runbooks 0.2.5__py3-none-any.whl → 0.6.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- conftest.py +26 -0
- jupyter-agent/.env.template +2 -0
- jupyter-agent/.gitattributes +35 -0
- jupyter-agent/README.md +16 -0
- jupyter-agent/app.py +256 -0
- jupyter-agent/cloudops-agent.png +0 -0
- jupyter-agent/ds-system-prompt.txt +154 -0
- jupyter-agent/jupyter-agent.png +0 -0
- jupyter-agent/llama3_template.jinja +123 -0
- jupyter-agent/requirements.txt +9 -0
- jupyter-agent/utils.py +409 -0
- runbooks/__init__.py +71 -3
- runbooks/__main__.py +13 -0
- runbooks/aws/ec2_describe_instances.py +1 -1
- runbooks/aws/ec2_run_instances.py +8 -2
- runbooks/aws/ec2_start_stop_instances.py +17 -4
- runbooks/aws/ec2_unused_volumes.py +5 -1
- runbooks/aws/s3_create_bucket.py +4 -2
- runbooks/aws/s3_list_objects.py +6 -1
- runbooks/aws/tagging_lambda_handler.py +13 -2
- runbooks/aws/tags.json +12 -0
- runbooks/base.py +353 -0
- runbooks/cfat/README.md +49 -0
- runbooks/cfat/__init__.py +74 -0
- runbooks/cfat/app.ts +644 -0
- runbooks/cfat/assessment/__init__.py +40 -0
- runbooks/cfat/assessment/asana-import.csv +39 -0
- runbooks/cfat/assessment/cfat-checks.csv +31 -0
- runbooks/cfat/assessment/cfat.txt +520 -0
- runbooks/cfat/assessment/collectors.py +200 -0
- runbooks/cfat/assessment/jira-import.csv +39 -0
- runbooks/cfat/assessment/runner.py +387 -0
- runbooks/cfat/assessment/validators.py +290 -0
- runbooks/cfat/cli.py +103 -0
- runbooks/cfat/docs/asana-import.csv +24 -0
- runbooks/cfat/docs/cfat-checks.csv +31 -0
- runbooks/cfat/docs/cfat.txt +335 -0
- runbooks/cfat/docs/checks-output.png +0 -0
- runbooks/cfat/docs/cloudshell-console-run.png +0 -0
- runbooks/cfat/docs/cloudshell-download.png +0 -0
- runbooks/cfat/docs/cloudshell-output.png +0 -0
- runbooks/cfat/docs/downloadfile.png +0 -0
- runbooks/cfat/docs/jira-import.csv +24 -0
- runbooks/cfat/docs/open-cloudshell.png +0 -0
- runbooks/cfat/docs/report-header.png +0 -0
- runbooks/cfat/models.py +1026 -0
- runbooks/cfat/package-lock.json +5116 -0
- runbooks/cfat/package.json +38 -0
- runbooks/cfat/report.py +496 -0
- runbooks/cfat/reporting/__init__.py +46 -0
- runbooks/cfat/reporting/exporters.py +337 -0
- runbooks/cfat/reporting/formatters.py +496 -0
- runbooks/cfat/reporting/templates.py +135 -0
- runbooks/cfat/run-assessment.sh +23 -0
- runbooks/cfat/runner.py +69 -0
- runbooks/cfat/src/actions/check-cloudtrail-existence.ts +43 -0
- runbooks/cfat/src/actions/check-config-existence.ts +37 -0
- runbooks/cfat/src/actions/check-control-tower.ts +37 -0
- runbooks/cfat/src/actions/check-ec2-existence.ts +46 -0
- runbooks/cfat/src/actions/check-iam-users.ts +50 -0
- runbooks/cfat/src/actions/check-legacy-cur.ts +30 -0
- runbooks/cfat/src/actions/check-org-cloudformation.ts +30 -0
- runbooks/cfat/src/actions/check-vpc-existence.ts +43 -0
- runbooks/cfat/src/actions/create-asanaimport.ts +14 -0
- runbooks/cfat/src/actions/create-backlog.ts +372 -0
- runbooks/cfat/src/actions/create-jiraimport.ts +15 -0
- runbooks/cfat/src/actions/create-report.ts +616 -0
- runbooks/cfat/src/actions/define-account-type.ts +51 -0
- runbooks/cfat/src/actions/get-enabled-org-policy-types.ts +40 -0
- runbooks/cfat/src/actions/get-enabled-org-services.ts +26 -0
- runbooks/cfat/src/actions/get-idc-info.ts +34 -0
- runbooks/cfat/src/actions/get-org-da-accounts.ts +34 -0
- runbooks/cfat/src/actions/get-org-details.ts +35 -0
- runbooks/cfat/src/actions/get-org-member-accounts.ts +44 -0
- runbooks/cfat/src/actions/get-org-ous.ts +35 -0
- runbooks/cfat/src/actions/get-regions.ts +22 -0
- runbooks/cfat/src/actions/zip-assessment.ts +27 -0
- runbooks/cfat/src/types/index.d.ts +147 -0
- runbooks/cfat/tests/__init__.py +141 -0
- runbooks/cfat/tests/test_cli.py +340 -0
- runbooks/cfat/tests/test_integration.py +290 -0
- runbooks/cfat/tests/test_models.py +505 -0
- runbooks/cfat/tests/test_reporting.py +354 -0
- runbooks/cfat/tsconfig.json +16 -0
- runbooks/cfat/webpack.config.cjs +27 -0
- runbooks/config.py +260 -0
- runbooks/finops/__init__.py +88 -0
- runbooks/finops/aws_client.py +245 -0
- runbooks/finops/cli.py +151 -0
- runbooks/finops/cost_processor.py +410 -0
- runbooks/finops/dashboard_runner.py +448 -0
- runbooks/finops/helpers.py +355 -0
- runbooks/finops/main.py +14 -0
- runbooks/finops/profile_processor.py +174 -0
- runbooks/finops/types.py +66 -0
- runbooks/finops/visualisations.py +80 -0
- runbooks/inventory/.gitignore +354 -0
- runbooks/inventory/ArgumentsClass.py +261 -0
- runbooks/inventory/Inventory_Modules.py +6130 -0
- runbooks/inventory/LandingZone/delete_lz.py +1075 -0
- runbooks/inventory/README.md +1320 -0
- runbooks/inventory/__init__.py +62 -0
- runbooks/inventory/account_class.py +532 -0
- runbooks/inventory/all_my_instances_wrapper.py +123 -0
- runbooks/inventory/aws_decorators.py +201 -0
- runbooks/inventory/cfn_move_stack_instances.py +1526 -0
- runbooks/inventory/check_cloudtrail_compliance.py +614 -0
- runbooks/inventory/check_controltower_readiness.py +1107 -0
- runbooks/inventory/check_landingzone_readiness.py +711 -0
- runbooks/inventory/cloudtrail.md +727 -0
- runbooks/inventory/collectors/__init__.py +20 -0
- runbooks/inventory/collectors/aws_compute.py +518 -0
- runbooks/inventory/collectors/aws_networking.py +275 -0
- runbooks/inventory/collectors/base.py +222 -0
- runbooks/inventory/core/__init__.py +19 -0
- runbooks/inventory/core/collector.py +303 -0
- runbooks/inventory/core/formatter.py +296 -0
- runbooks/inventory/delete_s3_buckets_objects.py +169 -0
- runbooks/inventory/discovery.md +81 -0
- runbooks/inventory/draw_org_structure.py +748 -0
- runbooks/inventory/ec2_vpc_utils.py +341 -0
- runbooks/inventory/find_cfn_drift_detection.py +272 -0
- runbooks/inventory/find_cfn_orphaned_stacks.py +719 -0
- runbooks/inventory/find_cfn_stackset_drift.py +733 -0
- runbooks/inventory/find_ec2_security_groups.py +669 -0
- runbooks/inventory/find_landingzone_versions.py +201 -0
- runbooks/inventory/find_vpc_flow_logs.py +1221 -0
- runbooks/inventory/inventory.sh +659 -0
- runbooks/inventory/list_cfn_stacks.py +558 -0
- runbooks/inventory/list_cfn_stackset_operation_results.py +252 -0
- runbooks/inventory/list_cfn_stackset_operations.py +734 -0
- runbooks/inventory/list_cfn_stacksets.py +453 -0
- runbooks/inventory/list_config_recorders_delivery_channels.py +681 -0
- runbooks/inventory/list_ds_directories.py +354 -0
- runbooks/inventory/list_ec2_availability_zones.py +286 -0
- runbooks/inventory/list_ec2_ebs_volumes.py +244 -0
- runbooks/inventory/list_ec2_instances.py +425 -0
- runbooks/inventory/list_ecs_clusters_and_tasks.py +562 -0
- runbooks/inventory/list_elbs_load_balancers.py +411 -0
- runbooks/inventory/list_enis_network_interfaces.py +526 -0
- runbooks/inventory/list_guardduty_detectors.py +568 -0
- runbooks/inventory/list_iam_policies.py +404 -0
- runbooks/inventory/list_iam_roles.py +518 -0
- runbooks/inventory/list_iam_saml_providers.py +359 -0
