runbooks 0.2.5__py3-none-any.whl → 0.6.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- conftest.py +26 -0
- jupyter-agent/.env.template +2 -0
- jupyter-agent/.gitattributes +35 -0
- jupyter-agent/README.md +16 -0
- jupyter-agent/app.py +256 -0
- jupyter-agent/cloudops-agent.png +0 -0
- jupyter-agent/ds-system-prompt.txt +154 -0
- jupyter-agent/jupyter-agent.png +0 -0
- jupyter-agent/llama3_template.jinja +123 -0
- jupyter-agent/requirements.txt +9 -0
- jupyter-agent/utils.py +409 -0
- runbooks/__init__.py +71 -3
- runbooks/__main__.py +13 -0
- runbooks/aws/ec2_describe_instances.py +1 -1
- runbooks/aws/ec2_run_instances.py +8 -2
- runbooks/aws/ec2_start_stop_instances.py +17 -4
- runbooks/aws/ec2_unused_volumes.py +5 -1
- runbooks/aws/s3_create_bucket.py +4 -2
- runbooks/aws/s3_list_objects.py +6 -1
- runbooks/aws/tagging_lambda_handler.py +13 -2
- runbooks/aws/tags.json +12 -0
- runbooks/base.py +353 -0
- runbooks/cfat/README.md +49 -0
- runbooks/cfat/__init__.py +74 -0
- runbooks/cfat/app.ts +644 -0
- runbooks/cfat/assessment/__init__.py +40 -0
- runbooks/cfat/assessment/asana-import.csv +39 -0
- runbooks/cfat/assessment/cfat-checks.csv +31 -0
- runbooks/cfat/assessment/cfat.txt +520 -0
- runbooks/cfat/assessment/collectors.py +200 -0
- runbooks/cfat/assessment/jira-import.csv +39 -0
- runbooks/cfat/assessment/runner.py +387 -0
- runbooks/cfat/assessment/validators.py +290 -0
- runbooks/cfat/cli.py +103 -0
- runbooks/cfat/docs/asana-import.csv +24 -0
- runbooks/cfat/docs/cfat-checks.csv +31 -0
- runbooks/cfat/docs/cfat.txt +335 -0
- runbooks/cfat/docs/checks-output.png +0 -0
- runbooks/cfat/docs/cloudshell-console-run.png +0 -0
- runbooks/cfat/docs/cloudshell-download.png +0 -0
- runbooks/cfat/docs/cloudshell-output.png +0 -0
- runbooks/cfat/docs/downloadfile.png +0 -0
- runbooks/cfat/docs/jira-import.csv +24 -0
- runbooks/cfat/docs/open-cloudshell.png +0 -0
- runbooks/cfat/docs/report-header.png +0 -0
- runbooks/cfat/models.py +1026 -0
- runbooks/cfat/package-lock.json +5116 -0
- runbooks/cfat/package.json +38 -0
- runbooks/cfat/report.py +496 -0
- runbooks/cfat/reporting/__init__.py +46 -0
- runbooks/cfat/reporting/exporters.py +337 -0
- runbooks/cfat/reporting/formatters.py +496 -0
- runbooks/cfat/reporting/templates.py +135 -0
- runbooks/cfat/run-assessment.sh +23 -0
- runbooks/cfat/runner.py +69 -0
- runbooks/cfat/src/actions/check-cloudtrail-existence.ts +43 -0
- runbooks/cfat/src/actions/check-config-existence.ts +37 -0
- runbooks/cfat/src/actions/check-control-tower.ts +37 -0
- runbooks/cfat/src/actions/check-ec2-existence.ts +46 -0
- runbooks/cfat/src/actions/check-iam-users.ts +50 -0
- runbooks/cfat/src/actions/check-legacy-cur.ts +30 -0
- runbooks/cfat/src/actions/check-org-cloudformation.ts +30 -0
- runbooks/cfat/src/actions/check-vpc-existence.ts +43 -0
- runbooks/cfat/src/actions/create-asanaimport.ts +14 -0
- runbooks/cfat/src/actions/create-backlog.ts +372 -0
- runbooks/cfat/src/actions/create-jiraimport.ts +15 -0
- runbooks/cfat/src/actions/create-report.ts +616 -0
- runbooks/cfat/src/actions/define-account-type.ts +51 -0
- runbooks/cfat/src/actions/get-enabled-org-policy-types.ts +40 -0
- runbooks/cfat/src/actions/get-enabled-org-services.ts +26 -0
- runbooks/cfat/src/actions/get-idc-info.ts +34 -0
- runbooks/cfat/src/actions/get-org-da-accounts.ts +34 -0
- runbooks/cfat/src/actions/get-org-details.ts +35 -0
- runbooks/cfat/src/actions/get-org-member-accounts.ts +44 -0
- runbooks/cfat/src/actions/get-org-ous.ts +35 -0
- runbooks/cfat/src/actions/get-regions.ts +22 -0
- runbooks/cfat/src/actions/zip-assessment.ts +27 -0
- runbooks/cfat/src/types/index.d.ts +147 -0
- runbooks/cfat/tests/__init__.py +141 -0
- runbooks/cfat/tests/test_cli.py +340 -0
- runbooks/cfat/tests/test_integration.py +290 -0
- runbooks/cfat/tests/test_models.py +505 -0
- runbooks/cfat/tests/test_reporting.py +354 -0
- runbooks/cfat/tsconfig.json +16 -0
- runbooks/cfat/webpack.config.cjs +27 -0
- runbooks/config.py +260 -0
- runbooks/finops/__init__.py +88 -0
- runbooks/finops/aws_client.py +245 -0
- runbooks/finops/cli.py +151 -0
- runbooks/finops/cost_processor.py +410 -0
