Skip to content

aws-samples/minimum-security-baseline

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 

Minimum security baseline. How to improve your security posture with a minimum security baseline artifact

This is a set of cloudformation templates that enables a minimum security baseline in a new AWS account that doesn't have Amazon GuardDuty, AWS Security Hub, Amazon Macie, Password Policy and Access Analyzer enabled.

The solution is considered to be part of an integral security program. Instructions:

  • Create S3 bucket in your AWS account
  • Upload templates:
    • plantilla-raiz.yml
    • plantilla-parametros.yml
    • plantilla-llaves.yml
    • plantilla-buckets.yml
    • plantilla-seguridad.yml
    • plantilla-notificaciones.ymkl
    • plantilla-cis-alerts.yml
    • plantilla-cis-dashboard.yml
    • iam-security-policy.yml

In AWS Cloudformation launch template root-stack.yml and provide parameters:

  • AbreviaturaCuenta. Name for your AWS account. Input any lower case characters.
  • BucketPlantillas. S3 bucket where templates were stored.
  • CorreoCotificacion. Email to send events notifications.
  • CISDashboard. Select true if you want to enable CIS control dashboard.
  • GuardDuty. Select true if you want to enable Amazon GuardDuty.
  • Macie. Select true if you want to enable Amazon Macie.
  • SecurityHub. Select true if you want to enable AWS Security Hub.

All other parameters are optional Advance additional steps and acknowledge creation of IAM resources and Capability_auto_expand in final step.

If you have Amazon GuardDuty, AWS Security Hub, Amazon Macie, Password Policy and Access Analyzer enabled, you should modify seguridad.yml to not enable a specific service or it will break.

Security

See CONTRIBUTING for more information.

License

This library is licensed under the MIT-0 License. See the LICENSE file.

Content Security Legal Disclaimer

“The sample code; software libraries; command line tools; proofs of concept; templates; or other related technology (including any of the foregoing that are provided by our personnel) is provided to you as AWS Content under the AWS Customer Agreement, or the relevant written agreement between you and AWS (whichever applies). You should not use this AWS Content in your production accounts, or on production or other critical data. You are responsible for testing, securing, and optimizing the AWS Content, such as sample code, as appropriate for production grade use based on your specific quality control practices and standards. Deploying AWS Content may incur AWS charges for creating or using AWS chargeable resources, such as running Amazon EC2 instances or using Amazon S3 storage.”

About

No description, website, or topics provided.

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published