- runbooks/inventory/list_lambda_functions.py +882 -0
- runbooks/inventory/list_org_accounts.py +446 -0
- runbooks/inventory/list_org_accounts_users.py +354 -0
- runbooks/inventory/list_rds_db_instances.py +406 -0
- runbooks/inventory/list_route53_hosted_zones.py +318 -0
- runbooks/inventory/list_servicecatalog_provisioned_products.py +575 -0
- runbooks/inventory/list_sns_topics.py +360 -0
- runbooks/inventory/list_ssm_parameters.py +402 -0
- runbooks/inventory/list_vpc_subnets.py +433 -0
- runbooks/inventory/list_vpcs.py +422 -0
- runbooks/inventory/lockdown_cfn_stackset_role.py +224 -0
- runbooks/inventory/models/__init__.py +24 -0
- runbooks/inventory/models/account.py +192 -0
- runbooks/inventory/models/inventory.py +309 -0
- runbooks/inventory/models/resource.py +247 -0
- runbooks/inventory/recover_cfn_stack_ids.py +205 -0
- runbooks/inventory/requirements.txt +12 -0
- runbooks/inventory/run_on_multi_accounts.py +211 -0
- runbooks/inventory/tests/common_test_data.py +3661 -0
- runbooks/inventory/tests/common_test_functions.py +204 -0
- runbooks/inventory/tests/script_test_data.py +0 -0
- runbooks/inventory/tests/setup.py +24 -0
- runbooks/inventory/tests/src.py +18 -0
- runbooks/inventory/tests/test_cfn_describe_stacks.py +208 -0
- runbooks/inventory/tests/test_ec2_describe_instances.py +162 -0
- runbooks/inventory/tests/test_inventory_modules.py +55 -0
- runbooks/inventory/tests/test_lambda_list_functions.py +86 -0
- runbooks/inventory/tests/test_moto_integration_example.py +273 -0
- runbooks/inventory/tests/test_org_list_accounts.py +49 -0
- runbooks/inventory/update_aws_actions.py +173 -0
- runbooks/inventory/update_cfn_stacksets.py +1215 -0
- runbooks/inventory/update_cloudwatch_logs_retention_policy.py +294 -0
- runbooks/inventory/update_iam_roles_cross_accounts.py +478 -0
- runbooks/inventory/update_s3_public_access_block.py +539 -0
- runbooks/inventory/utils/__init__.py +23 -0
- runbooks/inventory/utils/aws_helpers.py +510 -0
- runbooks/inventory/utils/threading_utils.py +493 -0
- runbooks/inventory/utils/validation.py +682 -0
- runbooks/inventory/verify_ec2_security_groups.py +1430 -0
- runbooks/main.py +785 -0
- runbooks/organizations/__init__.py +12 -0
- runbooks/organizations/manager.py +374 -0
- runbooks/security_baseline/README.md +324 -0
- runbooks/security_baseline/checklist/alternate_contacts.py +8 -1
- runbooks/security_baseline/checklist/bucket_public_access.py +4 -1
- runbooks/security_baseline/checklist/cloudwatch_alarm_configuration.py +9 -2
- runbooks/security_baseline/checklist/guardduty_enabled.py +9 -2
- runbooks/security_baseline/checklist/multi_region_instance_usage.py +5 -1
- runbooks/security_baseline/checklist/root_access_key.py +6 -1
- runbooks/security_baseline/config-origin.json +1 -1
- runbooks/security_baseline/config.json +1 -1
- runbooks/security_baseline/permission.json +1 -1
- runbooks/security_baseline/report_generator.py +10 -2
- runbooks/security_baseline/report_template_en.html +7 -7
- runbooks/security_baseline/report_template_jp.html +7 -7
- runbooks/security_baseline/report_template_kr.html +12 -12
- runbooks/security_baseline/report_template_vn.html +7 -7
- runbooks/security_baseline/requirements.txt +7 -0
- runbooks/security_baseline/run_script.py +8 -2
- runbooks/security_baseline/security_baseline_tester.py +10 -2
- runbooks/security_baseline/utils/common.py +5 -1
- runbooks/utils/__init__.py +204 -0
- runbooks-0.6.1.dist-info/METADATA +373 -0
- runbooks-0.6.1.dist-info/RECORD +237 -0
- {runbooks-0.2.5.dist-info → runbooks-0.6.1.dist-info}/WHEEL +1 -1
- runbooks-0.6.1.dist-info/entry_points.txt +7 -0
- runbooks-0.6.1.dist-info/licenses/LICENSE +201 -0
- runbooks-0.6.1.dist-info/top_level.txt +3 -0
- runbooks/python101/calculator.py +0 -34
- runbooks/python101/config.py +0 -1
- runbooks/python101/exceptions.py +0 -16
- runbooks/python101/file_manager.py +0 -218
- runbooks/python101/toolkit.py +0 -153
- runbooks-0.2.5.dist-info/METADATA +0 -439
- runbooks-0.2.5.dist-info/RECORD +0 -61
- runbooks-0.2.5.dist-info/entry_points.txt +0 -3
- runbooks-0.2.5.dist-info/top_level.txt +0 -1
@@ -0,0 +1,39 @@
|
|
1
|
+
"Task", "Description", "Status"
|
2
|
+
"cfat - Remove IAM user firdosh.homavazir@vectormetering.com", "Review and determine if IAM user firdosh.homavazir@vectormetering.com can be deleted. - Remediation Link: ", "Not Started"
|
3
|
+
"cfat - Remove IAM user firdosh.homavazir@vectormetering.com API key AKIA5HLFQ5445SLUCJ4H ", "Review and determine if IAM user API key AKIA5HLFQ5445SLUCJ4H for firdosh.homavazir@vectormetering.com can be removed. - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting", "Not Started"
|
4
|
+
"cfat - Remove IAM user firdosh.homavazir@vectormetering.com", "Review and determine if IAM user firdosh.homavazir@vectormetering.com can be deleted. - Remediation Link: ", "Not Started"
|
5
|
+
"cfat - Remove IAM user firdosh.homavazir@vectormetering.com API key AKIA5HLFQ544W5ZJXRUA ", "Review and determine if IAM user API key AKIA5HLFQ544W5ZJXRUA for firdosh.homavazir@vectormetering.com can be removed. - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting", "Not Started"
|
6
|
+
"cfat - Delete VPC in ap-south-1", "Delete any unnecessary VPC in ap-south-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
7
|
+
"cfat - Delete VPC in eu-north-1", "Delete any unnecessary VPC in eu-north-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
8
|
+
"cfat - Delete VPC in eu-west-3", "Delete any unnecessary VPC in eu-west-3 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
9
|
+
"cfat - Delete VPC in eu-west-2", "Delete any unnecessary VPC in eu-west-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
10
|
+
"cfat - Delete VPC in eu-west-1", "Delete any unnecessary VPC in eu-west-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
11
|
+
"cfat - Delete VPC in ap-northeast-3", "Delete any unnecessary VPC in ap-northeast-3 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
12
|
+
"cfat - Delete VPC in ap-northeast-2", "Delete any unnecessary VPC in ap-northeast-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
13
|
+
"cfat - Delete VPC in ap-northeast-1", "Delete any unnecessary VPC in ap-northeast-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
14
|
+
"cfat - Delete VPC in ca-central-1", "Delete any unnecessary VPC in ca-central-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
15
|
+
"cfat - Delete VPC in sa-east-1", "Delete any unnecessary VPC in sa-east-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
16
|
+
"cfat - Delete VPC in ap-southeast-1", "Delete any unnecessary VPC in ap-southeast-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
17
|
+
"cfat - Delete VPC in ap-southeast-2", "Delete any unnecessary VPC in ap-southeast-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
18
|
+
"cfat - Delete VPC in eu-central-1", "Delete any unnecessary VPC in eu-central-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
