runbooks 0.2.5__py3-none-any.whl → 0.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (249) hide show
  1. conftest.py +26 -0
  2. jupyter-agent/.env +2 -0
  3. jupyter-agent/.env.template +2 -0
  4. jupyter-agent/.gitattributes +35 -0
  5. jupyter-agent/.gradio/certificate.pem +31 -0
  6. jupyter-agent/README.md +16 -0
  7. jupyter-agent/__main__.log +8 -0
  8. jupyter-agent/app.py +256 -0
  9. jupyter-agent/cloudops-agent.png +0 -0
  10. jupyter-agent/ds-system-prompt.txt +154 -0
  11. jupyter-agent/jupyter-agent.png +0 -0
  12. jupyter-agent/llama3_template.jinja +123 -0
  13. jupyter-agent/requirements.txt +9 -0
  14. jupyter-agent/tmp/4ojbs8a02ir/jupyter-agent.ipynb +68 -0
  15. jupyter-agent/tmp/cm5iasgpm3p/jupyter-agent.ipynb +91 -0
  16. jupyter-agent/tmp/crqbsseag5/jupyter-agent.ipynb +91 -0
  17. jupyter-agent/tmp/hohanq1u097/jupyter-agent.ipynb +57 -0
  18. jupyter-agent/tmp/jns1sam29wm/jupyter-agent.ipynb +53 -0
  19. jupyter-agent/tmp/jupyter-agent.ipynb +27 -0
  20. jupyter-agent/utils.py +409 -0
  21. runbooks/__init__.py +71 -3
  22. runbooks/__main__.py +13 -0
  23. runbooks/aws/ec2_describe_instances.py +1 -1
  24. runbooks/aws/ec2_run_instances.py +8 -2
  25. runbooks/aws/ec2_start_stop_instances.py +17 -4
  26. runbooks/aws/ec2_unused_volumes.py +5 -1
  27. runbooks/aws/s3_create_bucket.py +4 -2
  28. runbooks/aws/s3_list_objects.py +6 -1
  29. runbooks/aws/tagging_lambda_handler.py +13 -2
  30. runbooks/aws/tags.json +12 -0
  31. runbooks/base.py +353 -0
  32. runbooks/cfat/README.md +49 -0
  33. runbooks/cfat/__init__.py +74 -0
  34. runbooks/cfat/app.ts +644 -0
  35. runbooks/cfat/assessment/__init__.py +40 -0
  36. runbooks/cfat/assessment/asana-import.csv +39 -0
  37. runbooks/cfat/assessment/cfat-checks.csv +31 -0
  38. runbooks/cfat/assessment/cfat.txt +520 -0
  39. runbooks/cfat/assessment/collectors.py +200 -0
  40. runbooks/cfat/assessment/jira-import.csv +39 -0
  41. runbooks/cfat/assessment/runner.py +387 -0
  42. runbooks/cfat/assessment/validators.py +290 -0
  43. runbooks/cfat/cli.py +103 -0
  44. runbooks/cfat/docs/asana-import.csv +24 -0
  45. runbooks/cfat/docs/cfat-checks.csv +31 -0
  46. runbooks/cfat/docs/cfat.txt +335 -0
  47. runbooks/cfat/docs/checks-output.png +0 -0
  48. runbooks/cfat/docs/cloudshell-console-run.png +0 -0
  49. runbooks/cfat/docs/cloudshell-download.png +0 -0
  50. runbooks/cfat/docs/cloudshell-output.png +0 -0
  51. runbooks/cfat/docs/downloadfile.png +0 -0
  52. runbooks/cfat/docs/jira-import.csv +24 -0
  53. runbooks/cfat/docs/open-cloudshell.png +0 -0
  54. runbooks/cfat/docs/report-header.png +0 -0
  55. runbooks/cfat/models.py +1026 -0
  56. runbooks/cfat/package-lock.json +5116 -0
  57. runbooks/cfat/package.json +38 -0
  58. runbooks/cfat/report.py +496 -0
  59. runbooks/cfat/reporting/__init__.py +46 -0
  60. runbooks/cfat/reporting/exporters.py +337 -0
  61. runbooks/cfat/reporting/formatters.py +496 -0
  62. runbooks/cfat/reporting/templates.py +135 -0
  63. runbooks/cfat/run-assessment.sh +23 -0
  64. runbooks/cfat/runner.py +69 -0
  65. runbooks/cfat/src/actions/check-cloudtrail-existence.ts +43 -0
  66. runbooks/cfat/src/actions/check-config-existence.ts +37 -0
  67. runbooks/cfat/src/actions/check-control-tower.ts +37 -0
  68. runbooks/cfat/src/actions/check-ec2-existence.ts +46 -0
  69. runbooks/cfat/src/actions/check-iam-users.ts +50 -0
  70. runbooks/cfat/src/actions/check-legacy-cur.ts +30 -0
  71. runbooks/cfat/src/actions/check-org-cloudformation.ts +30 -0
  72. runbooks/cfat/src/actions/check-vpc-existence.ts +43 -0
  73. runbooks/cfat/src/actions/create-asanaimport.ts +14 -0
  74. runbooks/cfat/src/actions/create-backlog.ts +372 -0
  75. runbooks/cfat/src/actions/create-jiraimport.ts +15 -0
  76. runbooks/cfat/src/actions/create-report.ts +616 -0
  77. runbooks/cfat/src/actions/define-account-type.ts +51 -0
  78. runbooks/cfat/src/actions/get-enabled-org-policy-types.ts +40 -0
  79. runbooks/cfat/src/actions/get-enabled-org-services.ts +26 -0
  80. runbooks/cfat/src/actions/get-idc-info.ts +34 -0
  81. runbooks/cfat/src/actions/get-org-da-accounts.ts +34 -0
  82. runbooks/cfat/src/actions/get-org-details.ts +35 -0
  83. runbooks/cfat/src/actions/get-org-member-accounts.ts +44 -0
  84. runbooks/cfat/src/actions/get-org-ous.ts +35 -0
  85. runbooks/cfat/src/actions/get-regions.ts +22 -0
  86. runbooks/cfat/src/actions/zip-assessment.ts +27 -0
  87. runbooks/cfat/src/types/index.d.ts +147 -0
  88. runbooks/cfat/tests/__init__.py +141 -0
  89. runbooks/cfat/tests/test_cli.py +340 -0
  90. runbooks/cfat/tests/test_integration.py +290 -0
  91. runbooks/cfat/tests/test_models.py +505 -0
  92. runbooks/cfat/tests/test_reporting.py +354 -0
  93. runbooks/cfat/tsconfig.json +16 -0
  94. runbooks/cfat/webpack.config.cjs +27 -0
  95. runbooks/config.py +260 -0
  96. runbooks/finops/README.md +337 -0
  97. runbooks/finops/__init__.py +86 -0
  98. runbooks/finops/aws_client.py +245 -0
  99. runbooks/finops/cli.py +151 -0
  100. runbooks/finops/cost_processor.py +410 -0
  101. runbooks/finops/dashboard_runner.py +448 -0
  102. runbooks/finops/helpers.py +355 -0
  103. runbooks/finops/main.py +14 -0
  104. runbooks/finops/profile_processor.py +174 -0
  105. runbooks/finops/types.py +66 -0
  106. runbooks/finops/visualisations.py +80 -0
  107. runbooks/inventory/.gitignore +354 -0
  108. runbooks/inventory/ArgumentsClass.py +261 -0
  109. runbooks/inventory/FAILED_SCRIPTS_TROUBLESHOOTING.md +619 -0
  110. runbooks/inventory/Inventory_Modules.py +6130 -0
  111. runbooks/inventory/LandingZone/delete_lz.py +1075 -0
  112. runbooks/inventory/PASSED_SCRIPTS_GUIDE.md +738 -0
  113. runbooks/inventory/README.md +1320 -0
  114. runbooks/inventory/__init__.py +62 -0
  115. runbooks/inventory/account_class.py +532 -0
  116. runbooks/inventory/all_my_instances_wrapper.py +123 -0
  117. runbooks/inventory/aws_decorators.py +201 -0
  118. runbooks/inventory/aws_organization.png +0 -0
  119. runbooks/inventory/cfn_move_stack_instances.py +1526 -0
  120. runbooks/inventory/check_cloudtrail_compliance.py +614 -0
  121. runbooks/inventory/check_controltower_readiness.py +1107 -0
  122. runbooks/inventory/check_landingzone_readiness.py +711 -0
  123. runbooks/inventory/cloudtrail.md +727 -0
  124. runbooks/inventory/collectors/__init__.py +20 -0
  125. runbooks/inventory/collectors/aws_compute.py +518 -0
  126. runbooks/inventory/collectors/aws_networking.py +275 -0
  127. runbooks/inventory/collectors/base.py +222 -0
  128. runbooks/inventory/core/__init__.py +19 -0
  129. runbooks/inventory/core/collector.py +303 -0
  130. runbooks/inventory/core/formatter.py +296 -0
  131. runbooks/inventory/delete_s3_buckets_objects.py +169 -0
  132. runbooks/inventory/discovery.md +81 -0
  133. runbooks/inventory/draw_org_structure.py +748 -0
  134. runbooks/inventory/ec2_vpc_utils.py +341 -0
  135. runbooks/inventory/find_cfn_drift_detection.py +272 -0
  136. runbooks/inventory/find_cfn_orphaned_stacks.py +719 -0