- runbooks/finops/dashboard_runner.py +448 -0
- runbooks/finops/helpers.py +355 -0
- runbooks/finops/main.py +14 -0
- runbooks/finops/profile_processor.py +174 -0
- runbooks/finops/types.py +66 -0
- runbooks/finops/visualisations.py +80 -0
- runbooks/inventory/.gitignore +354 -0
- runbooks/inventory/ArgumentsClass.py +261 -0
- runbooks/inventory/Inventory_Modules.py +6130 -0
- runbooks/inventory/LandingZone/delete_lz.py +1075 -0
- runbooks/inventory/README.md +1320 -0
- runbooks/inventory/__init__.py +62 -0
- runbooks/inventory/account_class.py +532 -0
- runbooks/inventory/all_my_instances_wrapper.py +123 -0
- runbooks/inventory/aws_decorators.py +201 -0
- runbooks/inventory/cfn_move_stack_instances.py +1526 -0
- runbooks/inventory/check_cloudtrail_compliance.py +614 -0
- runbooks/inventory/check_controltower_readiness.py +1107 -0
- runbooks/inventory/check_landingzone_readiness.py +711 -0
- runbooks/inventory/cloudtrail.md +727 -0
- runbooks/inventory/collectors/__init__.py +20 -0
- runbooks/inventory/collectors/aws_compute.py +518 -0
- runbooks/inventory/collectors/aws_networking.py +275 -0
- runbooks/inventory/collectors/base.py +222 -0
- runbooks/inventory/core/__init__.py +19 -0
- runbooks/inventory/core/collector.py +303 -0
- runbooks/inventory/core/formatter.py +296 -0
- runbooks/inventory/delete_s3_buckets_objects.py +169 -0
- runbooks/inventory/discovery.md +81 -0
- runbooks/inventory/draw_org_structure.py +748 -0
- runbooks/inventory/ec2_vpc_utils.py +341 -0
- runbooks/inventory/find_cfn_drift_detection.py +272 -0
- runbooks/inventory/find_cfn_orphaned_stacks.py +719 -0
- runbooks/inventory/find_cfn_stackset_drift.py +733 -0
- runbooks/inventory/find_ec2_security_groups.py +669 -0
- runbooks/inventory/find_landingzone_versions.py +201 -0
- runbooks/inventory/find_vpc_flow_logs.py +1221 -0
- runbooks/inventory/inventory.sh +659 -0
- runbooks/inventory/list_cfn_stacks.py +558 -0
- runbooks/inventory/list_cfn_stackset_operation_results.py +252 -0
- runbooks/inventory/list_cfn_stackset_operations.py +734 -0
- runbooks/inventory/list_cfn_stacksets.py +453 -0
- runbooks/inventory/list_config_recorders_delivery_channels.py +681 -0
- runbooks/inventory/list_ds_directories.py +354 -0
- runbooks/inventory/list_ec2_availability_zones.py +286 -0
- runbooks/inventory/list_ec2_ebs_volumes.py +244 -0
- runbooks/inventory/list_ec2_instances.py +425 -0
- runbooks/inventory/list_ecs_clusters_and_tasks.py +562 -0
- runbooks/inventory/list_elbs_load_balancers.py +411 -0
- runbooks/inventory/list_enis_network_interfaces.py +526 -0
- runbooks/inventory/list_guardduty_detectors.py +568 -0
- runbooks/inventory/list_iam_policies.py +404 -0
- runbooks/inventory/list_iam_roles.py +518 -0
- runbooks/inventory/list_iam_saml_providers.py +359 -0
- runbooks/inventory/list_lambda_functions.py +882 -0
- runbooks/inventory/list_org_accounts.py +446 -0
- runbooks/inventory/list_org_accounts_users.py +354 -0
- runbooks/inventory/list_rds_db_instances.py +406 -0
- runbooks/inventory/list_route53_hosted_zones.py +318 -0
- runbooks/inventory/list_servicecatalog_provisioned_products.py +575 -0
- runbooks/inventory/list_sns_topics.py +360 -0
- runbooks/inventory/list_ssm_parameters.py +402 -0
- runbooks/inventory/list_vpc_subnets.py +433 -0
- runbooks/inventory/list_vpcs.py +422 -0
- runbooks/inventory/lockdown_cfn_stackset_role.py +224 -0
- runbooks/inventory/models/__init__.py +24 -0
- runbooks/inventory/models/account.py +192 -0
- runbooks/inventory/models/inventory.py +309 -0
- runbooks/inventory/models/resource.py +247 -0
- runbooks/inventory/recover_cfn_stack_ids.py +205 -0
- runbooks/inventory/requirements.txt +12 -0
- runbooks/inventory/run_on_multi_accounts.py +211 -0
- runbooks/inventory/tests/common_test_data.py +3661 -0
- runbooks/inventory/tests/common_test_functions.py +204 -0
- runbooks/inventory/tests/script_test_data.py +0 -0
- runbooks/inventory/tests/setup.py +24 -0
- runbooks/inventory/tests/src.py +18 -0
- runbooks/inventory/tests/test_cfn_describe_stacks.py +208 -0
- runbooks/inventory/tests/test_ec2_describe_instances.py +162 -0
- runbooks/inventory/tests/test_inventory_modules.py +55 -0
