As a Cloud Security Operations administrator, you must continuously know that the organizational units in your AWS landing zone comply with the policies you applied. Cloud Guardrails helps you detect the drift from your policies, and enforce compliance.
To ensure that the organizational units in your AWS landing zone comply with your security policies, you can have Cloud Guardrails attach security baseline guardrails to your AWS landing zone. Cloud Guardrails includes security templates that include policies and configuration rules. The security templates enforce the configuration rules on the organizational units in your AWS landing zone.
Cloud Guardrails can apply mandatory, strongly recommended, and elective baseline security guardrail policies to your AWS landing zone. As a Cloud Operations administrator, setting up your AWS landing zone enables the mandatory guardrails by default. During the setup, you can select the strongly recommended guardrails and elective guardrails that you need to apply to your landing zone, and you can deselect them later as needed.
Table 1.
Cloud Guardrails security baseline templates for the organizational units in your AWS landing zone
Type of security guardrail |
Supported security templates |
Rules in the template that Cloud Guardrails enforces |
Mandatory guardrails |
Mandatory and Strongly Recommended Guardrails SCP Policy |
Disallow Deletion of Log Archive
Detect Public Read Access Setting for Log Archive
Detect Public Write Access Setting for Log Archive
Disallow Configuration Changes to AWS Config
Enable AWS Config in All Available Regions
|
Strongly recommended guardrails |
Strongly Recommended Guardrails Config Rules |
Disallow Creation of Access Keys for the Root User
Disallow Actions as a Root User
Detect Whether Encryption is Enabled for Amazon EBS Volumes Attached to Amazon EC2 Instances
Detect Whether Unrestricted Incoming TCP Traffic is Allowed
Detect Whether Unrestricted Internet Connection Through SSH is Allowed
Detect Whether MFA for the Root User is Enabled
Detect Whether Public Read Access to Amazon S3 Buckets is Allowed
Detect Whether Public Write Access to Amazon S3 Buckets is Allowed
Detect Whether Amazon EBS Volumes are Attached to Amazon EC2 Instances
Detect Whether Amazon EBS Optimization is Enabled for Amazon EC2 Instances
Detect Whether Public Access to Amazon RDS Database Instances is Enabled
Detect Whether Public Access to Amazon RDS Database Snapshots is Enabled
Detect Whether Storage Encryption is Enabled for Amazon RDS Database Instances
|
Elective guardrails |
Cloud Guardrails provides templates that support elective guardrails for SCP Policies and configuration rules. Elective Guardrails SCP Policy Elective Guardrails Config Rules |
Disallow Changes to Encryption Configuration for Amazon S3 Buckets [Previously: Enable Encryption at Rest for Log Archive]
Disallow Changes to Logging Configuration for Amazon S3 Buckets [Previously: Enable Access Logging for Log Archive]
Disallow Changes to Bucket Policy for Amazon S3 Buckets [Previously: Disallow Policy Changes to Log Archive]
Disallow Changes to Lifecycle Configuration for Amazon S3 Buckets [Previously: Set a Retention Policy for Log Archive]
Disallow Changes to Replication Configuration for Amazon S3 Buckets
Disallow Delete Actions on Amazon S3 Buckets Without MFA
Detect Whether MFA is Enabled for AWS IAM Users
Detect Whether MFA is Enabled for AWS IAM Users of the AWS Console
Detect Whether Versioning for Amazon S3 Buckets is Enabled
Guardrails that enhance data residency protection
|
Procedure
- To apply the security policies on the organizational units your AWS landing zone, access the Cloud Guardrails policy templates from your vRealize Automation Cloud instance.
- On the Guardrails tab, click +New.
- Click From library.
- Click the Security card.
- Import the SCP policy template and config templates.
- Select the template named Mandatory and Strongly Recommended Guardrails SCP Policy.
- Select the template named Strongly Recommended Guardrails Config Rules.
- Select the template named Elective Guardrails SCP Policy.
- Select the template named Elective Guardrails Config Rules.
- Click Add Selected Template, select a project, and click Import.
The templates appear in the list on the
Templates tab.
- To create the desired states, click each template, and click Create Desired State.
For example, click
Strongly Recommended Guardrails Config Rules, and click
Create Desired State.
- In the Create a Desired State dialog box, enter a name and description, and select a cloud account and region. Then click Create.
- Create the desired states for the other security templates for your landing zone.
Results
Congratulations! To ensure that the organizational units in your AWS landing zone comply with your security policies, you imported the security templates for your landing zone and created desired states.
What to do next
After you create the desired state, you can run it and view the resulting enforcements. To find out more about creating desired states and enforcements, see How do I create a Cloud Guardrails desired state from a template and enforce it.