Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
21 commits
Select commit Hold shift + click to select a range
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
63 changes: 0 additions & 63 deletions _docs-sources/guides/build-it-yourself/1-overview.md

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,12 @@ sidebar_label: Intro

# CIS Compliance Core Concepts

The [CIS Benchmarks](https://www.cisecurity.org/resources/?type=benchmark) are objective, consensus-driven
configuration guidelines developed by security experts to help organizations improve their security posture.
The AWS Foundations Benchmark is a set of configuration best practices for hardening AWS accounts to establish
a secure foundation for running workloads on AWS. It also provides ongoing monitoring to ensure that the
account remains secure.

The CIS AWS Foundations Benchmark is organized into the following sections:

- Identity and Access Management
Expand Down Expand Up @@ -42,8 +48,3 @@ Organizations seeking to implement a comprehensive security program or framework
progress and prioritize security efforts. The Foundations Benchmark is just one of several guidelines that can help
reach the bar set by the CIS Controls. Refer to the Benchmark document directly to view how the recommendations map to
controls.


<!-- ##DOCS-SOURCER-START
{"sourcePlugin":"Local File Copier","hash":"56c0543c5fd2cf410b922c940c4a414a"}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ all regions in an account, saving you the hassle of creating flow logs in each d
The Monitoring section of the Benchmark centers on a collection of
[CloudWatch Logs Metric
Filters](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/MonitoringLogData.html). Gruntwork has simplified this section to a single module: the
[`cloudwatch-logs-metric -filters` wrapper module](https://github.com/gruntwork-io/terraform-aws-cis-service-catalog/blob/master/modules/cloudwatch-logs-metric-filters/README.adoc). It will create and configure all the CloudWatch Logs metric filters necessary for
[`cloudwatch-logs-metric -filters` wrapper module](https://github.com/gruntwork-io/terraform-aws-cis-service-catalog/blob/master/modules/observability/cloudwatch-logs-metric-filters/README.adoc). It will create and configure all the CloudWatch Logs metric filters necessary for
compliance with the Benchmark. Note that when you deploy the CIS account baseline modules, the CloudWatch Logs metric
filters will be created and configured automatically, so that you don’t have to do anything special to enable the metric filters on the
deployed CloudTrail configuration.
Expand Down Expand Up @@ -147,7 +147,7 @@ inputs = {
}
```

Refer to the [terraform-aws-cis-service-catalog](https://github.com/gruntwork-io/terraform-aws-cis-service-catalog/tree/master/examples/for-learning-and-testing/networking/vpc/terraform)
Refer to the [terraform-aws-cis-service-catalog](https://github.com/gruntwork-io/terraform-aws-cis-service-catalog/tree/master/examples/for-learning-and-testing/networking/vpc/)
repo for a more comprehensive example.

Finally, run the [`cloud-nuke defaults-aws`](https://github.com/gruntwork-io/cloud-nuke) command to remove all
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -275,7 +275,7 @@ On some operating systems, such as MacOS, you may also need to increase your ope
1. Use your IAM user’s user name and password (decrypted using keybase) to log into the web console of the security
account (remember to use the IAM user sign-in URL for the security account).

2. Follow the steps in [Lock down the root account IAM users](../6-lock-down-the-root-account-iam-users.md) to lock down your IAM user in the security account. This includes
2. Follow the steps in [Lock down the root account IAM users](../lock-down-the-root-account-iam-users.md) to lock down your IAM user in the security account. This includes
configuring an MFA device for your IAM user.

3. After configuring an MFA device, log out, and then log back into the security account again, this time providing your
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -581,6 +581,6 @@ Use this process to reset the password for the root user of each child account y

## Lock down the root user in the child accounts

Once you’re able to access the root user of each child account, you should follow the steps in [Lock down the root user](../4-lock-down-the-root-user.md)
Once you’re able to access the root user of each child account, you should follow the steps in [Lock down the root user](../lock-down-the-root-user.md)
for each of those child accounts—including enabling MFA and deleting the root user’s access keys—and (almost) never use
those root users again.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# Deployment approach