- runbooks/inventory/tests/test_lambda_list_functions.py +86 -0
- runbooks/inventory/tests/test_moto_integration_example.py +273 -0
- runbooks/inventory/tests/test_org_list_accounts.py +49 -0
- runbooks/inventory/update_aws_actions.py +173 -0
- runbooks/inventory/update_cfn_stacksets.py +1215 -0
- runbooks/inventory/update_cloudwatch_logs_retention_policy.py +294 -0
- runbooks/inventory/update_iam_roles_cross_accounts.py +478 -0
- runbooks/inventory/update_s3_public_access_block.py +539 -0
- runbooks/inventory/utils/__init__.py +23 -0
- runbooks/inventory/utils/aws_helpers.py +510 -0
- runbooks/inventory/utils/threading_utils.py +493 -0
- runbooks/inventory/utils/validation.py +682 -0
- runbooks/inventory/verify_ec2_security_groups.py +1430 -0
- runbooks/main.py +785 -0
- runbooks/organizations/__init__.py +12 -0
- runbooks/organizations/manager.py +374 -0
- runbooks/security_baseline/README.md +324 -0
- runbooks/security_baseline/checklist/alternate_contacts.py +8 -1
- runbooks/security_baseline/checklist/bucket_public_access.py +4 -1
- runbooks/security_baseline/checklist/cloudwatch_alarm_configuration.py +9 -2
- runbooks/security_baseline/checklist/guardduty_enabled.py +9 -2
- runbooks/security_baseline/checklist/multi_region_instance_usage.py +5 -1
- runbooks/security_baseline/checklist/root_access_key.py +6 -1
- runbooks/security_baseline/config-origin.json +1 -1
- runbooks/security_baseline/config.json +1 -1
- runbooks/security_baseline/permission.json +1 -1
- runbooks/security_baseline/report_generator.py +10 -2
- runbooks/security_baseline/report_template_en.html +7 -7
- runbooks/security_baseline/report_template_jp.html +7 -7
- runbooks/security_baseline/report_template_kr.html +12 -12
- runbooks/security_baseline/report_template_vn.html +7 -7
- runbooks/security_baseline/requirements.txt +7 -0
- runbooks/security_baseline/run_script.py +8 -2
- runbooks/security_baseline/security_baseline_tester.py +10 -2
- runbooks/security_baseline/utils/common.py +5 -1
- runbooks/utils/__init__.py +204 -0
- runbooks-0.6.1.dist-info/METADATA +373 -0
- runbooks-0.6.1.dist-info/RECORD +237 -0
- {runbooks-0.2.5.dist-info → runbooks-0.6.1.dist-info}/WHEEL +1 -1
- runbooks-0.6.1.dist-info/entry_points.txt +7 -0
- runbooks-0.6.1.dist-info/licenses/LICENSE +201 -0
- runbooks-0.6.1.dist-info/top_level.txt +3 -0
- runbooks/python101/calculator.py +0 -34
- runbooks/python101/config.py +0 -1
- runbooks/python101/exceptions.py +0 -16
- runbooks/python101/file_manager.py +0 -218
- runbooks/python101/toolkit.py +0 -153
- runbooks-0.2.5.dist-info/METADATA +0 -439
- runbooks-0.2.5.dist-info/RECORD +0 -61
- runbooks-0.2.5.dist-info/entry_points.txt +0 -3
- runbooks-0.2.5.dist-info/top_level.txt +0 -1
@@ -0,0 +1,335 @@
|
|
1
|
+
Cloud Foundation Assessment Tool
|
2
|
+
Generated on: Mon, 22 Jul 2024 20:00:52 GMT
|
3
|
+
|
4
|
+
|
5
|
+
Incomplete Requirements:
|
6
|
+
INCOMPLETE: Config Recorder in Management Account configured
|
7
|
+
INCOMPLETE: Config Delivery Channel in Management Account configured
|
8
|
+
|
9
|
+
====================================
|
10
|
+
|
11
|
+
Foundation Status: INCOMPLETE
|
12
|
+
Estimate of Required Level of Effort (LOE): 4 hours
|
13
|
+
CFAT Score: 133 out of 158
|
14
|
+
|
15
|
+
====================================
|
16
|
+
|
17
|
+
Foundation Checks:
|
18
|
+
┌─────────┬────────────────────────────────────────────────────────────┬───────────────────────────────────────────────────────────────────────────────────────────┬──────────────┬──────────┬────────┬─────┬─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┐
|
19
|
+
│ (index) │ check │ description │ status │ required │ weight │ loe │ remediationLink │
|
20
|
+
├─────────┼────────────────────────────────────────────────────────────┼───────────────────────────────────────────────────────────────────────────────────────────┼──────────────┼──────────┼────────┼─────┼─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤
|
21
|
+
│ 0 │ 'AWS Organization created' │ 'AWS Organization is enabled.' │ 'complete' │ true │ 6 │ 1 │ 'https://aws.amazon.com/organizations/getting-started/' │