  137. runbooks/inventory/find_cfn_stackset_drift.py +733 -0
  138. runbooks/inventory/find_ec2_security_groups.py +669 -0
  139. runbooks/inventory/find_landingzone_versions.py +201 -0
  140. runbooks/inventory/find_vpc_flow_logs.py +1221 -0
  141. runbooks/inventory/inventory.sh +659 -0
  142. runbooks/inventory/list_cfn_stacks.py +558 -0
  143. runbooks/inventory/list_cfn_stackset_operation_results.py +252 -0
  144. runbooks/inventory/list_cfn_stackset_operations.py +734 -0
  145. runbooks/inventory/list_cfn_stacksets.py +453 -0
  146. runbooks/inventory/list_config_recorders_delivery_channels.py +681 -0
  147. runbooks/inventory/list_ds_directories.py +354 -0
  148. runbooks/inventory/list_ec2_availability_zones.py +286 -0
  149. runbooks/inventory/list_ec2_ebs_volumes.py +244 -0
  150. runbooks/inventory/list_ec2_instances.py +425 -0
  151. runbooks/inventory/list_ecs_clusters_and_tasks.py +562 -0
  152. runbooks/inventory/list_elbs_load_balancers.py +411 -0
  153. runbooks/inventory/list_enis_network_interfaces.py +526 -0
  154. runbooks/inventory/list_guardduty_detectors.py +568 -0
  155. runbooks/inventory/list_iam_policies.py +404 -0
  156. runbooks/inventory/list_iam_roles.py +518 -0
  157. runbooks/inventory/list_iam_saml_providers.py +359 -0
  158. runbooks/inventory/list_lambda_functions.py +882 -0
  159. runbooks/inventory/list_org_accounts.py +446 -0
  160. runbooks/inventory/list_org_accounts_users.py +354 -0
  161. runbooks/inventory/list_rds_db_instances.py +406 -0
  162. runbooks/inventory/list_route53_hosted_zones.py +318 -0
  163. runbooks/inventory/list_servicecatalog_provisioned_products.py +575 -0
  164. runbooks/inventory/list_sns_topics.py +360 -0
  165. runbooks/inventory/list_ssm_parameters.py +402 -0
  166. runbooks/inventory/list_vpc_subnets.py +433 -0
  167. runbooks/inventory/list_vpcs.py +422 -0
  168. runbooks/inventory/lockdown_cfn_stackset_role.py +224 -0
  169. runbooks/inventory/models/__init__.py +24 -0
  170. runbooks/inventory/models/account.py +192 -0
  171. runbooks/inventory/models/inventory.py +309 -0
  172. runbooks/inventory/models/resource.py +247 -0
  173. runbooks/inventory/recover_cfn_stack_ids.py +205 -0
  174. runbooks/inventory/requirements.txt +12 -0
  175. runbooks/inventory/run_on_multi_accounts.py +211 -0
  176. runbooks/inventory/tests/common_test_data.py +3661 -0
  177. runbooks/inventory/tests/common_test_functions.py +204 -0
  178. runbooks/inventory/tests/setup.py +24 -0
  179. runbooks/inventory/tests/src.py +18 -0
  180. runbooks/inventory/tests/test_cfn_describe_stacks.py +208 -0
  181. runbooks/inventory/tests/test_ec2_describe_instances.py +162 -0
  182. runbooks/inventory/tests/test_inventory_modules.py +55 -0
  183. runbooks/inventory/tests/test_lambda_list_functions.py +86 -0
  184. runbooks/inventory/tests/test_moto_integration_example.py +273 -0
  185. runbooks/inventory/tests/test_org_list_accounts.py +49 -0
  186. runbooks/inventory/update_aws_actions.py +173 -0
  187. runbooks/inventory/update_cfn_stacksets.py +1215 -0
  188. runbooks/inventory/update_cloudwatch_logs_retention_policy.py +294 -0
  189. runbooks/inventory/update_iam_roles_cross_accounts.py +478 -0
  190. runbooks/inventory/update_s3_public_access_block.py +539 -0
  191. runbooks/inventory/utils/__init__.py +23 -0
  192. runbooks/inventory/utils/aws_helpers.py +510 -0
  193. runbooks/inventory/utils/threading_utils.py +493 -0
  194. runbooks/inventory/utils/validation.py +682 -0
  195. runbooks/inventory/verify_ec2_security_groups.py +1430 -0
  196. runbooks/main.py +1004 -0
  197. runbooks/organizations/__init__.py +12 -0
  198. runbooks/organizations/manager.py +374 -0
  199. runbooks/security/README.md +447 -0
  200. runbooks/security/__init__.py +71 -0
  201. runbooks/{security_baseline → security}/checklist/alternate_contacts.py +8 -1
  202. runbooks/{security_baseline → security}/checklist/bucket_public_access.py +4 -1
  203. runbooks/{security_baseline → security}/checklist/cloudwatch_alarm_configuration.py +9 -2
  204. runbooks/{security_baseline → security}/checklist/guardduty_enabled.py +9 -2
  205. runbooks/{security_baseline → security}/checklist/multi_region_instance_usage.py +5 -1
  206. runbooks/{security_baseline → security}/checklist/root_access_key.py +6 -1
  207. runbooks/{security_baseline → security}/config-origin.json +1 -1
  208. runbooks/{security_baseline → security}/config.json +1 -1
  209. runbooks/{security_baseline → security}/permission.json +1 -1
  210. runbooks/{security_baseline → security}/report_generator.py +10 -2
  211. runbooks/{security_baseline → security}/report_template_en.html +7 -7
  212. runbooks/{security_baseline → security}/report_template_jp.html +7 -7
  213. runbooks/{security_baseline → security}/report_template_kr.html +12 -12
  214. runbooks/{security_baseline → security}/report_template_vn.html +7 -7
  215. runbooks/{security_baseline → security}/run_script.py +8 -2
  216. runbooks/{security_baseline → security}/security_baseline_tester.py +12 -4
  217. runbooks/{security_baseline → security}/utils/common.py +5 -1
  218. runbooks/utils/__init__.py +204 -0
  219. runbooks-0.7.0.dist-info/METADATA +375 -0
  220. runbooks-0.7.0.dist-info/RECORD +249 -0
  221. {runbooks-0.2.5.dist-info → runbooks-0.7.0.dist-info}/WHEEL +1 -1
  222. runbooks-0.7.0.dist-info/entry_points.txt +7 -0
  223. runbooks-0.7.0.dist-info/licenses/LICENSE +201 -0
  224. runbooks-0.7.0.dist-info/top_level.txt +3 -0
  225. runbooks/python101/calculator.py +0 -34
  226. runbooks/python101/config.py +0 -1
  227. runbooks/python101/exceptions.py +0 -16
  228. runbooks/python101/file_manager.py +0 -218
  229. runbooks/python101/toolkit.py +0 -153
  230. runbooks-0.2.5.dist-info/METADATA +0 -439
  231. runbooks-0.2.5.dist-info/RECORD +0 -61
  232. runbooks-0.2.5.dist-info/entry_points.txt +0 -3
  233. runbooks-0.2.5.dist-info/top_level.txt +0 -1
  234. /runbooks/{security_baseline/__init__.py → inventory/tests/script_test_data.py} +0 -0
  235. /runbooks/{security_baseline → security}/checklist/__init__.py +0 -0
  236. /runbooks/{security_baseline → security}/checklist/account_level_bucket_public_access.py +0 -0
  237. /runbooks/{security_baseline → security}/checklist/direct_attached_policy.py +0 -0
  238. /runbooks/{security_baseline → security}/checklist/iam_password_policy.py +0 -0
  239. /runbooks/{security_baseline → security}/checklist/iam_user_mfa.py +0 -0
  240. /runbooks/{security_baseline → security}/checklist/multi_region_trail.py +0 -0
  241. /runbooks/{security_baseline → security}/checklist/root_mfa.py +0 -0
  242. /runbooks/{security_baseline → security}/checklist/root_usage.py +0 -0
  243. /runbooks/{security_baseline → security}/checklist/trail_enabled.py +0 -0
  244. /runbooks/{security_baseline → security}/checklist/trusted_advisor.py +0 -0
  245. /runbooks/{security_baseline → security}/utils/__init__.py +0 -0
  246. /runbooks/{security_baseline → security}/utils/enums.py +0 -0