19
|
+
"cfat - Delete VPC in us-east-1", "Delete any unnecessary VPC in us-east-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
20
|
+
"cfat - Delete VPC in us-east-2", "Delete any unnecessary VPC in us-east-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
21
|
+
"cfat - Delete VPC in us-west-1", "Delete any unnecessary VPC in us-west-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
22
|
+
"cfat - Delete VPC in us-west-2", "Delete any unnecessary VPC in us-west-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
|
23
|
+
"cfat - Review account email addresses", "Review Account Email Addresses in AWS Organization - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/root-user-best-practices.html#ru-bp-group", "Not Started"
|
24
|
+
"cfat - Deploy Transitional OU", "Deploy Transitional OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/transitional-ou.html", "Not Started"
|
25
|
+
"cfat - Deploy Suspended OU", "Deploy Suspended OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/suspended-ou.html", "Not Started"
|
26
|
+
"cfat - Deploy Workloads OU", "Deploy Workloads OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/workloads-ou.html", "Not Started"
|
27
|
+
"cfat - Deploy Security OU", "Deploy Security OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/security-ou-and-accounts.html", "Not Started"
|
28
|
+
"cfat - Deploy Infrastructure OU", "Deploy Infrastructure OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/infrastructure-ou-and-accounts.html", "Not Started"
|
29
|
+
"cfat - Deploy AWS Control Tower", "Deploy AWS Control Tower in AWS Organization - Remediation Link: https://catalog.workshops.aws/control-tower/en-US/prerequisites/deploying", "Not Started"
|
30
|
+
"cfat - Delegate administration of Amazon S3 Storage Lens", "Delegate administration to Amazon S3 Storage Lens - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-s3lens.html#integrate-enable-da-s3lens", "Not Started"
|
31
|
+
"cfat - Delegate administration to AWS IAM Identity Center", "Delegate administration to AWS IAM Identity Center - Remediation Link: https://docs.aws.amazon.com/singlesignon/latest/userguide/delegated-admin.html", "Not Started"
|
32
|
+
"cfat - Delegate administration to AWS IAM Access Analyzer", "Delegate administration to AWS IAM Access Analyzer - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#access-analyzer-enabling", "Not Started"
|
33
|
+
"cfat - Delegate administration of AWS IAM Access Analyzer", "Delegate administration to AWS IAM Access Analyzer - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-settings.html", "Not Started"
|
34
|
+
"cfat - Enable AWS GuardDuty", "Enable AWS GuardDuty in AWS Organization - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-guardduty.html#integrate-enable-ta-guardduty", "Not Started"
|
35
|
+
"cfat - Delegate administration of AWS GuardDuty", "Delegate administration to AWS GuardDuty - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-guardduty.html", "Not Started"
|
36
|
+
"cfat - Enable AWS IPAM", "Enable AWS IPAM in AWS Organization - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ipam.html", "Not Started"
|
37
|
+
"cfat - Delegate administration of AWS IPAM", "Delegate administration to AWS IPAM - Remediation Link: https://docs.aws.amazon.com/vpc/latest/ipam/enable-integ-ipam.html", "Not Started"
|
38
|
+
"cfat - Delegate administration of AWS Account management", "Delegate administration to AWS Account contact management - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-account.html#integrate-enable-da-account", "Not Started"
|
39
|
+
"cfat - Delegate administration of AWS Backup", "Delegate administration to AWS Backup - Remediation Link: https://docs.aws.amazon.com/aws-backup/latest/devguide/manage-cross-account.html#backup-delegatedadmin", "Not Started"
|
@@ -0,0 +1,31 @@
|
|
1
|
+
check,description,status,required,weight,loe,remediationLink
|
2
|
+
"AWS Organization created","AWS Organization is enabled.","complete",true,6,1,"https://aws.amazon.com/organizations/getting-started/"
|
3
|
+
"Management Account created","AWS Management account exists.","complete",true,6,1,"https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-creating.html"
|
4
|
+
"Management Account IAM users removed","IAM Users should not exist in Management Account.","incomplete",false,4,1,"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting"
|
5
|
+
"Management Account EC2 instances removed","EC2 Instances should not exist in Management Account.","incomplete",false,4,1,"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html"
|
6
|
+
"Management Account VPCs removed","Management Account should not have any VPCs.","incomplete",false,4,1,"https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md"
|
7
|
+
"CloudTrail Trail created","CloudTrail should be enabled within the account.","complete",true,6,3,"https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html"
|
8
|
+
"CloudTrail Organization Service enabled","CloudTrail should be enabled on the Organization.","complete",true,6,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudtrail.html"
|
9
|
+
"CloudTrail Org Trail deployed","At least one CloudTrail Organization Trail should be enabled.","complete",true,6,1,"https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html"
|
10
|
+
"Config Recorder in Management Account configured","Config Recorder in the Management Account should be enabled.","complete",true,6,2,"https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/"
|
11
|
+
"Config Delivery Channel in Management Account configured","Config Delivery Channel in Management Account should be enabled.","complete",true,6,2,"https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/"
|
12
|
+
"CloudFormation StackSets activated","CloudFormation StackSets should be activated in the CloudFormation console.","incomplete",false,5,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudformation.html#integrate-enable-ta-cloudformation"
|
13
|
+
"GuardDuty Organization service enabled","GuardDuty Organization services should be enabled.","incomplete",false,4,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-guardduty.html#integrate-enable-ta-guardduty"
|
14
|
+
"RAM Organization service enabled","Resource Access Manager (RAM) trusted access should be enabled in the AWS Organization.","complete",false,4,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ram.html#integrate-enable-ta-ram"
|
15
|
+
"Security Hub Organization service enabled","Security Hub trusted access should be enabled in the AWS Organization.","complete",false,4,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-securityhub.html#integrate-enable-ta-securityhub"
|
16
|
+
"IAM Access Analyzer Organization service enabled","IAM Access Analyzer trusted access should be enabled in the AWS Organization.","incomplete",false,4,1,"https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#access-analyzer-enabling"
