@@ -5,6 +5,160 @@ All notable changes to this project will be documented in this file.
5
5
The format is based on [ Keep a Changelog] ( https://keepachangelog.com/en/1.0.0/ ) ,
6
6
and this project adheres to [ Semantic Versioning] ( https://semver.org/spec/v2.0.0.html ) .
7
7
8
+
9
+ ## [ 1.5.0] - 2023-10-05
10
+
11
+ ### Added
12
+ - feat(backup) add Backup vault policy
13
+ - feat(config): allow users to set stack concurrency
14
+ - feat(config) M2131 WAF logging enabled
15
+ - feat(control-tower): add control tower controls
16
+ - feat(identity-center): add IdentityCenter extended permission set and assignment
17
+ - feat(logging): enable non-accelerator subscription filter destination replacement
18
+ - feat(logging): move larger CloudWatch logs payloads back into kinesis stream for re-ingestion
19
+ - feat(networking): add ability to reference dynamic configuration file replacements and license files for EC2 firewalls
20
+ - feat(networking): add dynamic EC2 firewall site-to-site VPN connections and configuration replacements
21
+ - feat(networking): add exclude regions for default VPC
22
+ - feat(networking): allow gateway and interface endpoint service customizations
23
+ - feat(networking): Created Shared ALB and supporting resources (ACM, Target Groups)
24
+ - feat(replacements): support Policy Replacements in VPC Endpoint policies
25
+ - feat(s3): allow import of S3 buckets
26
+ - feat(s3): support lifecycle rules for given prefix
27
+ - feat(security-hub): allow customers to disable Security Hub CloudWatch logs
28
+ - feat(service-catalog): support service catalog product constraints
29
+ - feat(ssm): allow SSM replacements through replacements-config.yaml
30
+ - feat(ssm): allow creation of custom SSM parameters
31
+ - feat(tags): Support Customer Tags
32
+ ### Changed
33
+ - enhancement(docs): add script to generate versioned TypeDocs
34
+ - enhancement(iam): make managed AD resolverRuleName property optional
35
+ - enhancement(networking): add ability to define advanced VPN tunnel configuration parameters
36
+ - enhancement(networking): add ability to dynamically reference same-VPC subnets as a route destination
37
+ - enhancement(networking): add ability to reference physical IDs for subnet availability zones and for Network Firewall endpoint lookups
38
+ - enhancement(networking): add AWSManagedAggregateThreatList to supported DNS firewall managed domain lists
39
+ - enhancement(pipeline): allow synth and deploy to write to stack specific directories
40
+ - enhancement(validation): Add config rule name validation
41
+ - enhancement(validation): add name uniqueness check for IAM policies and roles
42
+ - enhancement(validation): add validation for security delegated admin account
43
+ - chore(deps): bump semver to 7.5.2
44
+ - chore(deps): bump lerna to 7.2.0
45
+ - chore(deps): bump proxy-agent to 6.3.0
46
+ - chore(deps): bump aws-cdk to 2.93.0
47
+ - chore(docs): added instructions for validations and tests
48
+ - chore(docs): added documentation for excluded regions in audit manager
49
+ - chore(docs): document dynamic partitioning format in TypeDocs
50
+ - chore(docs): remove invalid targets for routeTableEntry
51
+ - chore(docs): update TransitGatewayAttachmentConfig docs to reflect subnet update behavior
52
+ - chore(docs): updated typedoc example for budget notifications
53
+ - chore(docs): update maxAggregationInterval to match appropriate unit
54
+ - chore(docs): VPC Flow Logs central logging method indicated service-native S3 logging
55
+ - chore(logging): add accelerator roles to central bucket policy
56
+ - chore(organizations): Moved getOrgId function to config
57
+ - chore(organizations): Removed Check for Tag and Backup policies in AWS GovCloud
58
+ - chore(test): update test pipeline lambda functions to Node.js 16 runtime
59
+ - chore(utils): moved chunkArray to utils
60
+ - chore(validation): Remove let from config validation
61
+ - chore: license file updates
62
+ - chore: refactor engine to reduce complexity
63
+ - chore: updated dependencies for aws-sdk
64
+ ### Fixed
65
+ - fix(accelerator-prefix): accelerator prefix remains hardcoded in some constructs
66
+ - fix(accounts): allow Control Tower account enrollment in GovCloud
67
+ - fix(acm): Duplicate certificate imported on CR update
68
+ - fix(applications): allow launchTemplates without userData, remove securityGroup checks
69
+ - fix(audit-manager): excluded regions list ignored in security audit stack
70
+ - fix(bootstrap): synth large environments runs out of memory
71
+ - fix(cdk): fixed promise bug for parallel deployments
72
+ - fix(cloudwatch): log replication with exclusion times out
73
+ - fix(cloudwatch): Updated logic to deploy CW log groups to OUs
74
+ - fix(customizations): make security groups optional in launch templates
75
+ - fix(deployment) - Enforce IMDS v2 for Managed Active Directory controlling EC2 instance
76
+ - fix(guardduty): create guardduty prefix in s3 destination when prefix deleted by life cycle policy
77
+ - fix(guardduty): support account create and delete actions for more than 50 accounts
78
+ - fix(guardduty): Delete publishing destination when enabled is false
79
+ - fix(guardduty): Updated createMembers function to use SDKv3
80
+ - fix(iam): remove permissive runInstance from policy
81
+ - fix(iam): add IAM validation for roles, groups, users to Policies
82
+ - fix(iam): failed to assume role with static partition
83