  247. /runbooks/{security_baseline → security}/utils/language.py +0 -0
  248. /runbooks/{security_baseline → security}/utils/level_const.py +0 -0
  249. /runbooks/{security_baseline → security}/utils/permission_list.py +0 -0
@@ -0,0 +1,39 @@
1
+ "Task", "Description", "Status"
2
+ "cfat - Remove IAM user firdosh.homavazir@vectormetering.com", "Review and determine if IAM user firdosh.homavazir@vectormetering.com can be deleted. - Remediation Link: ", "Not Started"
3
+ "cfat - Remove IAM user firdosh.homavazir@vectormetering.com API key AKIA5HLFQ5445SLUCJ4H ", "Review and determine if IAM user API key AKIA5HLFQ5445SLUCJ4H for firdosh.homavazir@vectormetering.com can be removed. - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting", "Not Started"
4
+ "cfat - Remove IAM user firdosh.homavazir@vectormetering.com", "Review and determine if IAM user firdosh.homavazir@vectormetering.com can be deleted. - Remediation Link: ", "Not Started"
5
+ "cfat - Remove IAM user firdosh.homavazir@vectormetering.com API key AKIA5HLFQ544W5ZJXRUA ", "Review and determine if IAM user API key AKIA5HLFQ544W5ZJXRUA for firdosh.homavazir@vectormetering.com can be removed. - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting", "Not Started"
6
+ "cfat - Delete VPC in ap-south-1", "Delete any unnecessary VPC in ap-south-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
7
+ "cfat - Delete VPC in eu-north-1", "Delete any unnecessary VPC in eu-north-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
8
+ "cfat - Delete VPC in eu-west-3", "Delete any unnecessary VPC in eu-west-3 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
9
+ "cfat - Delete VPC in eu-west-2", "Delete any unnecessary VPC in eu-west-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
10
+ "cfat - Delete VPC in eu-west-1", "Delete any unnecessary VPC in eu-west-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
11
+ "cfat - Delete VPC in ap-northeast-3", "Delete any unnecessary VPC in ap-northeast-3 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
12
+ "cfat - Delete VPC in ap-northeast-2", "Delete any unnecessary VPC in ap-northeast-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
13
+ "cfat - Delete VPC in ap-northeast-1", "Delete any unnecessary VPC in ap-northeast-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
14
+ "cfat - Delete VPC in ca-central-1", "Delete any unnecessary VPC in ca-central-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
15
+ "cfat - Delete VPC in sa-east-1", "Delete any unnecessary VPC in sa-east-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
16
+ "cfat - Delete VPC in ap-southeast-1", "Delete any unnecessary VPC in ap-southeast-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
17
+ "cfat - Delete VPC in ap-southeast-2", "Delete any unnecessary VPC in ap-southeast-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
18
+ "cfat - Delete VPC in eu-central-1", "Delete any unnecessary VPC in eu-central-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
19
+ "cfat - Delete VPC in us-east-1", "Delete any unnecessary VPC in us-east-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
20
+ "cfat - Delete VPC in us-east-2", "Delete any unnecessary VPC in us-east-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
21
+ "cfat - Delete VPC in us-west-1", "Delete any unnecessary VPC in us-west-1 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
22
+ "cfat - Delete VPC in us-west-2", "Delete any unnecessary VPC in us-west-2 to include the default VPC. - Remediation Link: https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md", "Not Started"
23
+ "cfat - Review account email addresses", "Review Account Email Addresses in AWS Organization - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/root-user-best-practices.html#ru-bp-group", "Not Started"
24
+ "cfat - Deploy Transitional OU", "Deploy Transitional OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/transitional-ou.html", "Not Started"
25
+ "cfat - Deploy Suspended OU", "Deploy Suspended OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/suspended-ou.html", "Not Started"
26
+ "cfat - Deploy Workloads OU", "Deploy Workloads OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/workloads-ou.html", "Not Started"
27
+ "cfat - Deploy Security OU", "Deploy Security OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/security-ou-and-accounts.html", "Not Started"
28
+ "cfat - Deploy Infrastructure OU", "Deploy Infrastructure OU in AWS Organization - Remediation Link: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/infrastructure-ou-and-accounts.html", "Not Started"
29
+ "cfat - Deploy AWS Control Tower", "Deploy AWS Control Tower in AWS Organization - Remediation Link: https://catalog.workshops.aws/control-tower/en-US/prerequisites/deploying", "Not Started"
30
+ "cfat - Delegate administration of Amazon S3 Storage Lens", "Delegate administration to Amazon S3 Storage Lens - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-s3lens.html#integrate-enable-da-s3lens", "Not Started"
31
+ "cfat - Delegate administration to AWS IAM Identity Center", "Delegate administration to AWS IAM Identity Center - Remediation Link: https://docs.aws.amazon.com/singlesignon/latest/userguide/delegated-admin.html", "Not Started"
32
+ "cfat - Delegate administration to AWS IAM Access Analyzer", "Delegate administration to AWS IAM Access Analyzer - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#access-analyzer-enabling", "Not Started"
33
+ "cfat - Delegate administration of AWS IAM Access Analyzer", "Delegate administration to AWS IAM Access Analyzer - Remediation Link: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-settings.html", "Not Started"
34
+ "cfat - Enable AWS GuardDuty", "Enable AWS GuardDuty in AWS Organization - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-guardduty.html#integrate-enable-ta-guardduty", "Not Started"
35
+ "cfat - Delegate administration of AWS GuardDuty", "Delegate administration to AWS GuardDuty - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-guardduty.html", "Not Started"
36
+ "cfat - Enable AWS IPAM", "Enable AWS IPAM in AWS Organization - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ipam.html", "Not Started"
37
+ "cfat - Delegate administration of AWS IPAM", "Delegate administration to AWS IPAM - Remediation Link: https://docs.aws.amazon.com/vpc/latest/ipam/enable-integ-ipam.html", "Not Started"
38
+ "cfat - Delegate administration of AWS Account management", "Delegate administration to AWS Account contact management - Remediation Link: https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-account.html#integrate-enable-da-account", "Not Started"
39
+ "cfat - Delegate administration of AWS Backup", "Delegate administration to AWS Backup - Remediation Link: https://docs.aws.amazon.com/aws-backup/latest/devguide/manage-cross-account.html#backup-delegatedadmin", "Not Started"
@@ -0,0 +1,31 @@
1
