Skip to content

Latest commit

 

History

History
273 lines (238 loc) · 25.4 KB

customization-index.md

File metadata and controls

273 lines (238 loc) · 25.4 KB

1. Accelerator Configuration File Customization and Sample Configs

1.1. Sample Accelerator Configuration Files

Summary

  • Sample config files can be found in this folder
    • Most of the examples reflect a Medium Security profile (NIST, ITSG, FEDRAMP)
  • Unsure where to start, use the config.lite-CTNFW-example.json file (the CT w/NFW variant of option 2)
  • Frugal and want something comprehensive to experiment with, use the config.test-example.json file (option 5)

Samples with Descriptions

  1. Full configuration file (config.example.json)
    • The full configuration file was based on feedback from customers moving into AWS at scale and at a rapid pace. Customers of this nature have indicated that they do not want to have to upsize their perimeter firewalls or add Interface endpoints as their developers start to use new AWS services. These are the two most expensive components of the deployed architecture solution.
    • Default settings:
      • AWS Control Tower: No
      • Firewall: IPSec VPN with Active/Active Fortinet cluster (uses BGP+ECMP)
  2. Lite weight configuration files
    • Four variants with differing central ingress/egress firewalls
      • Variant 1: Recommended starting point (config.lite-CTNFW-example.json)
        • Default Settings:
          • AWS Control Tower: Yes
          • Firewall: AWS Network Firewall
      • Variant 2: Recommended for new GC PBMM customers (config.lite-VPN-example.json)
        • requires 3rd party licensing (BYOL or PAYGO)
        • Default Settings:
          • AWS Control Tower: No
          • Firewall: IPSec VPN with Active/Active Fortinet cluster (uses BGP+ECMP)
      • Variant 3: (config.lite-NFW-example.json)
        • Same as Variant 1 config without AWS Control Tower
        • Default Settings:
          • AWS Control Tower: No
          • Firewall: AWS Network Firewall
      • Variant 4: (config.lite-GWLB-example.json)
        • requires 3rd party licensing (BYOL or PAYGO)
        • Default Settings:
          • AWS Control Tower: No
          • Firewall: Gateway Load Balancer with Checkpoint firewalls in an autoscaling group
    • To reduce solution costs and allow customers to grow into more advanced AWS capabilities, we created these lite weight configurations that does not sacrifice functionality, but could limit performance. These config files:
      • only deploys the 9 required centralized Interface Endpoints (removes 50 from full config). All services remain accessible using the AWS public endpoints, but require traversing the perimeter firewalls
      • removes the perimeter VPC Interface Endpoints
      • reduces the Fortigate instance sizes from c5n.2xl to c5n.xl (VM08 to VM04) in Variant 2: IPSec VPN with Active/Active Fortinet cluster option
      • removes the Unclass ou and VPC
      • AWS Control Tower can be implemented in all sample configs using Variant 1: AWS Control Tower with AWS Network Firewall as an example (new installs only).
    • The Accelerator allows customers to easily add or change this functionality in future, as and when required without any impact
  3. Ultra-Lite sample configuration
    • Variant 1: (config.ultralite-CT-example.json)
      • AWS Control Tower: Yes
      • Firewall: None
