forked from Sage-Bionetworks-IT/organizations-infra
-
Notifications
You must be signed in to change notification settings - Fork 0
/
config.yaml
122 lines (114 loc) · 3.6 KB
/
config.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
AWSTemplateFormatVersion: '2010-09-09'
Metadata:
cfn-lint:
config:
ignore_checks: [W2001]
Parameters:
bucketName:
Type: String
Description: 'Name of the central S3 bucket containing AWS Config audit findings'
Resources:
ConfigAuditBucket:
DeletionPolicy: Retain
UpdateReplacePolicy: Retain
Type: 'AWS::S3::Bucket'
Metadata:
cfn-lint:
config:
ignore_checks: [E1012, E3001]
Properties:
BucketName: !Ref bucketName
AccessControl: BucketOwnerFullControl
PublicAccessBlockConfiguration:
BlockPublicAcls: true
BlockPublicPolicy: true
IgnorePublicAcls: true
RestrictPublicBuckets: true
BucketEncryption:
ServerSideEncryptionConfiguration:
- ServerSideEncryptionByDefault:
SSEAlgorithm: AES256
ConfigAuditBucketPolicy:
Type: AWS::S3::BucketPolicy
Metadata:
cfn-lint:
config:
ignore_checks: [E1012, E3001]
Properties:
Bucket: !Ref ConfigAuditBucket
PolicyDocument: # Taken from https://docs.aws.amazon.com/config/latest/developerguide/s3-bucket-policy.html#granting-access-in-another-account
Version: '2012-10-17'
Statement:
- Sid: AWSConfigBucketPermissionsCheck
Effect: Allow
Principal:
Service:
- config.amazonaws.com
Action: s3:GetBucketAcl
Resource: !GetAtt ConfigAuditBucket.Arn
- Sid: AWSConfigBucketExistenceCheck
Effect: Allow
Principal:
Service:
- config.amazonaws.com
Action: s3:ListBucket
Resource: !GetAtt ConfigAuditBucket.Arn
- Sid: AWSConfigBucketDelivery
Effect: Allow
Principal:
Service:
- config.amazonaws.com
Action: s3:PutObject
Resource: !Sub '${ConfigAuditBucket.Arn}/*'
Condition:
StringEquals:
's3:x-amz-acl': 'bucket-owner-full-control'
ConfigurationRecorder:
Type: 'AWS::Config::ConfigurationRecorder'
Properties:
RecordingGroup:
AllSupported: true
IncludeGlobalResourceTypes: true
RoleARN: !GetAtt ConfigurationRecorderRole.Arn
DeliveryChannel:
Type: 'AWS::Config::DeliveryChannel'
Properties:
ConfigSnapshotDeliveryProperties:
DeliveryFrequency: One_Hour
S3BucketName: !Ref ConfigAuditBucket
ConfigurationRecorderRole:
Type: 'AWS::IAM::Role'
Properties:
ManagedPolicyArns:
- 'arn:aws:iam::aws:policy/service-role/AWS_ConfigRole'
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Sid: ConfigServiceAssumeRole
Effect: Allow
Principal:
Service: 'config.amazonaws.com'
Action: 'sts:AssumeRole'
Policies:
- PolicyName: 's3-policy'
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action: 's3:PutObject'
Resource: !Sub '${ConfigAuditBucket.Arn}/*'
Condition:
StringLike:
's3:x-amz-acl': 'bucket-owner-full-control'
- Effect: Allow
Action: 's3:GetBucketAcl'
Resource: !GetAtt ConfigAuditBucket.Arn
Outputs:
ConfigAuditBucketName:
Value: !Ref ConfigAuditBucket
Export:
Name: !Sub '${AWS::Region}-${AWS::StackName}-ConfigAuditBucketName'
ConfigAuditBucketArn:
Value: !GetAtt ConfigAuditBucket.Arn
Export:
Name: !Sub '${AWS::Region}-${AWS::StackName}-ConfigAuditBucketArn'