+ check,description,status,required,weight,loe,remediationLink
2
+ "AWS Organization created","AWS Organization is enabled.","complete",true,6,1,"https://aws.amazon.com/organizations/getting-started/"
3
+ "Management Account created","AWS Management account exists.","complete",true,6,1,"https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-creating.html"
4
+ "Management Account IAM users removed","IAM Users should not exist in Management Account.","incomplete",false,4,1,"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting"
5
+ "Management Account EC2 instances removed","EC2 Instances should not exist in Management Account.","incomplete",false,4,1,"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html"
6
+ "Management Account VPCs removed","Management Account should not have any VPCs.","incomplete",false,4,1,"https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md"
7
+ "CloudTrail Trail created","CloudTrail should be enabled within the account.","complete",true,6,3,"https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html"
8
+ "CloudTrail Organization Service enabled","CloudTrail should be enabled on the Organization.","complete",true,6,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudtrail.html"
9
+ "CloudTrail Org Trail deployed","At least one CloudTrail Organization Trail should be enabled.","complete",true,6,1,"https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html"
10
+ "Config Recorder in Management Account configured","Config Recorder in the Management Account should be enabled.","complete",true,6,2,"https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/"
11
+ "Config Delivery Channel in Management Account configured","Config Delivery Channel in Management Account should be enabled.","complete",true,6,2,"https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/"
12
+ "CloudFormation StackSets activated","CloudFormation StackSets should be activated in the CloudFormation console.","incomplete",false,5,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudformation.html#integrate-enable-ta-cloudformation"
13
+ "GuardDuty Organization service enabled","GuardDuty Organization services should be enabled.","incomplete",false,4,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-guardduty.html#integrate-enable-ta-guardduty"
14
+ "RAM Organization service enabled","Resource Access Manager (RAM) trusted access should be enabled in the AWS Organization.","complete",false,4,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ram.html#integrate-enable-ta-ram"
15
+ "Security Hub Organization service enabled","Security Hub trusted access should be enabled in the AWS Organization.","complete",false,4,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-securityhub.html#integrate-enable-ta-securityhub"
16
+ "IAM Access Analyzer Organization service enabled","IAM Access Analyzer trusted access should be enabled in the AWS Organization.","incomplete",false,4,1,"https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#access-analyzer-enabling"
17
+ "Config Organization service enabled","AWS Config trusted access should be enabled in the AWS Organization.","complete",false,4,1,"https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-config.html#integrate-enable-ta-config"
18
+ "CloudFormation Organization service enabled","CloudFormation trusted access should be enabled in the AWS Organization.","complete",false,5,1,"https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html"
19
+ "Top-level Infrastructure OU deployed","Top-level Infrastructure OU should exist.","incomplete",false,5,2,"https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou"
20
+ "Top-level Security OU deployed","Top-level Security OU should exist.","incomplete",true,6,2,"https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou"
21
+ "Top-level Workloads OU deployed","Top-level Workloads OU should exist.","incomplete",false,5,2,"https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou"
22
+ "IAM IdC Organization service enabled","IAM Identity Center trusted access should be enabled in the AWS Organization","complete",true,6,1,"https://docs.aws.amazon.com/singlesignon/latest/userguide/get-set-up-for-idc.html"
23
+ "IAM IdC configured","IAM Identity Center should be configured.","complete",true,6,3,"https://docs.aws.amazon.com/singlesignon/latest/userguide/tutorials.html"
24
+ "Service Control Policies enabled","Service Control Policy should be enabled within the AWS Organization.","complete",true,6,1,"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html"
25
+ "Organization Tag Policy enabled","Tag Policy should be enabled within the AWS Organization.","complete",true,6,1,"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html"
26
+ "Organization Backup Policy enabled","Backup Policy should be enabled within the AWS Organization.","complete",false,5,1,"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html"
27
+ "Control Tower deployed","Control Tower should be deployed.","incomplete",true,6,6,"https://catalog.workshops.aws/control-tower/en-US/prerequisites/deploying"
28
+ "Control Tower latest version","Control Tower should be the latest version.","complete",false,5,2,"https://docs.aws.amazon.com/controltower/latest/userguide/update-controltower.html"
29
+ "Control Tower not drifted","Control Tower should not be drifted.","complete",true,6,2,"https://docs.aws.amazon.com/controltower/latest/userguide/resolve-drift.html"
30
+ "Log Archive account deployed","Log Archive account should exist.","incomplete",true,6,2,"https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html"
31
+ "Audit account deployed","Audit/Security Tooling account should exist.","incomplete",true,6,2,"https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html"
@@ -0,0 +1,520 @@
1
+ Cloud Foundation Assessment Tool
2
+ Generated on: Tue, 22 Apr 2025 04:41:25 GMT
3
+
4
+
5
+ Incomplete Requirements:
6
+ INCOMPLETE: Top-level Security OU deployed
7
+ INCOMPLETE: Control Tower deployed
8
+ INCOMPLETE: Log Archive account deployed
9
+ INCOMPLETE: Audit account deployed
10
+
11
+ ====================================
12
+
13
+ Foundation Status: INCOMPLETE
14
+ Estimate of Required Level of Effort (LOE): 12 hours
15
+ CFAT Score: 99 out of 158
16
+
17
+ ====================================
18
+
19
+ Foundation Checks:
20
+ ┌─────────┬────────────────────────────────────────────────────────────┬───────────────────────────────────────────────────────────────────────────────────────────┬──────────────┬──────────┬────────┬─────┬─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┐
21
+ │ (index) │ check │ description │ status │ required │ weight │ loe │ remediationLink │
22
+ ├─────────┼────────────────────────────────────────────────────────────┼───────────────────────────────────────────────────────────────────────────────────────────┼──────────────┼──────────┼────────┼─────┼─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤
23
