Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
21 commits
Select commit Hold shift + click to select a range
c55cf2d
Run nessus script installation daily, not hourly
brucehoff Nov 7, 2024
da1dfef
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Nov 14, 2024
5b04ff6
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Nov 16, 2024
3b977ee
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Dec 18, 2024
7eba7ec
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Dec 19, 2024
2a39c53
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Jan 9, 2025
ddc45d7
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Jan 16, 2025
dedce36
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Jan 25, 2025
81c6261
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Mar 8, 2025
0bb1257
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Apr 5, 2025
e3e4379
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Apr 24, 2025
ef16296
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff May 8, 2025
e968c04
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff May 15, 2025
2425330
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Jun 5, 2025
88f9cc9
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Jul 1, 2025
6b52705
Merge remote-tracking branch 'upstream/master'
brucehoff Jul 9, 2025
89fad2d
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Jul 9, 2025
73fcb5c
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Jul 11, 2025
43f17dc
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Jul 28, 2025
c2f44d1
Merge branch 'master' of https://github.com/Sage-Bionetworks-IT/organ…
brucehoff Aug 13, 2025
fd299e5
IT-4431: Activate IAM Access Analyzer on all accounts
brucehoff Aug 13, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion org-formation/077-macie/README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
### Purpose of these templates
The templates in this folder enables
The templates in this folder enable
[AWS Macie](https://docs.aws.amazon.com/macie/latest/user/what-is-macie.html)
across our AWS organization.

Expand Down
8 changes: 8 additions & 0 deletions org-formation/079-access-analyzer/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
### Purpose of these templates
The templates in this folder enable
[IAM Access Analyzer](https://aws.amazon.com/iam/access-analyzer/)
across our AWS organization.

IAM Access Analyzer is a security feature in AWS that helps you identify
and analyze potential access risks within your AWS environment by examining
your IAM policies and resource policies.
15 changes: 15 additions & 0 deletions org-formation/079-access-analyzer/_tasks.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
Parameters:
<<: !Include '../_parameters.yaml'

appName:
Type: String
Default: 'access_analyzer'

AccessAnalyzer:
Type: update-stacks
Template: access_analyzer.yaml
StackName: !Sub '${resourcePrefix}-${appName}'
StackDescription: Setup IAM Access Analyzer service
DefaultOrganizationBindingRegion: !Ref primaryRegion
DefaultOrganizationBinding:
Account: '*'
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this is the wrong approach. The recommended approach is to enable access analyzer from a delegated admin account.

here's the blog post: https://aws.amazon.com/blogs/aws/new-use-aws-iam-access-analyzer-in-aws-organizations/

Today I am pleased to announce that you can create an analyzer in the 
master account or a delegated member account with the entire organization as
the zone of trust.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@zaro0508 I read the links you shared, which seem to describe how to configure Access Analyzers that function at the organization level. In contrast, this PR create an access analyzer at the account level. Since MS Defender is examining the Synapse Prod account specifically, I believe the PR is correct.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Your PR description says.. activate access analyzer on all accounts. Are saying that you only want to enable access analyzer for Synapse Prod account?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@zaro0508 That's a good question: To satisfy MS Defender I think we would only have to active it on the Synapse Prod account, but my thought is to just activate it in all accounts so it's available if needed.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Isn't activating for all accounts is basically the same as enabling at the organziation level? if yes, then the latter is the recommended approach.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Isn't activating for all accounts is basically the same as enabling at the organziation level?

No, since each has a different "zone of trust" as mentioned in the blog you linked above:
https://aws.amazon.com/blogs/aws/new-use-aws-iam-access-analyzer-in-aws-organizations/

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe the zone of trust is just a access analyzer configuration. You can create multiple analyzers with different zone of trust levels. So I guess the real question is what is your intention for the zone of trust? Is your intention to create an access analyzer in each AWS account with a zone of trust set to just that account? Just be aware that we do have use AWS services that accesses resources across accounts for example: identity center, security hub, guard duty, etc..

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe the zone of trust is just a access analyzer configuration. You can create multiple analyzers with different zone of trust levels.

You can only create an analyzer with an organization level 'zone of trust' in the organization account (or perhaps in the delegated management account -- I haven't tried that.).

Is your intention to create an access analyzer in each AWS account with a zone of trust set to just that account?

Yes.

10 changes: 10 additions & 0 deletions org-formation/079-access-analyzer/access_analyzer.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
AWSTemplateFormatVersion: "2010-09-09"
Description: "Setup IAM Access Analyzer"
Resources:
AccessAnalyzer:
Type: AWS::AccessAnalyzer::Analyzer
Properties:
# External access analyzers help you identify potential risks of accessing
# resources by enabling you to identify any resource policies that grant access
# to an external principal.
Type: ACCOUNT
2 changes: 2 additions & 0 deletions org-formation/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,8 @@ prefixed with numbers to enforce the order they are deployed in.
Configure Security Hub for all accounts.
- 077 [Macie](./077-macie) \
Configure AWS Macie for all accounts.
- 079 [Access Analyzer](./079-access-analyzer) \
Configure IAM Access Analyzer for all accounts.
- 080 [AWS Config](./080-aws-config-inventory) \
Configure AWS Config for all accounts.
- 090 [Systems Manager](./090-systems-manager) \
Expand Down
5 changes: 5 additions & 0 deletions org-formation/_tasks.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,11 @@ Macie:
DependsOn: [ Types ]
Path: ./077-macie/_tasks.yaml

AccessAnalyzer:
Type: include
DependsOn: [ Types ]
Path: ./079-access-analyzer/_tasks.yaml

AwsConfigInventory:
Type: include
DependsOn: [ Types ]
Expand Down