|
17
|
+
"Config Organization service enabled","AWS Config trusted access should be enabled in the AWS Organization.","complete",false,4,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-config.html#integrate-enable-ta-config"
|
18
|
+
"CloudFormation Organization service enabled","CloudFormation trusted access should be enabled in the AWS Organization.","complete",false,5,1,"https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html"
|
19
|
+
"Top-level Infrastructure OU deployed","Top-level Infrastructure OU should exist.","incomplete",false,5,2,"https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou"
|
20
|
+
"Top-level Security OU deployed","Top-level Security OU should exist.","incomplete",true,6,2,"https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou"
|
21
|
+
"Top-level Workloads OU deployed","Top-level Workloads OU should exist.","incomplete",false,5,2,"https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou"
|
22
|
+
"IAM IdC Organization service enabled","IAM Identity Center trusted access should be enabled in the AWS Organization","complete",true,6,1,"https://docs.aws.amazon.com/singlesignon/latest/userguide/get-set-up-for-idc.html"
|
23
|
+
"IAM IdC configured","IAM Identity Center should be configured.","complete",true,6,3,"https://docs.aws.amazon.com/singlesignon/latest/userguide/tutorials.html"
|
24
|
+
"Service Control Policies enabled","Service Control Policy should be enabled within the AWS Organization.","complete",true,6,1,"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html"
|
25
|
+
"Organization Tag Policy enabled","Tag Policy should be enabled within the AWS Organization.","complete",true,6,1,"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html"
|
26
|
+
"Organization Backup Policy enabled","Backup Policy should be enabled within the AWS Organization.","complete",false,5,1,"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html"
|
27
|
+
"Control Tower deployed","Control Tower should be deployed.","incomplete",true,6,6,"https://catalog.workshops.aws/control-tower/en-US/prerequisites/deploying"
|
28
|
+
"Control Tower latest version","Control Tower should be the latest version.","complete",false,5,2,"https://docs.aws.amazon.com/controltower/latest/userguide/update-controltower.html"
|
29
|
+
"Control Tower not drifted","Control Tower should not be drifted.","complete",true,6,2,"https://docs.aws.amazon.com/controltower/latest/userguide/resolve-drift.html"
|
30
|
+
"Log Archive account deployed","Log Archive account should exist.","incomplete",true,6,2,"https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html"
|
31
|
+
"Audit account deployed","Audit/Security Tooling account should exist.","incomplete",true,6,2,"https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html"
|
@@ -0,0 +1,520 @@
|
|
1
|
+
Cloud Foundation Assessment Tool
|
2
|
+
Generated on: Tue, 22 Apr 2025 04:41:25 GMT
|
3
|
+
|
4
|
+
|
5
|
+
Incomplete Requirements:
|
6
|
+
INCOMPLETE: Top-level Security OU deployed
|
7
|
+
INCOMPLETE: Control Tower deployed
|
8
|
+
INCOMPLETE: Log Archive account deployed
|
9
|
+
INCOMPLETE: Audit account deployed
|
10
|
+
|
11
|
+
====================================
|
12
|
+
|
13
|
+
Foundation Status: INCOMPLETE
|
14
|
+
Estimate of Required Level of Effort (LOE): 12 hours
|
15
|
+
CFAT Score: 99 out of 158
|
16
|
+
|
17
|
+
====================================
|
18
|
+
|
19
|
+
Foundation Checks:
|
20
|
+
┌─────────┬────────────────────────────────────────────────────────────┬───────────────────────────────────────────────────────────────────────────────────────────┬──────────────┬──────────┬────────┬─────┬─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┐
|
21
|
+
│ (index) │ check │ description │ status │ required │ weight │ loe │ remediationLink │
|
22
|
+
├─────────┼────────────────────────────────────────────────────────────┼───────────────────────────────────────────────────────────────────────────────────────────┼──────────────┼──────────┼────────┼─────┼─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤
|
23
|
+
│ 0 │ 'AWS Organization created' │ 'AWS Organization is enabled.' │ 'complete' │ true │ 6 │ 1 │ 'https://aws.amazon.com/organizations/getting-started/' │
|
24
|
+
│ 1 │ 'Management Account created' │ 'AWS Management account exists.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-creating.html' │
|
25
|
+
│ 2 │ 'Management Account IAM users removed' │ 'IAM Users should not exist in Management Account.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting' │
|
26
|
+
│ 3 │ 'Management Account EC2 instances removed' │ 'EC2 Instances should not exist in Management Account.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html' │
|
27
|
+
│ 4 │ 'Management Account VPCs removed' │ 'Management Account should not have any VPCs.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md' │
|
28
|
+
│ 5 │ 'CloudTrail Trail created' │ 'CloudTrail should be enabled within the account.' │ 'complete' │ true │ 6 │ 3 │ 'https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html' │
|
29
|
+
│ 6 │ 'CloudTrail Organization Service enabled' │ 'CloudTrail should be enabled on the Organization.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudtrail.html' │
|
30
|
+
│ 7 │ 'CloudTrail Org Trail deployed' │ 'At least one CloudTrail Organization Trail should be enabled.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html' │
|
31
|
+
│ 8 │ 'Config Recorder in Management Account configured' │ 'Config Recorder in the Management Account should be enabled.' │ 'complete' │ true │ 6 │ 2 │ 'https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/' │
|
32
|
+
│ 9 │ 'Config Delivery Channel in Management Account configured' │ 'Config Delivery Channel in Management Account should be enabled.' │ 'complete' │ true │ 6 │ 2 │ 'https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/' │
|
33
|
+
│ 10 │ 'CloudFormation StackSets activated' │ 'CloudFormation StackSets should be activated in the CloudFormation console.' │ 'incomplete' │ false │ 5 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudformation.html#integrate-enable-ta-cloudformation' │
|
34
|
+
│ 11 │ 'GuardDuty Organization service enabled' │ 'GuardDuty Organization services should be enabled.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-guardduty.html#integrate-enable-ta-guardduty' │
|
35
|
+
│ 12 │ 'RAM Organization service enabled' │ 'Resource Access Manager (RAM) trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ram.html#integrate-enable-ta-ram' │
|
36
|
+
│ 13 │ 'Security Hub Organization service enabled' │ 'Security Hub trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-securityhub.html#integrate-enable-ta-securityhub' │
|
37
|
+
│ 14 │ 'IAM Access Analyzer Organization service enabled' │ 'IAM Access Analyzer trusted access should be enabled in the AWS Organization.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#access-analyzer-enabling' │