+ │ 0 │ 'AWS Organization created' │ 'AWS Organization is enabled.' │ 'complete' │ true │ 6 │ 1 │ 'https://aws.amazon.com/organizations/getting-started/' │
24
+ │ 1 │ 'Management Account created' │ 'AWS Management account exists.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-creating.html' │
25
+ │ 2 │ 'Management Account IAM users removed' │ 'IAM Users should not exist in Management Account.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_manage.html#id_users_deleting' │
26
+ │ 3 │ 'Management Account EC2 instances removed' │ 'EC2 Instances should not exist in Management Account.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html' │
27
+ │ 4 │ 'Management Account VPCs removed' │ 'Management Account should not have any VPCs.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://github.com/cloud-foundations-on-aws/cloud-foundations-templates/blob/main/network/network-default-vpc-deletion/README.md' │
28
+ │ 5 │ 'CloudTrail Trail created' │ 'CloudTrail should be enabled within the account.' │ 'complete' │ true │ 6 │ 3 │ 'https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html' │
29
+ │ 6 │ 'CloudTrail Organization Service enabled' │ 'CloudTrail should be enabled on the Organization.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudtrail.html' │
30
+ │ 7 │ 'CloudTrail Org Trail deployed' │ 'At least one CloudTrail Organization Trail should be enabled.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html' │
31
+ │ 8 │ 'Config Recorder in Management Account configured' │ 'Config Recorder in the Management Account should be enabled.' │ 'complete' │ true │ 6 │ 2 │ 'https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/' │
32
+ │ 9 │ 'Config Delivery Channel in Management Account configured' │ 'Config Delivery Channel in Management Account should be enabled.' │ 'complete' │ true │ 6 │ 2 │ 'https://aws.amazon.com/blogs/mt/managing-aws-organizations-accounts-using-aws-config-and-aws-cloudformation-stacksets/' │
33
+ │ 10 │ 'CloudFormation StackSets activated' │ 'CloudFormation StackSets should be activated in the CloudFormation console.' │ 'incomplete' │ false │ 5 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-cloudformation.html#integrate-enable-ta-cloudformation' │
34
+ │ 11 │ 'GuardDuty Organization service enabled' │ 'GuardDuty Organization services should be enabled.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-guardduty.html#integrate-enable-ta-guardduty' │
35
+ │ 12 │ 'RAM Organization service enabled' │ 'Resource Access Manager (RAM) trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-ram.html#integrate-enable-ta-ram' │
36
+ │ 13 │ 'Security Hub Organization service enabled' │ 'Security Hub trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-securityhub.html#integrate-enable-ta-securityhub' │
37
+ │ 14 │ 'IAM Access Analyzer Organization service enabled' │ 'IAM Access Analyzer trusted access should be enabled in the AWS Organization.' │ 'incomplete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#access-analyzer-enabling' │
38
+ │ 15 │ 'Config Organization service enabled' │ 'AWS Config trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 4 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/services-that-can-integrate-config.html#integrate-enable-ta-config' │
39
+ │ 16 │ 'CloudFormation Organization service enabled' │ 'CloudFormation trusted access should be enabled in the AWS Organization.' │ 'complete' │ false │ 5 │ 1 │ 'https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html' │
40
+ │ 17 │ 'Top-level Infrastructure OU deployed' │ 'Top-level Infrastructure OU should exist.' │ 'incomplete' │ false │ 5 │ 2 │ 'https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou' │
41
+ │ 18 │ 'Top-level Security OU deployed' │ 'Top-level Security OU should exist.' │ 'incomplete' │ true │ 6 │ 2 │ 'https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou' │
42
+ │ 19 │ 'Top-level Workloads OU deployed' │ 'Top-level Workloads OU should exist.' │ 'incomplete' │ false │ 5 │ 2 │ 'https://catalog.workshops.aws/control-tower/en-US/introduction/manage-ou' │
43
+ │ 20 │ 'IAM IdC Organization service enabled' │ 'IAM Identity Center trusted access should be enabled in the AWS Organization' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/singlesignon/latest/userguide/get-set-up-for-idc.html' │
44
+ │ 21 │ 'IAM IdC configured' │ 'IAM Identity Center should be configured.' │ 'complete' │ true │ 6 │ 3 │ 'https://docs.aws.amazon.com/singlesignon/latest/userguide/tutorials.html' │
45
+ │ 22 │ 'Service Control Policies enabled' │ 'Service Control Policy should be enabled within the AWS Organization.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html' │
46
+ │ 23 │ 'Organization Tag Policy enabled' │ 'Tag Policy should be enabled within the AWS Organization.' │ 'complete' │ true │ 6 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html' │
47
+ │ 24 │ 'Organization Backup Policy enabled' │ 'Backup Policy should be enabled within the AWS Organization.' │ 'complete' │ false │ 5 │ 1 │ 'https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_enable-disable.html' │
48
+ │ 25 │ 'Control Tower deployed' │ 'Control Tower should be deployed.' │ 'incomplete' │ true │ 6 │ 6 │ 'https://catalog.workshops.aws/control-tower/en-US/prerequisites/deploying' │
49
+ │ 26 │ 'Control Tower latest version' │ 'Control Tower should be the latest version.' │ 'complete' │ false │ 5 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/update-controltower.html' │
50
+ │ 27 │ 'Control Tower not drifted' │ 'Control Tower should not be drifted.' │ 'complete' │ true │ 6 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/resolve-drift.html' │
51
+ │ 28 │ 'Log Archive account deployed' │ 'Log Archive account should exist.' │ 'incomplete' │ true │ 6 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html' │
52
+ │ 29 │ 'Audit account deployed' │ 'Audit/Security Tooling account should exist.' │ 'incomplete' │ true │ 6 │ 2 │ 'https://docs.aws.amazon.com/controltower/latest/userguide/getting-started-from-console.html' │
53
+ └─────────┴────────────────────────────────────────────────────────────┴───────────────────────────────────────────────────────────────────────────────────────────┴──────────────┴──────────┴────────┴─────┴─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┘
54
+
55
+
56
+ Start Detailed Report:
57
+
58
+
59
+ *********************************************************
60
+ MANAGEMENT ACCOUNT
61
+ *********************************************************
62
+
63
+ AWS ACCOUNT TYPE
64
+
65
+ Is in AWS Organization: true
66
+ Assessing AWS Management Account: true
67
+
68
+ IAM USERS CHECK
69
+
70
+ IAM User: firdosh.homavazir@vectormetering.com
71
+ User API Key ID: AKIA5HLFQ5445SLUCJ4H
72
+
73
+ IAM User: firdosh.homavazir@vectormetering.com
74
+ User API Key ID: AKIA5HLFQ544W5ZJXRUA
75
+
76
+
77
+ EC2 INSTANCE CHECK
78
+
79
+ No EC2 instances found.
80
+
81
+ VPC CHECK
82
+
83
+ ap-south-1 - found VPC(s).
84
+ eu-north-1 - found VPC(s).
