2934
# - Advanced: advanced.md
3035
# - Costs: costs.md
3136
# - Issue Tracker: https://github.com/timoguin/aws-baseline/issues

terraform/modules/terraform-state/dynamodb-appautoscaling-iam-role.tf

-102
This file was deleted.

terraform/modules/terraform-state/dynamodb-appautoscaling-targets.tf

-35
This file was deleted.

0 commit comments

Comments
 (0)