|
22
|
+
│ 1 │ 'Management Account created' │ 'AWS Management account exists.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-creating.html' │
|
23
|
+
│ 2 │ 'Management Account IAM users removed' │ 'IAM Users should not exist in Management Account.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting' │
|
24
|
+
│ 3 │ 'Management Account EC2 instances removed' │ 'EC2 Instances should not exist in Management Account.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html' │
|
25
|
+
│ 4 │ 'Management Account VPCs removed' │ 'Management Account should not have any VPCs.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md' │
|
26
|
+
│ 5 │ 'CloudTrail Trail created' │ 'CloudTrail should be enabled within the account.' │ 'complete' │ true │ 6 │ 3 │ 'https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html' │
|
27
|
+
│ 6 │ 'CloudTrail Organization Service enabled' │ 'CloudTrail should be enabled on the Organization.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudtrail.html' │
|
28
|
+
│ 7 │ 'CloudTrail Org Trail deployed' │ 'At least one CloudTrail Organization Trail should be enabled.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html' │
|
29
|
+
│ 8 │ 'Config Recorder in Management Account configured' │ 'Config Recorder in the Management Account should be enabled.' │ 'incomplete' │ true │ 6 │ 2 │ 'https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/' │
|
30
|
+
│ 9 │ 'Config Delivery Channel in Management Account configured' │ 'Config Delivery Channel in Management Account should be enabled.' │ 'incomplete' │ true │ 6 │ 2 │ 'https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/' │
|
31
|
+
│ 10 │ 'CloudFormation StackSets activated' │ 'CloudFormation StackSets should be activated in the CloudFormation console.' │ 'incomplete' │ false │ 5 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudformation.html#integrate-enable-ta-cloudformation' │
|
32
|
+
│ 11 │ 'GuardDuty Organization service enabled' │ 'GuardDuty Organization services should be enabled.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-guardduty.html#integrate-enable-ta-guardduty' │
|
33
|
+
│ 12 │ 'RAM Organization service enabled' │ 'Resource Access Manager (RAM) trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ram.html#integrate-enable-ta-ram' │
|
34
|
+
│ 13 │ 'Security Hub Organization service enabled' │ 'Security Hub trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-securityhub.html#integrate-enable-ta-securityhub' │
|
35
|
+
│ 14 │ 'IAM Access Analyzer Organization service enabled' │ 'IAM Access Analyzer trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#access-analyzer-enabling' │
|
36
|
+
│ 15 │ 'Config Organization service enabled' │ 'AWS Config trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-config.html#integrate-enable-ta-config' │
|
37
|
+
│ 16 │ 'CloudFormation Organization service enabled' │ 'CloudFormation trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 5 │ 1 │ 'https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html' │
|
38
|
+
│ 17 │ 'Top-level Infrastructure OU deployed' │ 'Top-level Infrastructure OU should exist.' │ 'complete' │ false │ 5 │ 2 │ 'https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou' │
|
39
|
+
│ 18 │ 'Top-level Security OU deployed' │ 'Top-level Security OU should exist.' │ 'complete' │ true │ 6 │ 2 │ 'https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou' │
|
40
|
+
│ 19 │ 'Top-level Workloads OU deployed' │ 'Top-level Workloads OU should exist.' │ 'complete' │ false │ 5 │ 2 │ 'https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou' │
|
41
|
+
│ 20 │ 'IAM IdC Organization service enabled' │ 'IAM Identity Center trusted access should be enabled in the AWS Organization' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/singlesignon/latest/userguide/get-set-up-for-idc.html' │
|
42
|
+
│ 21 │ 'IAM IdC configured' │ 'IAM Identity Center should be configured.' │ 'complete' │ true │ 6 │ 3 │ 'https://docs.aws.amazon.com/singlesignon/latest/userguide/tutorials.html' │
|
43
|
+