85
+ eu-west-3 - found VPC(s).
86
+ eu-west-2 - found VPC(s).
87
+ eu-west-1 - found VPC(s).
88
+ ap-northeast-3 - found VPC(s).
89
+ ap-northeast-2 - found VPC(s).
90
+ ap-northeast-1 - found VPC(s).
91
+ ca-central-1 - found VPC(s).
92
+ sa-east-1 - found VPC(s).
93
+ ap-southeast-1 - found VPC(s).
94
+ ap-southeast-2 - found VPC(s).
95
+ eu-central-1 - found VPC(s).
96
+ us-east-1 - found VPC(s).
97
+ us-east-2 - found VPC(s).
98
+ us-west-1 - found VPC(s).
99
+ us-west-2 - found VPC(s).
100
+
101
+ AWS CONFIG CHECK
102
+
103
+ ap-south-1 - Config Recorder found
104
+ ap-south-1 - Config Delivery Channel found
105
+ eu-north-1 - Config Recorder found
106
+ eu-north-1 - Config Delivery Channel found
107
+ eu-west-3 - Config Recorder found
108
+ eu-west-3 - Config Delivery Channel found
109
+ eu-west-2 - Config Recorder found
110
+ eu-west-2 - Config Delivery Channel found
111
+ eu-west-1 - Config Recorder found
112
+ eu-west-1 - Config Delivery Channel found
113
+ ap-northeast-3 - Config Recorder found
114
+ ap-northeast-3 - Config Delivery Channel found
115
+ ap-northeast-2 - Config Recorder found
116
+ ap-northeast-2 - Config Delivery Channel found
117
+ ap-northeast-1 - Config Recorder found
118
+ ap-northeast-1 - Config Delivery Channel found
119
+ ca-central-1 - Config Recorder found
120
+ ca-central-1 - Config Delivery Channel found
121
+ sa-east-1 - Config Recorder found
122
+ sa-east-1 - Config Delivery Channel found
123
+ ap-southeast-1 - Config Recorder found
124
+ ap-southeast-1 - Config Delivery Channel found
125
+ ap-southeast-2 - Config Recorder found
126
+ ap-southeast-2 - Config Delivery Channel found
127
+ eu-central-1 - Config Recorder found
128
+ eu-central-1 - Config Delivery Channel found
129
+ us-east-1 - Config Recorder found
130
+ us-east-1 - Config Delivery Channel found
131
+ us-east-2 - Config Recorder found
132
+ us-east-2 - Config Delivery Channel found
133
+ us-west-1 - Config Recorder found
134
+ us-west-1 - Config Delivery Channel found
135
+ us-west-2 - Config Recorder found
136
+ us-west-2 - Config Delivery Channel found
137
+
138
+ MANAGEMENT ACCOUNT TASKS:
139
+ Remove IAM user firdosh.homavazir@vectormetering.com - Management Account - Review and determine if IAM user firdosh.homavazir@vectormetering.com can be deleted.
140
+ Remove IAM user firdosh.homavazir@vectormetering.com API key AKIA5HLFQ5445SLUCJ4H - Management Account - Review and determine if IAM user API key AKIA5HLFQ5445SLUCJ4H for firdosh.homavazir@vectormetering.com can be removed.
141
+ Remove IAM user firdosh.homavazir@vectormetering.com - Management Account - Review and determine if IAM user firdosh.homavazir@vectormetering.com can be deleted.
142
+ Remove IAM user firdosh.homavazir@vectormetering.com API key AKIA5HLFQ544W5ZJXRUA - Management Account - Review and determine if IAM user API key AKIA5HLFQ544W5ZJXRUA for firdosh.homavazir@vectormetering.com can be removed.
143
+ Delete VPC in ap-south-1 - Management Account - Delete any unnecessary VPC in ap-south-1 to include the default VPC.
144
+ Delete VPC in eu-north-1 - Management Account - Delete any unnecessary VPC in eu-north-1 to include the default VPC.
145
+ Delete VPC in eu-west-3 - Management Account - Delete any unnecessary VPC in eu-west-3 to include the default VPC.
146
+ Delete VPC in eu-west-2 - Management Account - Delete any unnecessary VPC in eu-west-2 to include the default VPC.
147
+ Delete VPC in eu-west-1 - Management Account - Delete any unnecessary VPC in eu-west-1 to include the default VPC.
148
+ Delete VPC in ap-northeast-3 - Management Account - Delete any unnecessary VPC in ap-northeast-3 to include the default VPC.
149
+ Delete VPC in ap-northeast-2 - Management Account - Delete any unnecessary VPC in ap-northeast-2 to include the default VPC.
150
+ Delete VPC in ap-northeast-1 - Management Account - Delete any unnecessary VPC in ap-northeast-1 to include the default VPC.
151
+ Delete VPC in ca-central-1 - Management Account - Delete any unnecessary VPC in ca-central-1 to include the default VPC.
152
+ Delete VPC in sa-east-1 - Management Account - Delete any unnecessary VPC in sa-east-1 to include the default VPC.
153
+ Delete VPC in ap-southeast-1 - Management Account - Delete any unnecessary VPC in ap-southeast-1 to include the default VPC.
154
+ Delete VPC in ap-southeast-2 - Management Account - Delete any unnecessary VPC in ap-southeast-2 to include the default VPC.
155
+ Delete VPC in eu-central-1 - Management Account - Delete any unnecessary VPC in eu-central-1 to include the default VPC.
156
+ Delete VPC in us-east-1 - Management Account - Delete any unnecessary VPC in us-east-1 to include the default VPC.
157
+ Delete VPC in us-east-2 - Management Account - Delete any unnecessary VPC in us-east-2 to include the default VPC.
158
+ Delete VPC in us-west-1 - Management Account - Delete any unnecessary VPC in us-west-1 to include the default VPC.
159
+ Delete VPC in us-west-2 - Management Account - Delete any unnecessary VPC in us-west-2 to include the default VPC.
