Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions docs/guides/stay-up-to-date/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@ import CardGroup from "/src/components/CardGroup"

<CardGroup cols={1} gap="1rem" stacked equalHeightRows={false} commonCardProps={{padding: "1.25rem"}}>

<Card title="Update to 2023-06" href="/guides/stay-up-to-date/releases/2023-06" />
<Card title="Update to 2023-05" href="/guides/stay-up-to-date/releases/2023-05" />
<Card title="Update to 2023-04" href="/guides/stay-up-to-date/releases/2023-04" />
<Card title="Update to 2023-03" href="/guides/stay-up-to-date/releases/2023-03" />
Expand All @@ -30,7 +31,6 @@ import CardGroup from "/src/components/CardGroup"
<Card title="Update to 2022-06" href="/guides/stay-up-to-date/releases/2022-06" />
<Card title="Update to 2022-05" href="/guides/stay-up-to-date/releases/2022-05" />
<Card title="Update to 2022-04" href="/guides/stay-up-to-date/releases/2022-04" />
<Card title="Update to 2022-03" href="/guides/stay-up-to-date/releases/2022-03" />
<Card title="See older releases" href="/guides/stay-up-to-date/releases" />

</CardGroup>
Expand Down Expand Up @@ -114,6 +114,6 @@ href="/guides/stay-up-to-date/cis/cis-1.5.0"
<!-- ##DOCS-SOURCER-START
{
"sourcePlugin": "releases",
"hash": "3fa2edea88fe3cc62d7be31ef4069fe5"
"hash": "2641001c967a24cf5ec5f9a9816e06c4"
}
##DOCS-SOURCER-END -->
19 changes: 19 additions & 0 deletions docs/guides/stay-up-to-date/releases/2016-07/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ Here are the repos that were updated:
- [terraform-aws-data-storage](#terraform-aws-data-storage)
- [terraform-aws-ecs](#terraform-aws-ecs)
- [terraform-aws-monitoring](#terraform-aws-monitoring)
- [terraform-aws-security](#terraform-aws-security)
- [terraform-aws-server](#terraform-aws-server)
- [terraform-aws-vpc](#terraform-aws-vpc)

Expand Down Expand Up @@ -420,6 +421,24 @@ Here are the repos that were updated:



## terraform-aws-security


### [v0.0.1](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.1)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 7/26/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.1">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

- First release!


</div>



## terraform-aws-server


Expand Down
47 changes: 47 additions & 0 deletions docs/guides/stay-up-to-date/releases/2016-08/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ Here are the repos that were updated:
- [boilerplate](#boilerplate)
- [terraform-aws-ci](#terraform-aws-ci)
- [terraform-aws-monitoring](#terraform-aws-monitoring)
- [terraform-aws-security](#terraform-aws-security)
- [terraform-aws-vpc](#terraform-aws-vpc)


Expand Down Expand Up @@ -98,6 +99,52 @@ Here are the repos that were updated:



## terraform-aws-security


### [v0.0.3](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.3)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 8/23/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.3">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

- Add a new module called `ssh-iam` that allows your developers to upload their public SSH keys to IAM and use those to SSH to servers.


</div>


### [v0.0.2](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.2)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 8/15/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.2">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

- Add `auto-update` module to configure Amazon Linux or Ubuntu to automatically download and install the latest security updates.


</div>


### [v0.0.0](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.0)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 8/11/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.0">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

This release is used for internal testing only! Do not use it in production!


</div>



## terraform-aws-vpc


Expand Down
94 changes: 94 additions & 0 deletions docs/guides/stay-up-to-date/releases/2016-09/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ Here are the repos that were updated:
- [terraform-aws-data-storage](#terraform-aws-data-storage)
- [terraform-aws-ecs](#terraform-aws-ecs)
- [terraform-aws-monitoring](#terraform-aws-monitoring)
- [terraform-aws-security](#terraform-aws-security)
- [terraform-aws-server](#terraform-aws-server)
- [terraform-aws-vpc](#terraform-aws-vpc)

Expand Down Expand Up @@ -499,6 +500,99 @@ In `modules/ecs-cluster`:



## terraform-aws-security


### [v0.2.1](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.2.1)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 10/1/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.2.1">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

- NEW MODULE: In this release, we introduce the `cloudtrail` module, a streamlined way to setup [AWS CloudTrail](http://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-user-guide.html)!


