Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-Identifier: CC-BY-SA-4.0
The SRA Prerequisites Solution
creates the resources (Staging S3 Buckets
and Execution IAM Role
) and configuration AWS Systems Manager Parameters (SSM Parameters
) for simplifying the deployment of SRA solutions within an AWS Control Tower
environment. All resources that support tags are provided a tag keypair of sra-solution: sra-common-prerequisites
.
AWS Systems Manager (SSM) has a Parameter Store capability that provides secure, hierarchical storage for configuration data management and secrets management. You can store data such as passwords, database strings, Amazon Machine Image (AMI) IDs, and license codes as parameter values. You can store values as plain text or encrypted data. You can reference Systems Manager parameters in your scripts, commands, SSM documents, and configuration and automation workflows by using the unique name that you specified when you created the parameter.
- All resources are deployed via AWS CloudFormation as a StackSet and Stack Instance within the management account or a CloudFormation Stack within a specific account.
- For parameter details, review the AWS CloudFormation templates.
- The AWS Org ID Lambda IAM Role allows the AWS Lambda service to assume the role and perform actions defined in the attached IAM policies.
- An inline AWS Lambda Function in the sra-common-prerequisites-staging-s3-bucket.yaml template contains the logic to determine the AWS Organization ID
- The function is triggered by CloudFormation Create, Update, and Delete events.
AWS Lambda Function
logs are sent to a CloudWatch Log Group</aws/lambda/<LambdaFunctionName>
to help with debugging and traceability of the actions performed.- By default the
AWS Lambda Function
will create the CloudWatch Log Group with aRetention
(Never expire) and the logs are encrypted with a CloudWatch Logs service managed encryption key. - Optional parameters are included to allow creating the CloudWatch Log Group, which allows setting
KMS Encryption
using a customer managed KMS key and setting theRetention
to a specific value (e.g. 14 days).
- Configuration parameters are created/updated within the
SSM Parameter Store
on CloudFormation events and the parameters are used to simplify deployment of this solution and future SRA solutions. - All parameters are created under the
/sra/
hierarchy path in all regions of themanagement account
. - Optional parameters are included to create the parameters in all
member accounts
in the same regions that are enabled in themanagement account
.- This allows for common SSM parameters to be resolved in the
member accounts
for future SRA solutions, and customer workload solutions.
- This allows for common SSM parameters to be resolved in the
- Common parameters created will be retained even if the CloudFormation stacks from this solution are deleted.
- The S3 Bucket is used to store solution files (Lambda Zip files, CloudFormation templates, and other deployment files) that will be used for staging.
- S3 bucket is created in all regions of the
management account
with a name following this syntax:sra-staging-<aws-account-number>-<aws-region>
. - Optional parameters are included to create an S3 bucket in all
member accounts
in the same regions that are enabled in themanagement account
with a name following this syntax:sra-staging-<aws-account-number>-<aws-region>
.- This allows for a staging S3 bucket to be used in the
member accounts
for future SRA solutions, and customer workload solutions.
- This allows for a staging S3 bucket to be used in the
- The AWS Lambda Function Role allows the AWS Lambda service to assume the role and perform actions defined in the attached IAM policies.
- An external deployment package is used in the AWS Lambda Function in the sra-common-prerequisites-management-account-parameters.yaml template contains the logic for discovering common values in your Control Tower landing zone. (e.g., Root Organizational Unit ID, Control Tower Home Region, Audit Account ID)
- The function is triggered by CloudFormation Create, Update, and Delete events.
- The
AWSControlTowerExecution
Role provides the support needed to deploy solutions to themanagement account
across regions as CloudFormationStackSets
.
- AWS Control Tower is deployed.
aws-security-reference-architecture-examples
repository is stored on your local machine or pipeline where you will be deploying from.- Note: If the parameter
Create SRA Staging S3 Bucket in Member Accounts = true
, make sure the following elective AWS Control Tower guardrails are disabled for all OUs:- Disallow Changes to Encryption Configuration for Amazon S3 Buckets
- Disallow Changes to Logging Configuration for Amazon S3 Buckets
- Disallow Changes to Bucket Policy for Amazon S3 Buckets
- Disallow Changes to Lifecycle Configuration for Amazon S3 Buckets
- In the
management account (home region)
, launch the AWS CloudFormation Stack using the sra-common-prerequisites-staging-s3-bucket.yaml template file as the source. - Package the solution, see the Staging instructions.
- In the
management account (home region)
, launch the AWS CloudFormation Stack using the sra-common-prerequisites-management-account-parameters.yaml template file as the source. - In the
management account (home region)
, launch the AWS CloudFormation Stack using the template file as the source from the below chosen options:- Option 1: (Recommended) Use this template, sra-common-prerequisites-main-ssm.yaml, for a more automated approach where CloudFormation parameters resolve SSM parameters.
- Option 2: Use this template, sra-common-prerequisites-main.yaml, where input is required for the CloudFormation parameters, without resolving SSM parameters.
-
Package the Lambda code into a zip file and upload the solution files (Lambda Zip files, CloudFormation templates, and other deployment files) to the SRA Staging S3 bucket (from above step), using the Packaging script.
-
SRA_REPO
environment variable should point to the folder whereaws-security-reference-architecture-examples
repository is stored. -
BUCKET
environment variable should point to the S3 Bucket where the solution files are stored. -
See CloudFormation Output from Step 1 in the Solution Deployment instructions. Or follow this syntax:
sra-staging-<CONTROL-TOWER-MANAGEMENT-ACCOUNT>-<CONTROL-TOWER-HOME-REGION>
# Example (assumes repository was downloaded to your home directory) export SRA_REPO="$HOME"/aws-security-reference-architecture-examples/aws_sra_examples export BUCKET=sra-staging-123456789012-us-east-1 sh "$SRA_REPO"/utils/packaging_scripts/stage_solution.sh \ --staging_bucket_name $BUCKET \ --solution_directory "$SRA_REPO"/solutions/common/common_prerequisites
# Use template below and set the 'SRA_REPO' and 'SRA_BUCKET' with your values. export SRA_REPO= export BUCKET= sh "$SRA_REPO"/utils/packaging_scripts/stage_solution.sh \ --staging_bucket_name $BUCKET \ --solution_directory "$SRA_REPO"/solutions/common/common_prerequisites
-