160
+
161
+ *********************************************************
162
+ GOVERNANCE
163
+ *********************************************************
164
+
165
+ AWS ORGANIZATION POLICY TYPES
166
+
167
+ Service Control Policies (SCP) enabled: true
168
+ Tag Policies enabled: true
169
+ Backup Policies enabled: true
170
+
171
+ AWS ORGANIZATION CLOUDFORMATION
172
+
173
+ AWS CloudFormation Organization stack sets status : ENABLED
174
+
175
+ CLOUDTRAIL CHECK
176
+
177
+ CloudTrail found in ap-southeast-2
178
+ Is Organization Trail: true
179
+ Is MultiRegion: true
180
+
181
+
182
+ GOVERNANCE SERVICES ENABLED IN AWS ORGANIZATION:
183
+
184
+ AWS CloudTrail
185
+ AWS Config
186
+
187
+ GOVERNANCE TASKS:
188
+
189
+ *********************************************************
190
+ FINANCIAL MANAGEMENT
191
+ *********************************************************
192
+
193
+ Legacy CUR
194
+ Is legacy CUR setup: true
195
+
196
+ CLOUD FINANCIAL MANAGEMENT TASKS:
197
+
198
+ *********************************************************
199
+ MULTI-ACCOUNT STRATEGY
200
+ *********************************************************
201
+
202
+ AWS ORGANIZATION DETAILS
203
+
204
+ AWS Organization Id: o-7qetdtd2wa
205
+ AWS Organization ARN: arn:aws:organizations::909135376185:organization/o-7qetdtd2wa
206
+ AWS Organization Root OU Id: r-jwu0
207
+
208
+ AWS ORGANIZATION CLOUDFORMATION
209
+
210
+ AWS CloudFormation Organization stack sets status : ENABLED
211
+
212
+ AWS ORGANIZATION TOP-LEVEL ORGANIZATION UNITS
213
+
214
+ List of Organization's top-level OUs and AWS accounts:
215
+ Organizational Unit: ou-nz-applications
216
+ Organizational Unit Id: ou-jwu0-ocsm4re1
217
+ AWS Accounts: None
218
+
219
+ Organizational Unit: ou-shared-services
220
+ Organizational Unit Id: ou-jwu0-72eyxnqv
221
+ AWS Accounts: None
222
+
223
+ Organizational Unit: ou-au-applications
224
+ Organizational Unit Id: ou-jwu0-xrrithh4
225
+ AWS Accounts: None
226
+
227
+ Organizational Unit: ou-exceptions
228
+ Organizational Unit Id: ou-jwu0-wxc5o8id
229
+ AWS Accounts:
230
+ Demo-Center
231
+
232
+ Organizational Unit: ou-security
233
+ Organizational Unit Id: ou-jwu0-2qhpuvtu
234
+ AWS Accounts: None
235
+
236
+
237
+ AWS ORGANIZATION MEMBER ACCOUNTS
238
+
239
+ Account: ams-api-prod
240
+ Account Email: aws-bc-ams-api-prod@datacom.com
241
+
242
+ Account: vams-nz-multi-fuel-apps-non-prod
243
+ Account Email: aws-bc-vams-nz-multi-fuel-apps-non-prod@datacom.com
244
+
245
+ Account: Demo-Center
246
+ Account Email: aws-bc-demo-center@datacom.com
247
+
248
+ Account: vams-nz-multi-fuel-api-non-prod
249
+ Account Email: aws-bc-vams-nz-multi-fuel-api-non-prod@datacom.com
250
+
251
+ Account: bluecurrent-batch-jobs-test
252
+ Account Email: aws-bc-batch-jobs-test@datacom.com
253
+
254
+ Account: ams-av-dw
255
+ Account Email: aws-bc-ams-av-dw@datacom.com
256
+
257
+ Account: bluecurrent-batch-jobs-prod
258
+ Account Email: aws-bc-batch-jobs-prod@datacom.com
259
+
260
+ Account: vams-nz-elec-outbound-sec
261
+ Account Email: aws-bc-vams-nz-elec-outbound-sec@datacom.com
262
+
263
+ Account: bc-corp-prod
264
+ Account Email: aws-bc-corp-prod@datacom.com
265
+
266
+ Account: vams-nz-multi-fuel-api-sandbox
267
+ Account Email: aws-bc-vams-nz-multi-fuel-api-sandbox@datacom.com
268
+
269
+ Account: bc-corp-sit
270
+ Account Email: aws-bc-corp-sit@datacom.com
271
+
272
+ Account: ams-poc1
273
+ Account Email: aws-bc-ams-poc1@datacom.com
274
+
275
+ Account: bc-photo-poc
276
+ Account Email: aws-bc-photo-poc@datacom.com
277
+
278
+ Account: vams-au-elec-external-non-prod
279
+ Account Email: aws-bc-vams-au-elec-external-non-prod@datacom.com
280
+
281
+ Account: vams-au-multi-fuel-apps-non-prod
282
+ Account Email: aws-bc-vams-au-multi-fuel-apps-non-prod@datacom.com
283
+
284
+ Account: vams-au-multi-fuel-apps-sandbox
285
+ Account Email: aws-bc-vams-au-multi-fuel-apps-sandbox@datacom.com
286
+
287
+ Account: bc-commvault-backup
288
+ Account Email: aws-bc-commvault-backup@datacom.com
289
+
290
+ Account: bc-corp-dev
291
+ Account Email: aws-bc-corp-dev@datacom.com
292
+
293
+ Account: vams-au-multi-fuel-api-sandbox
294
+ Account Email: aws-bc-vams-au-multi-fuel-api-sandbox@datacom.com
295
+
296
+ Account: bc-aws-connect-prod
297
+ Account Email: aws-bc-aws-connect-prod@datacom.com
298
+
299
+ Account: bc-corp-monitoring-prod
300
+ Account Email: aws-bc-corp-monitoring-prod@datacom.com
301
+
302
+ Account: bluecurrent-nz-soa-poc
303
+ Account Email: aws-bc-nz-soa-poc@datacom.com
304
+
305
+ Account: vams-nz-elec-datalake-prod
306
+ Account Email: aws-bc-vams-nz-elec-datalake-prod@datacom.com
307
+
308
+ Account: bc-aws-connect-test
309
+ Account Email: aws-bc-aws-connect-test@datacom.com
310
+
311
+ Account: ams-audit
312
+ Account Email: aws-bc-ams-audit@datacom.com
313
+
314
+ Account: bc-datalake-dev
315
+ Account Email: aws-bc-datalake-dev@datacom.com
316
+
317
+ Account: vams-nz-elec-sidecar
318
+ Account Email: aws-bc-vams-nz-elec-sidecar@datacom.com
319
+
320
+ Account: arcs-syd-prod
321
+ Account Email: aws-bc-arcs-syd-prod@datacom.com
322
+
323
+ Account: vams-au-metering-elec-mass-security
324
+ Account Email: aws-bc-vams-au-metering-elec-mass-security@datacom.com
325
+
326
+ Account: bluecurrent-nz-assetmanagement-jde
327
+ Account Email: aws-bc-nz-assetmanagement-jde@datacom.com
328
+
329
+ Account: vams-nz-multi-fuel-apps-sandbox
330
+ Account Email: aws-bc-vams-nz-multi-fuel-apps-sandbox@datacom.com
331
+
332
+ Account: vams-nz-elec-datalake-test
333
+ Account Email: aws-bc-vams-nz-elec-datalake-test@datacom.com
334
+
335
+ Account: ams-centralised-ops
336
+ Account Email: aws-bc-ams-centralised-ops@datacom.com
337
+
338
+ Account: ams-security
339
+ Account Email: aws-bc-ams-security@datacom.com
340
+
341
+ Account: bc-corp-monitoring-non-prod
342
+ Account Email: aws-bc-corp-monitoring-non-prod@datacom.com
343
+
344
+ Account: vams-au-metering-elec-mass-dev
345
+ Account Email: aws-bc-vams-au-metering-elec-mass-dev@datacom.com
346
+
347
+ Account: vams-nz-elec-inbound-sec
348
+ Account Email: aws-bc-vams-nz-elec-inbound-sec@datacom.com
349
+
350
+ Account: vams-au-multi-fuel-api-non-prod
351
+ Account Email: aws-bc-vams-au-multi-fuel-api-non-prod@datacom.com
352
+
353
+ Account: ams-gateway-1
354
+ Account Email: aws-bc-ams-gateway-1@datacom.com
355
+
356
+ Account: ams-admin
357
+ Account Email: aws-bc-management@datacom.com
