Skip to content

Commit fd299e5

Browse files
committed
IT-4431: Activate IAM Access Analyzer on all accounts
1 parent c2f44d1 commit fd299e5

File tree

6 files changed

+41
-1
lines changed

6 files changed

+41
-1
lines changed

org-formation/077-macie/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
### Purpose of these templates
2-
The templates in this folder enables
2+
The templates in this folder enable
33
[AWS Macie](https://docs.aws.amazon.com/macie/latest/user/what-is-macie.html)
44
across our AWS organization.
55

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
### Purpose of these templates
2+
The templates in this folder enable
3+
[IAM Access Analyzer](https://aws.amazon.com/iam/access-analyzer/)
4+
across our AWS organization.
5+
6+
IAM Access Analyzer is a security feature in AWS that helps you identify
7+
and analyze potential access risks within your AWS environment by examining
8+
your IAM policies and resource policies.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
Parameters:
2+
<<: !Include '../_parameters.yaml'
3+
4+
appName:
5+
Type: String
6+
Default: 'access_analyzer'
7+
8+
AccessAnalyzer:
9+
Type: update-stacks
10+
Template: access_analyzer.yaml
11+
StackName: !Sub '${resourcePrefix}-${appName}'
12+
StackDescription: Setup IAM Access Analyzer service
13+
DefaultOrganizationBindingRegion: !Ref primaryRegion
14+
DefaultOrganizationBinding:
15+
Account: '*'
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
AWSTemplateFormatVersion: "2010-09-09"
2+
Description: "Setup IAM Access Analyzer"
3+
Resources:
4+
AccessAnalyzer:
5+
Type: AWS::AccessAnalyzer::Analyzer
6+
Properties:
7+
# External access analyzers help you identify potential risks of accessing
8+
# resources by enabling you to identify any resource policies that grant access
9+
# to an external principal.
10+
Type: ACCOUNT

org-formation/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ prefixed with numbers to enforce the order they are deployed in.
2828
Configure Security Hub for all accounts.
2929
- 077 [Macie](./077-macie) \
3030
Configure AWS Macie for all accounts.
31+
- 079 [Access Analyzer](./079-access-analyzer) \
32+
Configure IAM Access Analyzer for all accounts.
3133
- 080 [AWS Config](./080-aws-config-inventory) \
3234
Configure AWS Config for all accounts.
3335
- 090 [Systems Manager](./090-systems-manager) \

org-formation/_tasks.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,11 @@ Macie:
3636
DependsOn: [ Types ]
3737
Path: ./077-macie/_tasks.yaml
3838

39+
AccessAnalyzer:
40+
Type: include
41+
DependsOn: [ Types ]
42+
Path: ./079-access-analyzer/_tasks.yaml
43+
3944
AwsConfigInventory:
4045
Type: include
4146
DependsOn: [ Types ]

0 commit comments

Comments
 (0)