      • Networking: None
    • Variant 2 : (config.ultralite-example.json)
      • AWS Control Tower: No
      • Firewall: None
      • Networking: None
    • This configuration file was created to represent an extremely minimalistic Accelerator deployment, simply to demonstrate the art of the possible for an extremely simple config. This example is NOT recommended as it violates many AWS best practices. This This config has:
      • no shared-network or perimeter accounts
      • no networking (VPC, TGW, ELB, SG, NACL, endpoints) or route53 (zones, resolvers) objects
      • no Managed AD, AD Connector, rsyslog cluster, RDGW host, or 3rd party firewalls
      • only enables/deploys AWS security services in 2 regions (ca-central-1, us-east-1) (Not recommended)
      • only deploys 2 AWS config rules w/SSM remediation
      • renamed log-archive (Logs), security (Audit) and operations (Ops) account names
  4. Multi-Region sample configuration file (config.multi-region-example.json)
    • This configuration file was created to represent a more advanced multi-region version of the Full configuration file from bullet 1 above. This config:
      • adds a TGW in us-east-1, peered to the TGW in ca-central-1
      • adds TGW static routes, including several dummy sample static routes
      • adds a central Endpoint VPC in us-east-1 with us-east-1 endpoints configured
      • adds a shared VPC for all UnClass OU accounts in us-east-1, connected to the us-east-1 TGW (accessible through ca-central-1)
        • creates additional zones and resolver rules
      • Sends us-east-1 CloudWatch Logs to the central S3 log-archive bucket in ca-central-1
      • Deploys SSM documents to us-east-1 and remediates configured rules in UnClass OU
      • adds a local account specific VPC, in us-east-1, in the account MyUnClass and connects it to the us-east-1 TGW (i.e. shares TGW)
        • local account VPC set to use central endpoints, associates appropriate centralized hosted zones to VPC (also creates 5 local endpoints)
      • adds a VGW for DirectConnect to the perimeter VPC
      • adds the 3rd AZ in ca-central-1 (MAD & ADC in AZ a & b)
    • Default Settings:
      • AWS Control Tower: No
      • Firewall: IPSec VPN with Active/Active Fortinet cluster (uses BGP+ECMP)
  5. Test configuration file (config.test-example.json) (Use for testing Full/Lite configurations or Low Security Profiles)
    • Further reduces solution costs, while demonstrating full solution functionality (NOT recommendend for production). This config file:
      • uses the Lite weight configuration as the starting point (NFW variant)
      • consolidates Dev/Test/Prod OU to a single Workloads OU/VPC
      • only enables Security Hub, Config and Macie in ca-central-1 and us-east-1
      • removes the Fortigate firewall cluster (per NFW variant)
      • removes the rsyslog cluster
      • reduces the RDGW instance sizes from t2.large to t2.medium
      • reduces the size of the MAD from Enterprise to Standard edition
      • removes the on-premise R53 resolvers (hybrid dns)
      • reduced various log retention periods and the VPCFlow log interval
      • removes the two example workload accounts
      • adds AWS Network Firewall (NFW) and AWS NATGW for centralized ingress/egress (per NFW variant)
    • Default Settings:
      • AWS Control Tower: No
      • Firewall: AWS Network Firewall