|
38
|
+
│ 15 │ 'Config Organization service enabled' │ 'AWS Config trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-config.html#integrate-enable-ta-config' │
|
39
|
+
│ 16 │ 'CloudFormation Organization service enabled' │ 'CloudFormation trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 5 │ 1 │ 'https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html' │
|
40
|
+
│ 17 │ 'Top-level Infrastructure OU deployed' │ 'Top-level Infrastructure OU should exist.' │ 'incomplete' │ false │ 5 │ 2 │ 'https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou' │
|
41
|
+
│ 18 │ 'Top-level Security OU deployed' │ 'Top-level Security OU should exist.' │ 'incomplete' │ true │ 6 │ 2 │ 'https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou' │
|
42
|
+
│ 19 │ 'Top-level Workloads OU deployed' │ 'Top-level Workloads OU should exist.' │ 'incomplete' │ false │ 5 │ 2 │ 'https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou' │
|
43
|
+
│ 20 │ 'IAM IdC Organization service enabled' │ 'IAM Identity Center trusted access should be enabled in the AWS Organization' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/singlesignon/latest/userguide/get-set-up-for-idc.html' │
|
44
|
+
│ 21 │ 'IAM IdC configured' │ 'IAM Identity Center should be configured.' │ 'complete' │ true │ 6 │ 3 │ 'https://docs.aws.amazon.com/singlesignon/latest/userguide/tutorials.html' │
|
45
|
+
│ 22 │ 'Service Control Policies enabled' │ 'Service Control Policy should be enabled within the AWS Organization.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html' │
|
46
|
+
│ 23 │ 'Organization Tag Policy enabled' │ 'Tag Policy should be enabled within the AWS Organization.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html' │
|
47
|
+
│ 24 │ 'Organization Backup Policy enabled' │ 'Backup Policy should be enabled within the AWS Organization.' │ 'complete' │ false │ 5 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html' │
|
48
|
+
│ 25 │ 'Control Tower deployed' │ 'Control Tower should be deployed.' │ 'incomplete' │ true │ 6 │ 6 │ 'https://catalog.workshops.aws/control-tower/en-US/prerequisites/deploying' │
|
49
|
+
│ 26 │ 'Control Tower latest version' │ 'Control Tower should be the latest version.' │ 'complete' │ false │ 5 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/update-controltower.html' │
|
50
|
+
│ 27 │ 'Control Tower not drifted' │ 'Control Tower should not be drifted.' │ 'complete' │ true │ 6 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/resolve-drift.html' │
|
51
|
+
│ 28 │ 'Log Archive account deployed' │ 'Log Archive account should exist.' │ 'incomplete' │ true │ 6 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html' │
|
52
|
+
│ 29 │ 'Audit account deployed' │ 'Audit/Security Tooling account should exist.' │ 'incomplete' │ true │ 6 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html' │
|
53
|
+
└─────────┴────────────────────────────────────────────────────────────┴───────────────────────────────────────────────────────────────────────────────────────────┴──────────────┴──────────┴────────┴─────┴─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┘
|
54
|
+
|
55
|
+
|
56
|
+
Start Detailed Report:
|
57
|
+
|
58
|
+
|
59
|
+
*********************************************************
|
60
|
+
MANAGEMENT ACCOUNT
|
61
|
+
*********************************************************
|
62
|
+
|
63
|
+
AWS ACCOUNT TYPE
|
64
|
+
|
65
|
+
Is in AWS Organization: true
|
66
|
+
Assessing AWS Management Account: true
|
67
|
+
|
68
|
+
IAM USERS CHECK
|
69
|
+
|
70
|
+
IAM User: firdosh.homavazir@vectormetering.com
|
71
|
+
User API Key ID: AKIA5HLFQ5445SLUCJ4H
|
72
|
+
|
73
|
+
IAM User: firdosh.homavazir@vectormetering.com
|
74
|
+
User API Key ID: AKIA5HLFQ544W5ZJXRUA
|
75
|
+
|
76
|
+
|
77
|
+
EC2 INSTANCE CHECK
|
78
|
+
|
79
|
+
No EC2 instances found.
|
80
|
+
|
81
|
+
VPC CHECK
|
82
|
+
|
83
|
+
ap-south-1 - found VPC(s).
|
84
|
+
eu-north-1 - found VPC(s).
|
85
|
+
eu-west-3 - found VPC(s).
|
86
|
+
eu-west-2 - found VPC(s).
|
87
|
+
eu-west-1 - found VPC(s).
|
88
|
+
ap-northeast-3 - found VPC(s).
|
89
|
+
ap-northeast-2 - found VPC(s).
|
90
|
+
ap-northeast-1 - found VPC(s).
|
91
|
+
ca-central-1 - found VPC(s).
|
92
|
+
sa-east-1 - found VPC(s).
|
93
|
+
ap-southeast-1 - found VPC(s).
|
94
|
+
ap-southeast-2 - found VPC(s).
|
95
|
+
eu-central-1 - found VPC(s).
|
96
|
+
us-east-1 - found VPC(s).
|
97
|
+
us-east-2 - found VPC(s).
|
98
|
+
us-west-1 - found VPC(s).
|
99
|
+
us-west-2 - found VPC(s).
|
100
|
+
|
101
|
+
AWS CONFIG CHECK
|
102
|
+
|
103
|
+
ap-south-1 - Config Recorder found
|
104
|
+
ap-south-1 - Config Delivery Channel found
|
105
|
+
eu-north-1 - Config Recorder found
|
106
|
+
eu-north-1 - Config Delivery Channel found
|
107
|
+
eu-west-3 - Config Recorder found
|
108
|
+
eu-west-3 - Config Delivery Channel found
|
109
|
+
eu-west-2 - Config Recorder found
|
110
|
+
eu-west-2 - Config Delivery Channel found
|
111
|
+
eu-west-1 - Config Recorder found
|
112
|
+
eu-west-1 - Config Delivery Channel found
|
113
|
+
ap-northeast-3 - Config Recorder found
|
114
|
+
ap-northeast-3 - Config Delivery Channel found
|
115
|
+
ap-northeast-2 - Config Recorder found
|
116
|
+
ap-northeast-2 - Config Delivery Channel found
|
117
|
+
ap-northeast-1 - Config Recorder found
|
118
|
+
ap-northeast-1 - Config Delivery Channel found
|
119
|
+
ca-central-1 - Config Recorder found
|
120
|
+
ca-central-1 - Config Delivery Channel found
|
121
|
+
sa-east-1 - Config Recorder found
|
122
|
+
sa-east-1 - Config Delivery Channel found
|
123
|
+
ap-southeast-1 - Config Recorder found
|
124
|
+
ap-southeast-1 - Config Delivery Channel found
|
125
|
+
ap-southeast-2 - Config Recorder found
|
126
|
+
ap-southeast-2 - Config Delivery Channel found
|
127
|
+
eu-central-1 - Config Recorder found
|
128
|
+
eu-central-1 - Config Delivery Channel found
|
129
|
+
us-east-1 - Config Recorder found
|
130
|
+
us-east-1 - Config Delivery Channel found
|
131
|
+
us-east-2 - Config Recorder found
|
132
|
+
us-east-2 - Config Delivery Channel found
|
133
|
+
us-west-1 - Config Recorder found
|
134
|
+
us-west-1 - Config Delivery Channel found
|
135
|
+
us-west-2 - Config Recorder found
|
136
|
+
us-west-2 - Config Delivery Channel found
|
137
|
+
|
138
|
+
MANAGEMENT ACCOUNT TASKS:
|
139
|
+
Remove IAM user firdosh.homavazir@vectormetering.com - Management Account - Review and determine if IAM user firdosh.homavazir@vectormetering.com can be deleted.
|
140
|
+
Remove IAM user firdosh.homavazir@vectormetering.com API key AKIA5HLFQ5445SLUCJ4H - Management Account - Review and determine if IAM user API key AKIA5HLFQ5445SLUCJ4H for firdosh.homavazir@vectormetering.com can be removed.
|
141
|
+
Remove IAM user firdosh.homavazir@vectormetering.com - Management Account - Review and determine if IAM user firdosh.homavazir@vectormetering.com can be deleted.