│ 22 │ 'Service Control Policies enabled' │ 'Service Control Policy should be enabled within the AWS Organization.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html' │
|
44
|
+
│ 23 │ 'Organization Tag Policy enabled' │ 'Tag Policy should be enabled within the AWS Organization.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html' │
|
45
|
+
│ 24 │ 'Organization Backup Policy enabled' │ 'Backup Policy should be enabled within the AWS Organization.' │ 'complete' │ false │ 5 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html' │
|
46
|
+
│ 25 │ 'Control Tower deployed' │ 'Control Tower should be deployed.' │ 'complete' │ true │ 6 │ 6 │ 'https://catalog.workshops.aws/control-tower/en-US/prerequisites/deploying' │
|
47
|
+
│ 26 │ 'Control Tower latest version' │ 'Control Tower should be the latest version.' │ 'complete' │ false │ 5 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/update-controltower.html' │
|
48
|
+
│ 27 │ 'Control Tower not drifted' │ 'Control Tower should not be drifted.' │ 'complete' │ true │ 6 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/resolve-drift.html' │
|
49
|
+
│ 28 │ 'Log Archive account deployed' │ 'Log Archive account should exist.' │ 'complete' │ true │ 6 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html' │
|
50
|
+
│ 29 │ 'Audit account deployed' │ 'Audit/Security Tooling account should exist.' │ 'complete' │ true │ 6 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html' │
|
51
|
+
└─────────┴────────────────────────────────────────────────────────────┴───────────────────────────────────────────────────────────────────────────────────────────┴──────────────┴──────────┴────────┴─────┴─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┘
|
52
|
+
|
53
|
+
|
54
|
+
Start Detailed Report:
|
55
|
+
|
56
|
+
|
57
|
+
*********************************************************
|
58
|
+
MANAGEMENT ACCOUNT
|
59
|
+
*********************************************************
|
60
|
+
|
61
|
+
AWS ACCOUNT TYPE
|
62
|
+
|
63
|
+
Is in AWS Organization: true
|
64
|
+
Assessing AWS Management Account: true
|
65
|
+
|
66
|
+
IAM USERS CHECK
|
67
|
+
|
68
|
+
No IAM Users found.
|
69
|
+
|
70
|
+
EC2 INSTANCE CHECK
|
71
|
+
|
72
|
+
No EC2 instances found.
|
73
|
+
|
74
|
+
VPC CHECK
|
75
|
+
|
76
|
+
ap-south-1 - found VPC(s).
|
77
|
+
eu-north-1 - found VPC(s).
|
78
|
+
eu-west-3 - found VPC(s).
|
79
|
+
eu-west-2 - found VPC(s).
|
80
|
+
eu-west-1 - found VPC(s).
|
81
|
+
ap-northeast-3 - found VPC(s).
|
82
|
+
ap-northeast-2 - found VPC(s).
|
83
|
+
ap-northeast-1 - found VPC(s).
|
84
|
+
ca-central-1 - found VPC(s).
|
85
|
+
sa-east-1 - found VPC(s).
|
86
|
+
ap-southeast-1 - found VPC(s).
|
87
|
+
ap-southeast-2 - found VPC(s).
|
88
|
+
eu-central-1 - found VPC(s).
|
89
|
+
us-east-1 - found VPC(s).
|
90
|
+
us-east-2 - found VPC(s).
|
91
|
+
us-west-1 - found VPC(s).
|
92
|
+
us-west-2 - found VPC(s).
|
93
|
+
|
94
|
+
AWS CONFIG CHECK
|
95
|
+
|
96
|
+
No AWS Config resource discovered
|
97
|
+
|
98
|
+
MANAGEMENT ACCOUNT TASKS:
|
99
|
+
Delete VPC in ap-south-1 - Management Account - Delete any unnecessary VPC in ap-south-1 to include the default VPC.
|
100
|
+
Delete VPC in eu-north-1 - Management Account - Delete any unnecessary VPC in eu-north-1 to include the default VPC.
|
101
|
+
Delete VPC in eu-west-3 - Management Account - Delete any unnecessary VPC in eu-west-3 to include the default VPC.
|
102
|
+
Delete VPC in eu-west-2 - Management Account - Delete any unnecessary VPC in eu-west-2 to include the default VPC.
|
103
|
+
Delete VPC in eu-west-1 - Management Account - Delete any unnecessary VPC in eu-west-1 to include the default VPC.
|
104
|
+
Delete VPC in ap-northeast-3 - Management Account - Delete any unnecessary VPC in ap-northeast-3 to include the default VPC.
|
105
|
+
Delete VPC in ap-northeast-2 - Management Account - Delete any unnecessary VPC in ap-northeast-2 to include the default VPC.
|
106
|
+
Delete VPC in ap-northeast-1 - Management Account - Delete any unnecessary VPC in ap-northeast-1 to include the default VPC.
|
107
|
+
Delete VPC in ca-central-1 - Management Account - Delete any unnecessary VPC in ca-central-1 to include the default VPC.