+ - fix(iam): Added error handling for service linked role already existing
84
+ - fix(iam): update boundary control policy IAM get user actions
85
+ - fix(identity-center): incorrect sso regional endpoint
86
+ - fix(identity-center): fix api rate exceeded issue
87
+ - fix(limits): Allow service quota limits to be defined with regions
88
+ - fix(logging): change kms key lookup for central bucket
89
+ - fix(logging): fixed logging stack deployment order
90
+ - fix(logging): central log bucket cmk role exists when centralized logging changed
91
+ - fix(logging): enable CloudWatch logging on Firehose
92
+ - fix(logging): Add prefix creation for imported central log buckets
93
+ - fix(logging): add firehose records processor to exclusion list default
94
+ - fix(logging): compress logs within lambda and set firehose transform to uncompressed
95
+ - fix(MAD): Remove key pair from MAD instance
96
+ - fix(networking): duplicate construct error when creating GWLB endpoints in multiple VPCs under the same account
97
+ - fix(networking): fix underscore subnet names
98
+ - fix(networking): Transit gateway peering fails when multiple accepter tgw has multiple requester
99
+ - fix(networking): Fixed IPv6 validation for Prefix Lists
100
+ - fix(networking): incorrect private hosted zones created for interface endpoint services with specific API subdomains
101
+ - fix(networking): AZ not defined error when outpost subnet is configured
102
+ - fix(networking): fixed isTarget conditions for target groups
103
+ - fix(networking): update regional conditions for shared ALBs
104
+ - fix(networking): EC2 firewall config replacements incorrectly matches multiple variables on a single line
105
+ - fix(networking): EC2 firewall config replacements missing hostname lookup
106
+ - fix(organizations): load ou units asynchronously
107
+ - fix(pipeline): useManagementAccessRole optional
108
+ - fix(pipeline): time out in CodePipeline Review stage
109
+ - fix(pipeline): change assume role behavior on management account
110
+ - fix(pipeline): add nagSupression to firewall service linked role
111
+ - fix(pipeline): toolkit does not use prefix variable
112
+ - fix(replacements): Updated generatePolicyReplacements arguments to include organization id
113
+ - fix(roles): add UUID to service linked role to prevent accidental deletion
114
+ - fix(roles): make security audit stack partition aware
115
+ - fix(roles): add delay on service linked role creation
116
+ - fix(roles): create service linked role in custom resource
117
+ - fix(saml): SAML login is hardcoded
118
+ - fix(s3): access logs bucket external policy fix
119
+ - fix(scp): scpRevertChanges should use accelerator prefix
120
+ - fix(security): bring your own KMS key cannot reference service-linked roles in key policy file
121
+ - fix(security): Increased memory for GuardDuty custom resource
122
+ - fix(security): custom config rule discarding triggering resource types
123
+ - fix(ssm): PutSsmParameter upgrade from v1.3.x to v1.4.2+ fails
124
+ - fix(ssm): Added check to see if roles exist before policy attachment
125
+ - fix(sso): Added validation to flag permission set assignments created for management account
126
+ - fix(tagging): Accel-P tag is appropriately set on resources
127
+ - fix(uninstaller) detach customer policies prior to delete
128
+ - fix(validation): Add config rule name validation
129
+ - fix(validation): validate certificate deployment target
130
+ - fix(validation): undefined Config remediation target account name causes false positive
131
+ ### Configuration Changes
132
+ - enhancement(aws-best-practices): Added README for Best Practices
133
+ - enhancement(aws-best-practices): Update Macie Permissions
134
+ - enhancement(aws-best-practices): apply SCPs to security OU
135
+ - enhancement(aws-best-practices-govcloud): update AWS GovCloud(US) configuration per FedRAMP assessment
136
+ - chore(education): migrate EDU sample configuration directory to external repository
137
+ - chore(elections): remove election sample directory
138
+ - chore(config): cccs/tse Config updates
139
+ ## [ 1.4.3] - 2023-07-19
140
+
141
+ ### Fixed
142
+ - fix(logging): cloudwatch logging, change log format in firehose to json
143
+ - fix(organizations): large OU organizations fail to load during prepare stage
144
+ - fix(networking): cannot provision new IPAM subnets when VPC has CIDRs from non-contiguous CIDR blocks
145
+ - fix(networking): Modify Transit Gateway resource lookup construct ids
146
+ - fix(validate-config): ValidateEnvironmentConfig improperly evaluates enrolled CT accounts as not enrolled
147
+
148
+ ### Configuration Changes
149
+ - chore(aws-best-practices-tse-se): include granular billing SCP permission updates
150
+ - chore(aws-best-practices-cccs-medium): include granular billing SCP permission updates
151
+
152
+ ## [ 1.4.2] - 2023-06-16
153
+
154
+ ### Fixed
155
+
156
+ - fix(ssm): PutSsmParameters custom resource ignores new accounts
157
+ - chore(organizations): moved getOrganizationId to organizations-config
158
+ - fix(iam): service linked roles fail to create in multi-region deployment
159
+ - fix(validation): TGW route validation fails when prefixList deployment targets do not have excluded regions
160
+ - fix(validation): incorrectly configured security delegated admin account isn’t caught by validation
161
+ - fix(docs): README indicates S3 server access logs are replicated to central logs bucket
8
162
## [ 1.4.1] - 2023-05-18
9
163
10
164
### Fixed
0 commit comments