|
142
|
+
Remove IAM user firdosh.homavazir@vectormetering.com API key AKIA5HLFQ544W5ZJXRUA - Management Account - Review and determine if IAM user API key AKIA5HLFQ544W5ZJXRUA for firdosh.homavazir@vectormetering.com can be removed.
|
143
|
+
Delete VPC in ap-south-1 - Management Account - Delete any unnecessary VPC in ap-south-1 to include the default VPC.
|
144
|
+
Delete VPC in eu-north-1 - Management Account - Delete any unnecessary VPC in eu-north-1 to include the default VPC.
|
145
|
+
Delete VPC in eu-west-3 - Management Account - Delete any unnecessary VPC in eu-west-3 to include the default VPC.
|
146
|
+
Delete VPC in eu-west-2 - Management Account - Delete any unnecessary VPC in eu-west-2 to include the default VPC.
|
147
|
+
Delete VPC in eu-west-1 - Management Account - Delete any unnecessary VPC in eu-west-1 to include the default VPC.
|
148
|
+
Delete VPC in ap-northeast-3 - Management Account - Delete any unnecessary VPC in ap-northeast-3 to include the default VPC.
|
149
|
+
Delete VPC in ap-northeast-2 - Management Account - Delete any unnecessary VPC in ap-northeast-2 to include the default VPC.
|
150
|
+
Delete VPC in ap-northeast-1 - Management Account - Delete any unnecessary VPC in ap-northeast-1 to include the default VPC.
|
151
|
+
Delete VPC in ca-central-1 - Management Account - Delete any unnecessary VPC in ca-central-1 to include the default VPC.
|
152
|
+
Delete VPC in sa-east-1 - Management Account - Delete any unnecessary VPC in sa-east-1 to include the default VPC.
|
153
|
+
Delete VPC in ap-southeast-1 - Management Account - Delete any unnecessary VPC in ap-southeast-1 to include the default VPC.
|
154
|
+
Delete VPC in ap-southeast-2 - Management Account - Delete any unnecessary VPC in ap-southeast-2 to include the default VPC.
|
155
|
+
Delete VPC in eu-central-1 - Management Account - Delete any unnecessary VPC in eu-central-1 to include the default VPC.
|
156
|
+
Delete VPC in us-east-1 - Management Account - Delete any unnecessary VPC in us-east-1 to include the default VPC.
|
157
|
+
Delete VPC in us-east-2 - Management Account - Delete any unnecessary VPC in us-east-2 to include the default VPC.
|
158
|
+
Delete VPC in us-west-1 - Management Account - Delete any unnecessary VPC in us-west-1 to include the default VPC.
|
159
|
+
Delete VPC in us-west-2 - Management Account - Delete any unnecessary VPC in us-west-2 to include the default VPC.
|
160
|
+
|
161
|
+
*********************************************************
|
162
|
+
GOVERNANCE
|
163
|
+
*********************************************************
|
164
|
+
|
165
|
+
AWS ORGANIZATION POLICY TYPES
|
166
|
+
|
167
|
+
Service Control Policies (SCP) enabled: true
|
168
|
+
Tag Policies enabled: true
|
169
|
+
Backup Policies enabled: true
|
170
|
+
|
171
|
+
AWS ORGANIZATION CLOUDFORMATION
|
172
|
+
|
173
|
+
AWS CloudFormation Organization stack sets status : ENABLED
|
174
|
+
|
175
|
+
CLOUDTRAIL CHECK
|
176
|
+
|
177
|
+
CloudTrail found in ap-southeast-2
|
178
|
+
Is Organization Trail: true
|
179
|
+
Is MultiRegion: true
|
180
|
+
|
181
|
+
|
182
|
+
GOVERNANCE SERVICES ENABLED IN AWS ORGANIZATION:
|
183
|
+
|
184
|
+
AWS CloudTrail
|
185
|
+
AWS Config
|
186
|
+
|
187
|
+
GOVERNANCE TASKS:
|
188
|
+
|
189
|
+
*********************************************************
|
190
|
+
FINANCIAL MANAGEMENT
|
191
|
+
*********************************************************
|
192
|
+
|
193
|
+
Legacy CUR
|
194
|
+
Is legacy CUR setup: true
|
195
|
+
|
196
|
+
CLOUD FINANCIAL MANAGEMENT TASKS:
|
197
|
+
|
198
|
+
*********************************************************
|
199
|
+
MULTI-ACCOUNT STRATEGY
|
200
|
+
*********************************************************
|
201
|
+
|
202
|
+
AWS ORGANIZATION DETAILS
|
203
|
+
|
204
|
+
AWS Organization Id: o-7qetdtd2wa
|
205
|
+
AWS Organization ARN: arn:aws:organizations::909135376185:organization/o-7qetdtd2wa
|
206
|
+
AWS Organization Root OU Id: r-jwu0
|
207
|
+
|
208
|
+
AWS ORGANIZATION CLOUDFORMATION
|
209
|
+
|
210
|
+
AWS CloudFormation Organization stack sets status : ENABLED
|
211
|
+
|
212
|
+
AWS ORGANIZATION TOP-LEVEL ORGANIZATION UNITS
|
213
|
+
|
214
|
+
List of Organization's top-level OUs and AWS accounts:
|
215
|
+
Organizational Unit: ou-nz-applications
|
216
|
+
Organizational Unit Id: ou-jwu0-ocsm4re1
|
217
|
+
AWS Accounts: None
|
218
|
+
|
219
|
+
Organizational Unit: ou-shared-services
|
220
|
+
Organizational Unit Id: ou-jwu0-72eyxnqv
|
221
|
+
AWS Accounts: None
|
222
|
+
|
223
|
+
Organizational Unit: ou-au-applications
|
224
|
+
Organizational Unit Id: ou-jwu0-xrrithh4
|
225
|
+
AWS Accounts: None
|
226
|
+
|
227
|
+
Organizational Unit: ou-exceptions
|
228
|
+
Organizational Unit Id: ou-jwu0-wxc5o8id
|
229
|
+
AWS Accounts:
|
230
|
+
Demo-Center
|
231
|
+
|
232
|
+
Organizational Unit: ou-security
|
233
|
+
Organizational Unit Id: ou-jwu0-2qhpuvtu
|
234
|
+
AWS Accounts: None
|
235
|
+
|
236
|
+
|
237
|
+
AWS ORGANIZATION MEMBER ACCOUNTS
|
238
|
+
|
239
|
+
Account: ams-api-prod
|
240
|
+
Account Email: aws-bc-ams-api-prod@datacom.com
|
241
|
+
|
242
|
+
Account: vams-nz-multi-fuel-apps-non-prod
|
243
|
+
Account Email: aws-bc-vams-nz-multi-fuel-apps-non-prod@datacom.com
|
244
|
+
|
245
|
+
Account: Demo-Center
|
246
|
+
Account Email: aws-bc-demo-center@datacom.com
|
247
|
+
|
248
|
+
Account: vams-nz-multi-fuel-api-non-prod
|
249
|
+
Account Email: aws-bc-vams-nz-multi-fuel-api-non-prod@datacom.com
|
250
|
+
|
251
|
+
Account: bluecurrent-batch-jobs-test
|
252
|
+
Account Email: aws-bc-batch-jobs-test@datacom.com