|
108
|
+
Delete VPC in sa-east-1 - Management Account - Delete any unnecessary VPC in sa-east-1 to include the default VPC.
|
109
|
+
Delete VPC in ap-southeast-1 - Management Account - Delete any unnecessary VPC in ap-southeast-1 to include the default VPC.
|
110
|
+
Delete VPC in ap-southeast-2 - Management Account - Delete any unnecessary VPC in ap-southeast-2 to include the default VPC.
|
111
|
+
Delete VPC in eu-central-1 - Management Account - Delete any unnecessary VPC in eu-central-1 to include the default VPC.
|
112
|
+
Delete VPC in us-east-1 - Management Account - Delete any unnecessary VPC in us-east-1 to include the default VPC.
|
113
|
+
Delete VPC in us-east-2 - Management Account - Delete any unnecessary VPC in us-east-2 to include the default VPC.
|
114
|
+
Delete VPC in us-west-1 - Management Account - Delete any unnecessary VPC in us-west-1 to include the default VPC.
|
115
|
+
Delete VPC in us-west-2 - Management Account - Delete any unnecessary VPC in us-west-2 to include the default VPC.
|
116
|
+
|
117
|
+
*********************************************************
|
118
|
+
GOVERNANCE
|
119
|
+
*********************************************************
|
120
|
+
|
121
|
+
AWS ORGANIZATION POLICY TYPES
|
122
|
+
|
123
|
+
Service Control Policies (SCP) enabled: true
|
124
|
+
Tag Policies enabled: true
|
125
|
+
Backup Policies enabled: true
|
126
|
+
|
127
|
+
AWS ORGANIZATION CLOUDFORMATION
|
128
|
+
|
129
|
+
AWS CloudFormation Organization stack sets status : ENABLED
|
130
|
+
|
131
|
+
CLOUDTRAIL CHECK
|
132
|
+
|
133
|
+
CloudTrail found in us-west-2
|
134
|
+
Is Organization Trail: true
|
135
|
+
Is MultiRegion: true
|
136
|
+
|
137
|
+
|
138
|
+
GOVERNANCE SERVICES ENABLED IN AWS ORGANIZATION:
|
139
|
+
|
140
|
+
AWS CloudTrail
|
141
|
+
AWS Config
|
142
|
+
|
143
|
+
GOVERNANCE TASKS:
|
144
|
+
|
145
|
+
*********************************************************
|
146
|
+
FINANCIAL MANAGEMENT
|
147
|
+
*********************************************************
|
148
|
+
|
149
|
+
Legacy CUR
|
150
|
+
Is legacy CUR setup: false
|
151
|
+
|
152
|
+
CLOUD FINANCIAL MANAGEMENT TASKS:
|
153
|
+
Setup legacy CUR - Cloud Financial Management - Setup legacy CUR in AWS Organization
|
154
|
+
|
155
|
+
*********************************************************
|
156
|
+
MULTI-ACCOUNT STRATEGY
|
157
|
+
*********************************************************
|
158
|
+
|
159
|
+
AWS ORGANIZATION DETAILS
|
160
|
+
|
161
|
+
AWS Organization Id: o-12345abcde
|
162
|
+
AWS Organization ARN: arn:aws:organizations::12345678912:organization/o-12345abcde
|
163
|
+
AWS Organization Root OU Id: r-ab12
|
164
|
+
|
165
|
+
AWS ORGANIZATION CLOUDFORMATION
|
166
|
+
|
167
|
+
AWS CloudFormation Organization stack sets status : ENABLED
|
168
|
+
|
169
|
+
AWS ORGANIZATION TOP-LEVEL ORGANIZATION UNITS
|
170
|
+
|
171
|
+
List of Organization's top-level OUs and AWS accounts:
|
172
|
+
Organizational Unit: Exceptions
|
173
|
+
Organizational Unit Id: ou-ab12-abch1234
|
174
|
+
AWS Accounts: None
|
175
|
+
|
176
|
+
Organizational Unit: Security
|
177
|
+
Organizational Unit Id: ou-ab12-1234abc
|
178
|
+
AWS Accounts: None
|
179
|
+
|
180
|
+
Organizational Unit: Transitional
|
181
|
+
Organizational Unit Id: ou-ab12-abcl1234
|
182
|
+
AWS Accounts: None
|
183
|
+
|
184
|
+
Organizational Unit: Workloads
|
185
|
+
Organizational Unit Id: ou-ab12-1234vabc
|
186
|
+
AWS Accounts: None
|
187
|
+
|
188
|
+
Organizational Unit: Suspended
|
189
|
+
Organizational Unit Id: ou-ab12-abcc1234
|
190
|
+
AWS Accounts: None
|
191
|
+
|
192
|
+
Organizational Unit: CT Security
|
193
|
+
Organizational Unit Id: ou-ab12-1234rabc
|
194
|
+
AWS Accounts:
|
195
|
+
Log Archive
|
196
|
+
Audit
|
197
|
+
|
198
|
+
Organizational Unit: Infrastructure
|
199
|
+
Organizational Unit Id: ou-ab12-abcn1234
|
200
|
+
AWS Accounts:
|
201
|
+
Shared Resources
|
202
|
+
Identity
|
203
|
+
Network
|
204
|
+
|
205
|
+
|
206
|
+
AWS ORGANIZATION MEMBER ACCOUNTS
|
207
|
+
|
208
|
+
Account: Audit
|
209
|
+
Account Email: my-example+ctlab-audit@example.com
|
210
|
+
|
211
|
+
Account: Log Archive
|
212
|
+
Account Email: my-example+ctlab-log-archive@example.com
|
213
|
+
|
214
|
+
Account: Shared Resources
|
215
|
+
Account Email: my-example+ctlab-shared-resources@example.com
|
216
|
+
|
217
|
+
Account: Network
|
218
|
+
Account Email: my-example+ctlab-network@example.com
|
219
|
+
|
220
|
+
Account: Identity
|
221
|
+
Account Email: my-example+ctlab-identity@example.com
|
222
|
+
|
223
|
+
Account: Management
|
224
|
+
Account Email: my-example+ct-lab@aol.com
|
225
|
+
|
226
|
+
|
227
|
+
AWS ORGANIZATION ENABLED SERVICES
|
228
|
+
|
229
|
+
The following AWS Services are enabled within your AWS Organization:
|
230
|
+
access-analyzer.amazonaws.com
|
231
|
+
account.amazonaws.com
|
232
|
+
cloudtrail.amazonaws.com
|
233
|
+
config.amazonaws.com
|
234
|
+
controltower.amazonaws.com
|
235
|
+
guardduty.amazonaws.com
|
236
|
+
inspector2.amazonaws.com
|
237
|
+
ipam.amazonaws.com
|
238
|
+
macie.amazonaws.com
|
239
|
+
member.org.stacksets.cloudformation.amazonaws.com
|
240
|
+
ram.amazonaws.com
|
241
|
+
securityhub.amazonaws.com
|
242
|
+
sso.amazonaws.com
|
243
|
+
storage-lens.s3.amazonaws.com
|
244
|
+
tagpolicies.tag.amazonaws.com
|
245
|
+
|
246
|
+
AWS ORGANIZATION INTEGRATED SERVICE REGISTERED DELEGATED ADMINS
|
247
|
+
|
248
|
+
Account: Audit
|
249
|
+
Delegated Services:
|
250
|
+
guardduty.amazonaws.com
|
251
|
+
inspector2.amazonaws.com
|
252
|
+
macie.amazonaws.com
|
253
|
+
securityhub.amazonaws.com
|
254
|
+
storage-lens.s3.amazonaws.com
|
255
|
+
|
256
|
+
Account: Network
|
257
|
+
Delegated Services:
|
258
|
+
ipam.amazonaws.com
|
259
|
+
|
260
|
+
Account: Identity
|
261
|
+
Delegated Services:
|
262
|
+
access-analyzer.amazonaws.com
|
263
|
+
sso.amazonaws.com
|
264
|
+
|
265
|
+
|
266
|
+
MULTI-ACCOUNT STRATEGY TASKS:
|
267
|
+
Review Account Email Addresses - Multi-Account Strategy - Review Account Email Addresses in AWS Organization
|
268
|
+
|
269
|
+
*********************************************************
|
270
|
+
LANDING ZONE
|
271
|
+
*********************************************************
|
272
|
+
|
273
|
+
AWS CONTROL TOWER
|
274
|
+
|
275
|
+
Control Tower home region: us-west-2
|
276
|
+
Control Tower status: ACTIVE
|
277
|
+
Control Tower Landing Zone version: 3.3
|
278
|
+
Latest available version: 3.3
|
279
|
+
Drift Status: IN_SYNC
|
280
|
+
|
281
|
+
LANDING ZONE TASKS:
|
282
|
+
|
283
|
+
*********************************************************
|
284
|
+
IDENTITY
|
285
|
+
*********************************************************
|
286
|
+
|
287
|
+
AWS IAM IDENTITY CENTER
|
288
|
+
|
289
|
+
IdC Region: us-west-2
|
290
|
+
IdC ARN: arn:aws:sso:::instance/ssoins-123456789abcdefg
|
291
|
+
IdC Instance Id: d-12345abcde
|
292
|
+
|
293
|
+
IDENTITY TASKS:
|
294
|
+
|
295
|
+
*********************************************************
|
296
|
+
SECURITY
|
297
|
+
*********************************************************
|
298
|
+
|
299
|
+
AWS SECURITY SERVICES ENABLED IN AWS ORGANIZATION:
|
300
|
+
|
301
|
+
AWS GuardDuty
|
302
|
+
AWS Security Hub
|
303
|
+
IAM Access Analyzer
|
304
|
+
Macie
|
305
|
+
Amazon S3 Storage Lens
|
306
|
+
Amazon Inspector
|
307
|
+
AWS CloudTrail
|
308
|
+
AWS Config
|
309
|
+
|
310
|
+
SECURITY TASKS:
|
311
|
+
Delegate administration of AWS Config - Security - Delegate administration to AWS Config
|
312
|
+
|
313
|
+
*********************************************************
|
314
|
+
NETWORK
|
315
|
+
*********************************************************
|
316
|
+
|
317
|
+
NETWORK TASKS:
|
318
|
+
|
319
|
+
*********************************************************
|