1.2. Deployment Customizations

  • Multi-file config file and YAML formatting option

    • The sample configuration files are provided as single, all encompassing, json files. The Accelerator also supports both splitting the config file into multiple component files and configuration files built using YAML instead of json. Details can be found in the linked document.
  • Sample Snippets

    • The sample configuration files do not include the full range of supported configuration file parameters and values, additional configuration file parameters and values can be found in the sample snippets document.
  • Third Party Firewall example configs:

    • The Accelerator is provided with a sample 3rd party configuration file to demonstrate automated deployment of 3rd party firewall technologies. Given the code is vendor agnostic, this process should be able to be leveraged to deploy other vendors firewall appliances. When and if other options become available, we will add them here as well.

1.3. Other Configuration File Hints and Tips

  • It is critical that all accounts that are leveraged by other accounts (i.e. accounts that any workload accounts are dependant on), are included in the mandatory-accounts section of the config file (i.e. shared-network, log-archive, operations)
  • Account pointers within the config file point to the account key (i.e. (mandatory-account-configs\account-key) and NOT the account name field (mandatory-account-configs\account-key\account-name: "account name"). This allows for easy account names, duplicate account names, and no requirement to update account pointers during account renames.
  • If any of the account pointers within global-options does not point to a valid mandatory account key, the State Machine will fail with the error EnvironmentVariable value cannot be null before starting CodeBuild Phase -1
  • You cannot supply (or change) configuration file values to something not supported by the AWS platform
    • For example, CWL retention only supports specific retention values (not any number)
    • Shard count - can only increase/reduce by half the current limit. i.e. you can change from 1-2, 2-3, 4-6
  • Always add any new items to the END of all lists or sections in the config file, otherwise
    • Update validation checks will fail (VPC's, subnets, share-to, etc.)
  • To skip, remove or uninstall a component, you can often simply change the section header, instead of removing the section
    • change "deployments"/"firewalls" to "deployments"/"xxfirewalls" and it will uninstall the firewalls and maintain the old config file settings for future use
    • Objects with the parameter deploy: true, support setting the value to false to remove the deployment
  • As you grow and add AWS accounts, the Kinesis Data stream in the log-archive account will need to be monitored and have its capacity (shard count) increased by setting "kinesis-stream-shard-count" variable under "central-log-services" in the config file
  • Updates to NACL's requires changing the rule number (100 to 101) or they will fail to update
  • When adding a new subnet or subnets to a VPC (including enabling an additional AZ), you need to:
    • increment any impacted NACL id's in the config file (100 to 101, 32000 to 32001) (CFN does not allow nacl updates)
    • make a minor change to any impacted route table names (MyRouteTable to MyRouteTable1) (CFN does not allow updates to route table associated ids)
  • The sample VPN firewall configuration uses an instance with 4 NIC's, make sure you use an instance size that supports 4 ENI's
  • Firewall names, CGW names, TGW names, MAD Directory ID, account keys, and OU's must all be unique throughout the entire configuration file (also true for VPC names given NACL and security group referencing design)
  • The configuration file does have validation checks in place that prevent users from making certain major unsupported configuration changes
  • The configuration file does NOT have extensive error checking. It is expected you know what you are doing. We eventually hope to offer a config file, wizard based GUI editor and add the validation logic in this separate tool. In most cases the State Machine will fail with an error, and you will simply need to troubleshoot, rectify and rerun the state machine.
  • You cannot move an account between top-level OU's. This would be a security violation and cause other issues. You can move accounts between sub-ou. Note: The Control Tower version of the Accelerator does NOT support sub-ou's.
  • When using YAML configuration files, we only support the subset of yaml that converts to JSON (we do not support anchors)
  • Security Group names were designed to be identical between environments, if you want the VPC name in the SG name, you need to do it manually in the config file
  • Adding more than approximately 50 new VPC Interface Endpoints across all regions in any one account in any single state machine execution will cause the state machine to fail due to Route 53 throttling errors. If adding endpoints at scale, only deploy 1 region at a time. In this scenario, the stack(s) will fail to properly delete, also based on the throttling, and will require manual removal.
  • We do not support Directory unsharing or ADC deletion, delete methods were not implemented. We only support ADC creation in mandatory accounts.
  • If use-central-endpoints is changed from true to false, you cannot add a local vpc endpoint on the same state machine execution (add the endpoint on a prior or subsequent execution)
  • If you update the 3rd party firewall names, be sure to update the routes and alb's which point to them. Firewall licensing occurs through the management port, which requires a VPC route back to the firewall to get internet access and validate the firewall license.
  • Removing the AWS NFW requires 2 state machine executions, in the first you must remove all routes that reference the NFW, and in the second you can remove or xx out the NFW (also true for the GWLB implementation ).

1.4. Config file and Deployment Protections

  • The config file is moved to AWS CodeCommit after the first execution of the state machine to provide strong configuration history, versioning and change control
  • After each successful state machine execution, we record the commit id of the config file used for that execution in secrets manager
  • On every state machine execution, before making any changes, the Accelerator compares the latest version of the config file stored in CodeCommit with the version of the config file from the last successful state machine execution (after replacing all variables)
  • If the config file includes any changes we consider to be significant or breaking, we immediately fail the state machine
    • if a customer somehow accidentally uploads a different customers config file into their Accelerator CodeCommit repository, the state machine will fail
    • if a customer makes what we consider to be a major change to the config file, the state machine will fail
    • if a customer makes a change that we believe has a high likelihood to cause a deployment failure, the state machine will fail
  • If a customer believes they understand the full implications of the changes they are making (and has made any required manual changes to allow successful execution), we have provided protection override flags. These overrides should be used with extremely caution:
    • To provide maximum protection we have provided scoped override flags. Customers can provide a flag or flags to only bypass specific type(s) of config file validations or blocks. If using an override flag, we recommend customers use these scoped flags in most situations.
    • If a customer is purposefully making extensive changes across the config file and wants to simply override all checks with a single override flag, we also have this option, but discourage it use.
    • The various override flags and their format can be found in here.