Before we dive into the code and deployment for each resource, let’s take a step back and understand how the code is structured.
Most of the features explained in the [Production-grade design](../2-production-grade-design/0-intro.md) section will be deployed using the Landing Zone solution, and some more standalone modules like the VPC module.
Most of the features explained in the [Production-grade design](../production-grade-design/intro.md) section will be deployed using the Landing Zone solution, and some more standalone modules like the VPC module.

The Landing Zone will be deployed in three steps - the `account-baseline-root` to set up your organization-wide configurations, create the necessary child AWS accounts, set up the CloudTrail and AWS Config buckets. Next, we’ll need to apply the `account-baseline-app` against the created logs account, adding more settings that will be used for aggregation of logs and metrics from the whole organization. Then the `account-baseline-security` will be applied, and that’s responsible to set up your IAM roles and groups that would allow you to access the rest of the accounts within your organization. And finally, the `account-baseline-app` will be applied to an AWS account with the purpose of hosting an application.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ pagination_label: Deployment Walkthrough

# Pre-requisites

The [Production-grade Design](../2-production-grade-design/0-intro.md) section describes in detail the Terraform resources to use and the approach to take for
The [Production-grade Design](../production-grade-design/intro.md) section describes in detail the Terraform resources to use and the approach to take for
each recommendation, but we've already done that grunt work! This section documents how to achieve compliance using the Infrastructure as Code modules from Gruntwork.

This walkthrough has the following pre-requisites:
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
---
sidebar_label: Prepare your infrastructure-live repository
---

# Prepare your `infrastructure-live` repository

We’ve previously described exactly how to prepare your repository in the
[Gruntwork Landing Zone guide](../../landing-zone/deployment-walkthrough/prepare-your-infrastructure-live-repository.md). Follow the steps in that section to get your `infrastructure-live` repository set up for the next steps.
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ Gruntwork’s [infrastructure as code repositories](https://gruntwork.io/repos).
## Standalone Compliance modules

The standalone compliance modules complement the modules available in the IaC Library. They have the CIS compliance requirements built right in and may combine multiple modules including Core modules for a
specific use case. For example, the [`cleanup-expired-certs` standalone module](https://github.com/gruntwork-io/terraform-aws-cis-service-catalog/tree/master/modules/cleanup-expired-certs) deploys a Lambda function that runs regularly and automatically removes all expired SSL/TLS certificates stored in AWS IAM in compliance with recommendation 1.19 of the CIS AWS Foundations Benchmark. These modules are in the [`terraform-aws-cis-service-catalog`
specific use case. For example, the [`cleanup-expired-certs` standalone module](https://github.com/gruntwork-io/terraform-aws-cis-service-catalog/tree/master/modules/security/cleanup-expired-certs) deploys a Lambda function that runs regularly and automatically removes all expired SSL/TLS certificates stored in AWS IAM in compliance with recommendation 1.19 of the CIS AWS Foundations Benchmark. These modules are in the [`terraform-aws-cis-service-catalog`
repository](https://github.com/gruntwork-io/terraform-aws-cis-service-catalog) (accessible to Gruntwork Compliance subscribers).

## Compliance wrapper modules
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,8 +24,8 @@ compliant state over time because all of the infrastructure is defined as code.

Previously, we supported versions 1.3.0 and 1.2.0 of the Benchmark. If you are looking to upgrade from an older version please follow these in order:

- To upgrade from v1.2.0 to v1.3.0, please follow [this upgrade guide](../../../stay-up-to-date/1-cis/1-how-to-update-to-cis-13/0-intro.md);
- To upgrade from v1.3.0 to v1.4.0, please follow [this upgrade guide](../../../stay-up-to-date/1-cis/0-how-to-update-to-cis-14/0-intro.md).
- To upgrade from v1.2.0 to v1.3.0, please follow [this upgrade guide](/docs/guides/stay-up-to-date/cis/cis-1.3.0).
- To upgrade from v1.3.0 to v1.4.0, please follow [this upgrade guide](/docs/guides/stay-up-to-date/cis/cis-1.4.0).

![CIS Benchmark Architecture](/img/guides/build-it-yourself/achieve-compliance/cis-account-architecture.png)

Expand Down
Loading