|
253
|
+
|
254
|
+
Account: ams-av-dw
|
255
|
+
Account Email: aws-bc-ams-av-dw@datacom.com
|
256
|
+
|
257
|
+
Account: bluecurrent-batch-jobs-prod
|
258
|
+
Account Email: aws-bc-batch-jobs-prod@datacom.com
|
259
|
+
|
260
|
+
Account: vams-nz-elec-outbound-sec
|
261
|
+
Account Email: aws-bc-vams-nz-elec-outbound-sec@datacom.com
|
262
|
+
|
263
|
+
Account: bc-corp-prod
|
264
|
+
Account Email: aws-bc-corp-prod@datacom.com
|
265
|
+
|
266
|
+
Account: vams-nz-multi-fuel-api-sandbox
|
267
|
+
Account Email: aws-bc-vams-nz-multi-fuel-api-sandbox@datacom.com
|
268
|
+
|
269
|
+
Account: bc-corp-sit
|
270
|
+
Account Email: aws-bc-corp-sit@datacom.com
|
271
|
+
|
272
|
+
Account: ams-poc1
|
273
|
+
Account Email: aws-bc-ams-poc1@datacom.com
|
274
|
+
|
275
|
+
Account: bc-photo-poc
|
276
|
+
Account Email: aws-bc-photo-poc@datacom.com
|
277
|
+
|
278
|
+
Account: vams-au-elec-external-non-prod
|
279
|
+
Account Email: aws-bc-vams-au-elec-external-non-prod@datacom.com
|
280
|
+
|
281
|
+
Account: vams-au-multi-fuel-apps-non-prod
|
282
|
+
Account Email: aws-bc-vams-au-multi-fuel-apps-non-prod@datacom.com
|
283
|
+
|
284
|
+
Account: vams-au-multi-fuel-apps-sandbox
|
285
|
+
Account Email: aws-bc-vams-au-multi-fuel-apps-sandbox@datacom.com
|
286
|
+
|
287
|
+
Account: bc-commvault-backup
|
288
|
+
Account Email: aws-bc-commvault-backup@datacom.com
|
289
|
+
|
290
|
+
Account: bc-corp-dev
|
291
|
+
Account Email: aws-bc-corp-dev@datacom.com
|
292
|
+
|
293
|
+
Account: vams-au-multi-fuel-api-sandbox
|
294
|
+
Account Email: aws-bc-vams-au-multi-fuel-api-sandbox@datacom.com
|
295
|
+
|
296
|
+
Account: bc-aws-connect-prod
|
297
|
+
Account Email: aws-bc-aws-connect-prod@datacom.com
|
298
|
+
|
299
|
+
Account: bc-corp-monitoring-prod
|
300
|
+
Account Email: aws-bc-corp-monitoring-prod@datacom.com
|
301
|
+
|
302
|
+
Account: bluecurrent-nz-soa-poc
|
303
|
+
Account Email: aws-bc-nz-soa-poc@datacom.com
|
304
|
+
|
305
|
+
Account: vams-nz-elec-datalake-prod
|
306
|
+
Account Email: aws-bc-vams-nz-elec-datalake-prod@datacom.com
|
307
|
+
|
308
|
+
Account: bc-aws-connect-test
|
309
|
+
Account Email: aws-bc-aws-connect-test@datacom.com
|
310
|
+
|
311
|
+
Account: ams-audit
|
312
|
+
Account Email: aws-bc-ams-audit@datacom.com
|
313
|
+
|
314
|
+
Account: bc-datalake-dev
|
315
|
+
Account Email: aws-bc-datalake-dev@datacom.com
|
316
|
+
|
317
|
+
Account: vams-nz-elec-sidecar
|
318
|
+
Account Email: aws-bc-vams-nz-elec-sidecar@datacom.com
|
319
|
+
|
320
|
+
Account: arcs-syd-prod
|
321
|
+
Account Email: aws-bc-arcs-syd-prod@datacom.com
|
322
|
+
|
323
|
+
Account: vams-au-metering-elec-mass-security
|
324
|
+
Account Email: aws-bc-vams-au-metering-elec-mass-security@datacom.com
|
325
|
+
|
326
|
+
Account: bluecurrent-nz-assetmanagement-jde
|
327
|
+
Account Email: aws-bc-nz-assetmanagement-jde@datacom.com
|
328
|
+
|
329
|
+
Account: vams-nz-multi-fuel-apps-sandbox
|
330
|
+
Account Email: aws-bc-vams-nz-multi-fuel-apps-sandbox@datacom.com
|
331
|
+
|
332
|
+
Account: vams-nz-elec-datalake-test
|
333
|
+
Account Email: aws-bc-vams-nz-elec-datalake-test@datacom.com
|
334
|
+
|
335
|
+
Account: ams-centralised-ops
|
336
|
+
Account Email: aws-bc-ams-centralised-ops@datacom.com
|
337
|
+
|
338
|
+
Account: ams-security
|
339
|
+
Account Email: aws-bc-ams-security@datacom.com
|
340
|
+
|
341
|
+
Account: bc-corp-monitoring-non-prod
|
342
|
+
Account Email: aws-bc-corp-monitoring-non-prod@datacom.com
|
343
|
+
|
344
|
+
Account: vams-au-metering-elec-mass-dev
|
345
|
+
Account Email: aws-bc-vams-au-metering-elec-mass-dev@datacom.com
|
346
|
+
|
347
|
+
Account: vams-nz-elec-inbound-sec
|
348
|
+
Account Email: aws-bc-vams-nz-elec-inbound-sec@datacom.com
|
349
|
+
|
350
|
+
Account: vams-au-multi-fuel-api-non-prod
|
351
|
+
Account Email: aws-bc-vams-au-multi-fuel-api-non-prod@datacom.com
|
352
|
+
|
353
|
+
Account: ams-gateway-1
|
354
|
+
Account Email: aws-bc-ams-gateway-1@datacom.com
|
355
|
+
|
356
|
+
Account: ams-admin
|
357
|
+
Account Email: aws-bc-management@datacom.com
|
358
|
+
|
359
|
+
Account: vams-nz-elec-sandbox
|
360
|
+
Account Email: aws-bc-vams-nz-elec-sandbox@datacom.com
|
361
|
+
|
362
|
+
Account: vams-au-metering-elec-mass-preprod
|
363
|
+
Account Email: aws-bc-vams-au-metering-elec-mass-preprod@datacom.com
|
364
|
+
|
365
|
+
Account: vams-nz-elec-internal-non-prod
|
366
|
+
Account Email: aws-bc-vams-nz-elec-internal-non-prod@datacom.com
|
367
|
+
|
368
|
+
Account: vams-au-metering-elec-mass-sit
|
369
|
+
Account Email: aws-bc-vams-au-metering-elec-mass-sit@datacom.com
|
370
|
+
|
371
|
+
Account: vams-au-multi-fuel-api-prod
|
372
|
+
Account Email: aws-bc-vams-au-multi-fuel-api-prod@datacom.com
|
373
|
+
|
374
|
+
Account: ams-api-dev
|
375
|
+
Account Email: aws-bc-ams-api-dev@datacom.com
|
376
|
+
|
377
|
+
Account: ams-appstream-prod
|
378
|
+
Account Email: aws-bc-ams-appstream-prod@datacom.com
|
379
|
+
|
380
|
+
Account: vams-au-elec-internal-non-prod
|
381
|
+
Account Email: aws-bc-vams-au-elec-internal-non-prod@datacom.com
|
382
|
+
|
383
|
+
Account: vams-nz-multi-fuel-api-prod
|
384
|
+
Account Email: aws-bc-vams-nz-multi-fuel-api-prod@datacom.com
|
385
|
+
|
386
|
+
Account: bc-datalake-preprod
|
387
|
+
Account Email: aws-bc-datalake-preprod@datacom.com
|
388
|
+
|
389
|
+
Account: ams-shared-services
|
390
|
+
Account Email: aws-bc-ams-shared-services@datacom.com
|
391
|
+
|
392
|
+
Account: vams-nz-elec-internal-prod
|
393
|
+
Account Email: aws-bc-vams-nz-elec-internal-prod@datacom.com
|
394
|
+
|
395
|