1.5. Summary of Example Config File Minimum Changes for New Installs

At a minimum you should consider reviewing the following config file sections and make the required changes.

1.5.1. Global Options

  • S3 Central Bucket
    • global-options/central-bucket: "AWSDOC-EXAMPLE-BUCKET"
    • replace with your-bucket-name as referenced in the Installation Guide S3 Creation - Step #5
  • Central Log Services SNS Emails
    • global-options/central-log-services/sns-subscription-emails: "[email protected]"
    • update the 3 email addresses (high, medium and low) as required. Each address will receives alerts or alarms of the specified level. The same email address can be used for all three.
  • The default dynamic CIDR pools (global-options/cidr-pools) listed below are used to assign ranges based on the subnet mask set in each VPC and subnet throughout the configuration file.
    • global-options/cidr-pools/0/cidr: "10.0.0.0/13"
      • The main address pool used to dynamically assign CIDR ranges for most VPCs
    • global-options/cidr-pools/1/cidr: "100.96.252.0/23"
      • Address pool used to dynamically assign CIDR ranges for the Managed Active Directory subnets in the Ops account
    • global-options/cidr-pools/2/cidr: "100.96.250.0/23"
      • Address pool used to dynamically assign CIDR ranges for the Perimeter VPC
    • global-options/cidr-pools/3/cidr: "10.249.1.0/24"
      • A non-routable pool of addresses used to dynamically assign CIDR ranges for the Active Directory Connector subnets in the Organization Management/root account

1.5.2. Mandatory Account Configs

  • All mandatory accounts specific to your config file, that are present under the mandatory-account-config section require you to assign a unique email address for each account listed below. Replace the email values in the JSON config file for these accounts with unique email addresses.

    • mandatory-account-configs/shared-network/email: "myemail+aseaT-network@example.com---------------------REPLACE------------"
    • mandatory-account-configs/operations/email: "myemail+aseaT-operations@example.com---------------------REPLACE------------"
    • mandatory-account-configs/perimeter/email: "myemail+aseaT-perimeter@example.com---------------------REPLACE------------"
    • mandatory-account-configs/management/email: "myemail+aseaT-management@example.com---------------------REPLACE------------" (Note: This is the email of your root account)
    • mandatory-account-configs/log-archive/email: "myemail+aseaT-log@example.com---------------------REPLACE------------"
    • mandatory-account-configs/security/email: "myemail+aseaT-sec@example.com---------------------REPLACE------------"
  • Budget Alerts email addresses need to be replaced with an email address in your organization. It can be the same email address for all budget alerts. Config located at the following path (Multiple exist for different thresholds, update all under each account):

  • For the shared-network account, review and update the following (or delete the sections):

    • mandatory-account-configs/shared-network/vpc/on-premise-rules/zone: "on-premise-privatedomain1.example.ca" (qty 2)
    • mandatory-account-configs/shared-network/vpc/zones/private: "cloud-hosted-privatedomain.example.ca"
    • mandatory-account-configs/shared-network/vpc/zones/public: "cloud-hosted-publicdomain.example.ca"
  • For the operations account, review and update the following:

    • mandatory-account-configs/operations/deployments/mad/dns-domain: "example.local"
    • mandatory-account-configs/operations/deployments/mad/netbios-domain: "example"
    • mandatory-account-configs/operations/deployments/mad/log-group-name: "/${ACCELERATOR_PREFIX_ND}/MAD/example.local" (replace example.local)
    • mandatory-account-configs/operations/deployments/mad/ad-users (update user, email and group of each user as required)
      • do not remove or change permissions on the adconnector-usr
  • For perimeter account, review and update the following:

    • mandatory-account-configs/perimeter/certificates/priv-key: "certs/example1-cert.key"

    • mandatory-account-configs/perimeter/certificates/cert: "certs/example1-cert.crt"

    • If you are using VPN config:

      • mandatory-account-configs/perimeter/deployments/firewalls/image-id: "ami-0d8e2e78e928def11"
        • Update AMI with the AMI collected from the Marketplace for Fortinet FortiGate (BYOL) Next-Generation Firewall
      • mandatory-account-configs/perimeter/deployments/xxfirewall-manager/image-id: "ami-0e9f45c3ec34c3a9a"
        • Update AMI with the AMI collected from the Marketplace for Fortinet FortiManager (BYOL) Centralized Security Management
        • NOTE: Default config of "xxfirewall-manager" will prevent the firewall manager from being deployed. To deploy the firewall manager remove the "xx" to set the parameter to "firewall-manager"
      • mandatory-account-configs/perimeter/deployments/firewalls/license: ["firewall/license1.lic", "firewall/license2.lic"]
        • Two Fortinet FortiGate firewall licenses, if you don't have any license files, update the config file with an empty array ("license": []). Do NOT use the following: [""]
        • Place files in a folder (eg. firewall) in the same S3 bucket in your Organization Management account as the deployment configuration file.
      • mandatory-account-configs/perimeter/deployments/firewalls/config: "firewall/firewall-example.txt"
        • The Fortinet configuration file to initially configure the firewalls. Sample configuration files can be found in the reference-artifacts/Third-Party folder
        • Place file in a folder (eg. firewall) in the same S3 bucket in your Organization Management account as the deployment configuration file.
    • If you are using GWLB config:

      • mandatory-account-configs/perimeter/deployments/firewalls/Checkpoint-Firewall - image-id: "ami-0217611bf09d5b4c1"
        • Update AMI with the AMI collected from the Marketplace for CloudGuard Network Security for GWLB - BYOL
      • mandatory-account-configs/perimeter/deployments/firewall-manager/image-id: "ami-0071a3b4ef9ac766a"
        • Update AMI with the AMI collected from the Marketplace for Checkpoint Security Management
      • mandatory-account-configs/perimeter/deployments/firewall-manager/version: "R8110BYOLMGMT"
        • Update version based on the selected ami-id version from the Private Marketplace
  • For management, review and update the following:

    • mandatory-account-configs/management/account-name: "ASEA-Main"
      • Update this field with your Organization Management (root) account name, if it is not set to ASEA-Main.
    • mandatory-account-configs/management/iam/users
      • the names of your break-glass and ASEA operation users

1.5.3. Workload Account Configs

As mentioned in the Installation Guide, we recommend not adding more than 1 or 2 workload accounts to the config file during the initial deployment as it will increase risks of hitting a limit. Once the Accelerator is successfully deployed, add the additional accounts back into the config file and rerun the state machine.

  • Review the workload accounts in the config that you selected and change the name and email as desired
    • Modify mydevacct1 with the account name of your choosing
    • Modify mydevacct1/account-name: "MyDev1" with the account name
    • Modify mydevacct1/email: "myemail+aseaT-dev1@example.com---------------------REPLACE------------" with a unique email address for the account
    • Modify mydevacct1/description: "This is an OPTIONAL SAMPLE workload account..." with a description relevant to your account
    • Modify mydevacct1/ou: "Dev" with the OU that you would like the account to be attached to

1.5.4. Organization Units

  • For all organization units, update the budget alerts email addresses:
  • For organization units with certificates, review the certificates and update as you see fit. These certificates are used in the alb section under alb/cert-name of each OU

2. State Machine Behavior


...Return to Accelerator Table of Contents