320
|
+
OBSERVABILITY
|
321
|
+
*********************************************************
|
322
|
+
|
323
|
+
OBSERVABILITY TASKS:
|
324
|
+
Delegate administration of AWS Account - Observability - Delegate administration to AWS Account
|
325
|
+
|
326
|
+
*********************************************************
|
327
|
+
BACKUP AND RECOVERY
|
328
|
+
*********************************************************
|
329
|
+
|
330
|
+
BACKUP AND RECOVERY TASKS:
|
331
|
+
Enable AWS Backup - Backup and Recovery - Enable AWS Backup in AWS Organization
|
332
|
+
Delegate administration of AWS Backup - Backup and Recovery - Delegate administration to AWS Backup
|
333
|
+
|
334
|
+
|
335
|
+
END REVIEW
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -0,0 +1,24 @@
|
|
1
|
+
"Summary", "Description", "Status"
|
2
|
+
"cfat - undefined - Delete VPC in ap-south-1", "Delete any unnecessary VPC in ap-south-1 to include the default VPC.", "Open"
|
3
|
+
"cfat - undefined - Delete VPC in eu-north-1", "Delete any unnecessary VPC in eu-north-1 to include the default VPC.", "Open"
|
4
|
+
"cfat - undefined - Delete VPC in eu-west-3", "Delete any unnecessary VPC in eu-west-3 to include the default VPC.", "Open"
|
5
|
+
"cfat - undefined - Delete VPC in eu-west-2", "Delete any unnecessary VPC in eu-west-2 to include the default VPC.", "Open"
|
6
|
+
"cfat - undefined - Delete VPC in eu-west-1", "Delete any unnecessary VPC in eu-west-1 to include the default VPC.", "Open"
|
7
|
+
"cfat - undefined - Delete VPC in ap-northeast-3", "Delete any unnecessary VPC in ap-northeast-3 to include the default VPC.", "Open"
|
8
|
+
"cfat - undefined - Delete VPC in ap-northeast-2", "Delete any unnecessary VPC in ap-northeast-2 to include the default VPC.", "Open"
|
9
|
+
"cfat - undefined - Delete VPC in ap-northeast-1", "Delete any unnecessary VPC in ap-northeast-1 to include the default VPC.", "Open"
|
10
|
+
"cfat - undefined - Delete VPC in ca-central-1", "Delete any unnecessary VPC in ca-central-1 to include the default VPC.", "Open"
|
11
|
+
"cfat - undefined - Delete VPC in sa-east-1", "Delete any unnecessary VPC in sa-east-1 to include the default VPC.", "Open"
|
12
|
+
"cfat - undefined - Delete VPC in ap-southeast-1", "Delete any unnecessary VPC in ap-southeast-1 to include the default VPC.", "Open"
|
13
|
+
"cfat - undefined - Delete VPC in ap-southeast-2", "Delete any unnecessary VPC in ap-southeast-2 to include the default VPC.", "Open"
|
14
|
+
"cfat - undefined - Delete VPC in eu-central-1", "Delete any unnecessary VPC in eu-central-1 to include the default VPC.", "Open"
|
15
|
+
"cfat - undefined - Delete VPC in us-east-1", "Delete any unnecessary VPC in us-east-1 to include the default VPC.", "Open"
|
16
|
+
"cfat - undefined - Delete VPC in us-east-2", "Delete any unnecessary VPC in us-east-2 to include the default VPC.", "Open"
|
17
|
+
"cfat - undefined - Delete VPC in us-west-1", "Delete any unnecessary VPC in us-west-1 to include the default VPC.", "Open"
|
18
|
+
"cfat - undefined - Delete VPC in us-west-2", "Delete any unnecessary VPC in us-west-2 to include the default VPC.", "Open"
|
19
|
+
"cfat - undefined - Setup legacy CUR", "Setup legacy CUR in AWS Organization", "Open"
|
20
|
+
"cfat - undefined - Review account email addresses", "Review Account Email Addresses in AWS Organization", "Open"
|
21
|
+
"cfat - undefined - Delegate administration of AWS Config", "Delegate administration to AWS Config", "Open"
|
22
|
+
"cfat - undefined - Delegate administration of AWS Account management", "Delegate administration to AWS Account contact management", "Open"
|
23
|
+
"cfat - undefined - Enable AWS Backup", "Enable AWS Backup in AWS Organization", "Open"
|
24
|
+
"cfat - undefined - Delegate administration of AWS Backup", "Delegate administration to AWS Backup", "Open"
|
Binary file
|
Binary file
|