+
Account: vams-nz-metering-elec-mass-security
|
396
|
+
Account Email: aws-bc-vams-nz-metering-elec-mass-security@datacom.com
|
397
|
+
|
398
|
+
Account: vams-au-multi-fuel-apps-prod
|
399
|
+
Account Email: aws-bc-vams-au-multi-fuel-apps-prod@datacom.com
|
400
|
+
|
401
|
+
Account: vams-metering-autotest-prod
|
402
|
+
Account Email: aws-bc-vams-metering-autotest-prod@datacom.com
|
403
|
+
|
404
|
+
Account: vamsnz-syd-prod
|
405
|
+
Account Email: aws-bc-vamsnz-syd-prod@datacom.com
|
406
|
+
|
407
|
+
Account: bc-corp-uat
|
408
|
+
Account Email: aws-bc-corp-uat@datacom.com
|
409
|
+
|
410
|
+
Account: ams-shared-services-non-prod
|
411
|
+
Account Email: aws-bc-ams-shared-services-non-prod@datacom.com
|
412
|
+
|
413
|
+
Account: vams-nz-multi-fuel-apps-prod
|
414
|
+
Account Email: aws-bc-vams-nz-multi-fuel-apps-prod@datacom.com
|
415
|
+
|
416
|
+
|
417
|
+
AWS ORGANIZATION ENABLED SERVICES
|
418
|
+
|
419
|
+
The following AWS Services are enabled within your AWS Organization:
|
420
|
+
account.amazonaws.com
|
421
|
+
backup.amazonaws.com
|
422
|
+
cloudtrail.amazonaws.com
|
423
|
+
config-multiaccountsetup.amazonaws.com
|
424
|
+
config.amazonaws.com
|
425
|
+
iam.amazonaws.com
|
426
|
+
member.org.stacksets.cloudformation.amazonaws.com
|
427
|
+
ram.amazonaws.com
|
428
|
+
reporting.trustedadvisor.amazonaws.com
|
429
|
+
resource-explorer-2.amazonaws.com
|
430
|
+
securityhub.amazonaws.com
|
431
|
+
ssm.amazonaws.com
|
432
|
+
sso.amazonaws.com
|
433
|
+
tagpolicies.tag.amazonaws.com
|
434
|
+
|
435
|
+
AWS ORGANIZATION INTEGRATED SERVICE REGISTERED DELEGATED ADMINS
|
436
|
+
|
437
|
+
Account: ams-audit
|
438
|
+
Delegated Services:
|
439
|
+
securityhub.amazonaws.com
|
440
|
+
|
441
|
+
Account: ams-centralised-ops
|
442
|
+
Delegated Services:
|
443
|
+
config.amazonaws.com
|
444
|
+
resource-explorer-2.amazonaws.com
|
445
|
+
|
446
|
+
|
447
|
+
MULTI-ACCOUNT STRATEGY TASKS:
|
448
|
+
Review Account Email Addresses - Multi-Account Strategy - Review Account Email Addresses in AWS Organization
|
449
|
+
Deploy Transitional OU - Multi-Account Strategy - Deploy Transitional OU in AWS Organization
|
450
|
+
Deploy Suspended OU - Multi-Account Strategy - Deploy Suspended OU in AWS Organization
|
451
|
+
Deploy Workloads OU - Multi-Account Strategy - Deploy Workloads OU in AWS Organization
|
452
|
+
Deploy Security OU - Multi-Account Strategy - Deploy Security OU in AWS Organization
|
453
|
+
Deploy Infrastructure OU - Multi-Account Strategy - Deploy Infrastructure OU in AWS Organization
|
454
|
+
|
455
|
+
*********************************************************
|
456
|
+
LANDING ZONE
|
457
|
+
*********************************************************
|
458
|
+
|
459
|
+
AWS CONTROL TOWER
|
460
|
+
|
461
|
+
AWS Control Tower is not deployed in the AWS Organization
|
462
|
+
|
463
|
+
LANDING ZONE TASKS:
|
464
|
+
Deploy AWS Control Tower - Landing Zone - Deploy AWS Control Tower in AWS Organization
|
465
|
+
|
466
|
+
*********************************************************
|
467
|
+
IDENTITY
|
468
|
+
*********************************************************
|
469
|
+
|
470
|
+
AWS IAM IDENTITY CENTER
|
471
|
+
|
472
|
+
IdC Region: ap-southeast-2
|
473
|
+
IdC ARN: arn:aws:sso:::instance/ssoins-825940b04bdafef9
|
474
|
+
IdC Instance Id: d-976752e8d5
|
475
|
+
|
476
|
+
IDENTITY TASKS:
|
477
|
+
Delegate administration to AWS IAM Identity Center - Identity - Delegate administration to AWS IAM Identity Center
|
478
|
+
|
479
|
+
*********************************************************
|
480
|
+
SECURITY
|
481
|
+
*********************************************************
|
482
|
+
|
483
|
+
AWS SECURITY SERVICES ENABLED IN AWS ORGANIZATION:
|
484
|
+
|
485
|
+
AWS Security Hub
|
486
|
+
AWS CloudTrail
|
487
|
+
AWS Config
|
488
|
+
|
489
|
+
SECURITY TASKS:
|
490
|
+
Delegate administration to AWS GuardDuty - Security - Delegate administration to AWS GuardDuty
|
491
|
+
Delegate administration to AWS IAM Access Analyzer - Security - Delegate administration to AWS IAM Access Analyzer
|
492
|
+
Delegate administration of AWS GuardDuty - Security - Delegate administration to AWS GuardDuty
|
493
|
+
Delegate administration of AWS IAM Access Analyzer - Security - Delegate administration to AWS IAM Access Analyzer
|
494
|
+
Delegate administration of Amazon S3 Storage Lens - Security - Delegate administration to Amazon S3 Storage Lens
|
495
|
+
|
496
|
+
*********************************************************
|
497
|
+
NETWORK
|
498
|
+
*********************************************************
|
499
|
+
|
500
|
+
NETWORK TASKS:
|
501
|
+
Enable AWS GuardDuty - Network - Enable AWS GuardDuty in AWS Organization
|
502
|
+
Enable AWS IPAM - Network - Enable AWS IPAM in AWS Organization
|
503
|
+
Delegate administration of AWS IPAM - Network - Delegate administration to AWS IPAM
|
504
|
+
|
505
|
+
*********************************************************
|
506
|
+
OBSERVABILITY
|
507
|
+
*********************************************************
|
508
|
+
|
509
|
+
OBSERVABILITY TASKS:
|
510
|
+
Delegate administration of AWS Account - Observability - Delegate administration to AWS Account
|
511
|
+
|
512
|
+
*********************************************************
|
513
|
+
BACKUP AND RECOVERY
|
514
|
+
*********************************************************
|
515
|
+
|
516
|
+
BACKUP AND RECOVERY TASKS:
|
517
|
+
Delegate administration of AWS Backup - Backup and Recovery - Delegate administration to AWS Backup
|
518
|
+
|
519
|
+
|
520
|
+
END REVIEW
|