358
+
359
+ Account: vams-nz-elec-sandbox
360
+ Account Email: aws-bc-vams-nz-elec-sandbox@datacom.com
361
+
362
+ Account: vams-au-metering-elec-mass-preprod
363
+ Account Email: aws-bc-vams-au-metering-elec-mass-preprod@datacom.com
364
+
365
+ Account: vams-nz-elec-internal-non-prod
366
+ Account Email: aws-bc-vams-nz-elec-internal-non-prod@datacom.com
367
+
368
+ Account: vams-au-metering-elec-mass-sit
369
+ Account Email: aws-bc-vams-au-metering-elec-mass-sit@datacom.com
370
+
371
+ Account: vams-au-multi-fuel-api-prod
372
+ Account Email: aws-bc-vams-au-multi-fuel-api-prod@datacom.com
373
+
374
+ Account: ams-api-dev
375
+ Account Email: aws-bc-ams-api-dev@datacom.com
376
+
377
+ Account: ams-appstream-prod
378
+ Account Email: aws-bc-ams-appstream-prod@datacom.com
379
+
380
+ Account: vams-au-elec-internal-non-prod
381
+ Account Email: aws-bc-vams-au-elec-internal-non-prod@datacom.com
382
+
383
+ Account: vams-nz-multi-fuel-api-prod
384
+ Account Email: aws-bc-vams-nz-multi-fuel-api-prod@datacom.com
385
+
386
+ Account: bc-datalake-preprod
387
+ Account Email: aws-bc-datalake-preprod@datacom.com
388
+
389
+ Account: ams-shared-services
390
+ Account Email: aws-bc-ams-shared-services@datacom.com
391
+
392
+ Account: vams-nz-elec-internal-prod
393
+ Account Email: aws-bc-vams-nz-elec-internal-prod@datacom.com
394
+
395
+ Account: vams-nz-metering-elec-mass-security
396
+ Account Email: aws-bc-vams-nz-metering-elec-mass-security@datacom.com
397
+
398
+ Account: vams-au-multi-fuel-apps-prod
399
+ Account Email: aws-bc-vams-au-multi-fuel-apps-prod@datacom.com
400
+
401
+ Account: vams-metering-autotest-prod
402
+ Account Email: aws-bc-vams-metering-autotest-prod@datacom.com
403
+
404
+ Account: vamsnz-syd-prod
405
+ Account Email: aws-bc-vamsnz-syd-prod@datacom.com
406
+
407
+ Account: bc-corp-uat
408
+ Account Email: aws-bc-corp-uat@datacom.com
409
+
410
+ Account: ams-shared-services-non-prod
411
+ Account Email: aws-bc-ams-shared-services-non-prod@datacom.com
412
+
413
+ Account: vams-nz-multi-fuel-apps-prod
414
+ Account Email: aws-bc-vams-nz-multi-fuel-apps-prod@datacom.com
415
+
416
+
417
+ AWS ORGANIZATION ENABLED SERVICES
418
+
419
+ The following AWS Services are enabled within your AWS Organization:
420
+ account.amazonaws.com
421
+ backup.amazonaws.com
422
+ cloudtrail.amazonaws.com
423
+ config-multiaccountsetup.amazonaws.com
424
+ config.amazonaws.com
425
+ iam.amazonaws.com
426
+ member.org.stacksets.cloudformation.amazonaws.com
427
+ ram.amazonaws.com
428
+ reporting.trustedadvisor.amazonaws.com
429
+ resource-explorer-2.amazonaws.com
430
+ securityhub.amazonaws.com
431
+ ssm.amazonaws.com
432
+ sso.amazonaws.com
433
+ tagpolicies.tag.amazonaws.com
434
+
435
+ AWS ORGANIZATION INTEGRATED SERVICE REGISTERED DELEGATED ADMINS
436
+
437
+ Account: ams-audit
438
+ Delegated Services:
439
+ securityhub.amazonaws.com
440
+
441
+ Account: ams-centralised-ops
442
+ Delegated Services:
443
+ config.amazonaws.com
444
+ resource-explorer-2.amazonaws.com
445
+
446
+
447
+ MULTI-ACCOUNT STRATEGY TASKS:
448
+ Review Account Email Addresses - Multi-Account Strategy - Review Account Email Addresses in AWS Organization
449
+ Deploy Transitional OU - Multi-Account Strategy - Deploy Transitional OU in AWS Organization
450
+ Deploy Suspended OU - Multi-Account Strategy - Deploy Suspended OU in AWS Organization
451
+ Deploy Workloads OU - Multi-Account Strategy - Deploy Workloads OU in AWS Organization
452
+ Deploy Security OU - Multi-Account Strategy - Deploy Security OU in AWS Organization
453
+ Deploy Infrastructure OU - Multi-Account Strategy - Deploy Infrastructure OU in AWS Organization
454
+
455
+ *********************************************************
456
+ LANDING ZONE
457
+ *********************************************************
458
+
459
+ AWS CONTROL TOWER
460
+
461
+ AWS Control Tower is not deployed in the AWS Organization
462
+
463
+ LANDING ZONE TASKS:
464
+ Deploy AWS Control Tower - Landing Zone - Deploy AWS Control Tower in AWS Organization
465
+
466
+ *********************************************************
467
+ IDENTITY
468
+ *********************************************************
469
+
470
+ AWS IAM IDENTITY CENTER
471
+
472
+ IdC Region: ap-southeast-2
473
+ IdC ARN: arn:aws:sso:::instance/ssoins-825940b04bdafef9
474
+ IdC Instance Id: d-976752e8d5
475
+
476
+ IDENTITY TASKS:
477
+ Delegate administration to AWS IAM Identity Center - Identity - Delegate administration to AWS IAM Identity Center
478
+
479
+ *********************************************************
480
+ SECURITY
481
+ *********************************************************
482
+
483
+ AWS SECURITY SERVICES ENABLED IN AWS ORGANIZATION:
484
+
485
+ AWS Security Hub
486
+ AWS CloudTrail
487
+ AWS Config
488
+
489
+ SECURITY TASKS:
490
+ Delegate administration to AWS GuardDuty - Security - Delegate administration to AWS GuardDuty
491
+ Delegate administration to AWS IAM Access Analyzer - Security - Delegate administration to AWS IAM Access Analyzer
492
+ Delegate administration of AWS GuardDuty - Security - Delegate administration to AWS GuardDuty
493
+ Delegate administration of AWS IAM Access Analyzer - Security - Delegate administration to AWS IAM Access Analyzer
494
+ Delegate administration of Amazon S3 Storage Lens - Security - Delegate administration to Amazon S3 Storage Lens
495
+
496
+ *********************************************************
497
+ NETWORK
498
+ *********************************************************
499
+
500
+ NETWORK TASKS:
501
+ Enable AWS GuardDuty - Network - Enable AWS GuardDuty in AWS Organization
502
+ Enable AWS IPAM - Network - Enable AWS IPAM in AWS Organization
503
+ Delegate administration of AWS IPAM - Network - Delegate administration to AWS IPAM
504
+
505
+ *********************************************************
506
+ OBSERVABILITY
507
+ *********************************************************
508
+
509
+ OBSERVABILITY TASKS:
510
+ Delegate administration of AWS Account - Observability - Delegate administration to AWS Account
511
+
512
+ *********************************************************
513
+ BACKUP AND RECOVERY
514
+ *********************************************************
515
+
516
+ BACKUP AND RECOVERY TASKS:
517
+ Delegate administration of AWS Backup - Backup and Recovery - Delegate administration to AWS Backup
518
+
519
+
520
+ END REVIEW