</div>


### [v0.2.0](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.2.0)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 9/29/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.2.0">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

- BREAKING CHANGE: We updated the `kms-master-key` module with a few changes:
- Previously, terraform would unnecessarily update the Key Policy on every `terraform apply`. This didn&apos;t break anything, but it confusingly reported 1 resource as being modified when in fact nothing was changed. This has now been fixed using the new [data.aws_iam_policy_document](https://www.terraform.io/docs/providers/aws/d/iam_policy_document.html).
- The var `key_root_user_iam_arns` has been replaced with `var.allow_manage_key_permissions_with_iam` (accepts true/false) to better reflect the significance of setting this value. Note that the var `aws_account_id` is also now required.
- The vars `key_administrator_iam_arns` and `key_user_iam_arns` have been renamed to `cmk_administrator_iam_arns` and `cmk_user_iam_arns` to more accurately reflect that these vars grant access to a Customer Master Key (CMK).
- There is a new required input variable called `aws_account_id`.


</div>


### [v0.1.2](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.1.2)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 9/27/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.1.2">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

- We&apos;ve added a new module, `iam-groups` that configures a best-practices set of IAM Groups and corresponding IAM Policies (permissions) you can use to better manage the security of your AWS account.


</div>


### [v0.1.1](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.1.1)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 9/12/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.1.1">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

- On boot, `ssh-iam` now waits 90 seconds before executing to try to give other services (e.g. the EC2 metadata service) a chance to start. This should hopefully ensure that `ssh-iam` doesn&apos;t hit any errors when it configures SSH access on boot and you don&apos;t have to wait for the next cron job to run (by default, they run every 30m) before SSH access works.


</div>


### [v0.1.0](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.1.0)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 9/2/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.1.0">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

BREAKING CHANGE: We have updated this module to support [Terraform 0.7](https://www.hashicorp.com/blog/terraform-0-7.html) features.
- In `modules/kms-master-key`, the input variables `key_administrator_iam_arns`, `key_user_iam_arns`, and `key_root_user_iam_arns` are now all lists.


</div>


### [v0.0.4](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.4)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 9/1/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.0.4">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

- This release contains no new features. It just updates the version of the `docs-generator` we use to fix how the docs are created in https://github.com/gruntwork-io/module-security-public.


</div>



## terraform-aws-server


Expand Down
42 changes: 42 additions & 0 deletions docs/guides/stay-up-to-date/releases/2016-12/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ Here are the repos that were updated:
- [terraform-aws-data-storage](#terraform-aws-data-storage)
- [terraform-aws-ecs](#terraform-aws-ecs)
- [terraform-aws-monitoring](#terraform-aws-monitoring)
- [terraform-aws-security](#terraform-aws-security)
- [terraform-aws-server](#terraform-aws-server)


Expand Down Expand Up @@ -212,6 +213,47 @@ Here are the repos that were updated:



## terraform-aws-security


### [v0.4.0](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.4.0)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 12/17/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.4.0">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

This release updates the `cloudtrail` module to support archiving of logs.

Previously, you could either store logs in S3 (for $0.023 per GB) or delete them. Now, you can choose to archive [CloudTrail](https://aws.amazon.com/cloudtrail/) logs to AWS Glacier after a certain number of days, where you&apos;ll pay just $0.004 per GB.
- ENHANCEMENT: The `cloudtrail` module now exposes a new var, `num_days_after_which_archive_log_data`. If set to `0`, archiving is disabled. Otherwise, log files are automatically archived after the specified number of days.

This change is fully backwards-compatible in terms of the vars and outputs, but it makes use of features new to Terraform v0.8 such as conditionals, and therefore requires that you upgrade to Terraform v0.8.1 or higher before using. For that reason we have indicated in the version release that this is a &quot;breaking&quot; change.


</div>


### [v0.3.0](https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.3.0)

<p style={{marginTop: "-20px", marginBottom: "10px"}}>
<small>Published: 12/13/2016 | <a href="https://github.com/gruntwork-io/terraform-aws-security/releases/tag/v0.3.0">Release notes</a></small>
</p>

<div style={{"overflow":"hidden","textOverflow":"ellipsis","display":"-webkit-box","WebkitLineClamp":10,"lineClamp":10,"WebkitBoxOrient":"vertical"}}>

This release adds two new features to the `iam-groups` module:
- ENHANCEMENT: `iam-groups` now exposes the Terraform variable `should_require_mfa`. If true, an IAM User must use multi-factor authentication (MFA) to access any AWS services, with the exception of a very limited set of permissions the IAM User needs to initialize her MFA Device and reset her password.
- ENHANCEMENT: `iam-groups` now adds the IAM Group `developers` by default (though it&apos;s still optional). Some teams will add all IAM Users to the `full-access` IAM Group. But for those teams that wish to create an IAM User whose permissions go beyond `read-only` but below `full-access`, the `developers` IAM Group offers such an option.

You can customize which set of AWS Services IAM Users in `developers` will receive full access to through the `iam_group_developers_permitted_services` Terraform variable. In addition, the `developers` IAM Group grants IAM Users access to a personal S3 Bucket.


</div>



## terraform-aws-server


Expand Down
Loading