Skip to content

Releases: awslabs/landing-zone-accelerator-on-aws

v1.2.2

15 Nov 22:48

Choose a tag to compare

Important

This release fixes an issue with the deployment of AWS Budgets, and only affects customers that have deployed an AWS Budget, with multiple enabled regions defined in their global-config.yaml, and are using v1.2.1.

In v1.2.1, the definition of AWS Budgets was not limited to only the home region, which caused the object to be deployed to multiple regions. In this release, logic has been added to ensure that AWS Budgets are only added in the defined home region.
These steps are required for if you currently have an AWS Budget deployed through LZA release/v1.2.1:

  1. In the AWS console, delete the existing budget within management or any other account where a budget was deployed.
  2. Go into the LZA config repository and remove (or comment out) budgets from the config.
  3. Update to this version (release/v1.2.2) by updating the branch name for your InstallerStack through the AWS CloudFormation console.
  4. Release the changes to the LZA pipeline within the AWS console once to ensure that the current budget is removed from the account.
  5. Once the pipeline has completed, add the budgets back into the global-config.yaml file and release the CodePipeline for LZA

Changed

  • fix(app) wrap execution in try/catch to surface errors
  • fix(budgets) budgets causing operations stack to fail

We highly recommend that you keep your environments up to date by upgrading to the latest version. To upgrade your environments to this version, use the CloudFormation console to update your AWSAccelerator-Installer stack using the latest installer template and ensure that that you set Branch Name to the latest version (release/v1.2.2 for this release)

v1.2.1

13 Oct 15:10

Choose a tag to compare

Added

  • feat(govcloud): add updated govcloud config files
  • feat(govcloud): add govcloud account vending service catalog product
  • feat(configs): add healthcare best practices config files
  • feat(configs): add support aws-cn and config files

Changed

  • fix(cloudwatch): change security config to support CT organization-level cloudtrail log metrics creation
  • fix(logging): cloudwatch log replication in aws-us-gov partition
  • fix(config): syntax error AWS GovCloud (US) config
  • fix(bootstrap): cdk centralization bug fix
  • fix(logging): move session manager principal access
  • fix(security): update package dependencies
  • fix(installer): solution-helper is emitting delete event
  • fix(installer): remove installer kms key from loggroup
  • fix(logging): log replication KMS created in log receiving account only
  • fix(config): update network config to align with best practices diagram
  • fix(logging): set resource dependence for accountTrail CloudWatch log group.
  • fix (pipeline): fix issue with changeset creation and bootstrap

v1.2.0

23 Sep 00:16

Choose a tag to compare

Added

  • feat(iam): add path property to IAM RoleSets
  • feat(logging): Allow configuration of CloudTrail Insights and configuration of Organization Trail
  • feat(logging): Centralized Logging
  • feat(network): add ability to configure Gateway Load Balancer
  • feat(network): AWS Outpost Support
  • feat(network): Add ability to configure Direct Connect
  • feat(network): add ability to define gateway route tables
  • feat(organizations): Update guardrail scp to include CloudTrail and CloudWatch Logs
  • feat(partition): add support for aws-iso-b
  • feat(s3): Apply Lifecycle Rules to Central Log Bucket
  • feat(security): localize KMS key for every environment and service
  • feat(security): Add Custom KMS CMKs
  • enhancement(network): Add tags to RAM shared subnets/vpc

Changed

  • fix(budgets): Budget reports deployment targets bug
  • fix(config): add checks for OU presence in organization config file from other config files where OUs are referred
  • fix(config): Fix issues in network-config.yaml reference
  • fix(iam): iam user password is not set properly
  • fix(iam): Cross Account SSM parameter role creates in every region
  • fix(installer): Updating git Personal Access Token not working once it's expired
  • fix(installer): Fix duplicate execution of pipeline
  • fix(logging):Update sessionmanager logging
  • fix(logging): Existing organization trail fails in organization stack
  • fix(logging) - lambdaKey lookup only in homeRegion
  • fix(network): VPC templates rework
  • fix(network): Fix bug with tcpFlags and source/destination bug with network firewall
  • fix(network): move endpoint creation to new GWLB-specific stack
  • fix(network): allow multiple VPCs to fetch a RAM share ID for the same IPAM pool or network firewall policy
  • fix(network): VPC flowlog bucket exists failure when network-vpc stack updates with new vpc with s3 flow log destination
  • fix(s3): added error logic for expiration values
  • fix(security) AWS Macie ExportConfigClassification fails when new account added
  • fix(security): Check keyManagementService for undefined
  • fix(security): permissions for CrossAccountAcceleratorSsmParamAccessRole
  • fix(security): When excluded in config, do not enable the automatically enabled standards for security hub
  • fix(security): Fix issue with GuardDuty S3 protection not enabled in all accounts
  • fix(security): Empty EBS encryption key in default config file causes pipeline failure
  • fix(installer): Enable pipeline notification only for the regions that support AWS CodeStar
  • chore(build): upgrade to cdk v2.28.0

v1.1.0

04 Aug 16:05

Choose a tag to compare

Added

  • feat(auditmanager): add support to enable AWS Audit Manager
  • feat(cloudformation): enable termination protection for all stacks
  • feat(config): Add the ability to add tags to AWS Config rules
  • feat(controltower): add drift detection for AWS Control Tower
  • feat(detective): add support to enable Amazon Detective
  • feat(installer): add ability to launch the accelerator pipeline at completion of installer pipeline
  • feat(network): add managed prefix list as a destination in subnet and tgw route tables
  • feat(network): add ability to define Amazon Route 53 resolver SYSTEM rules
  • feat(vpc): add ability to use IPAM address pools
  • enhancement: add AWS GovCloud (US) sample configuration

Changed

  • fix(organizations): security services Amazon GuardDuty, Amazon Macie, and AWS Security Hub failing when multiple new regions registered
  • fix(organizations): fix organizational unit creation and GovCloud account add to organization
  • fix(iam): fix failing pipeline tests due to service linked role descriptions
  • fix(network): vpc interface endpoints workflows for GovCloud
  • fix(network): outbound NACL entries causing duplicate entry error
  • fix(network): Add check for route entry types in network-vpc stack
  • fix(route53): add uuid to r53association custom resource to force reevaluation
  • enhancement(network): make route table target property optional
  • enhancement(budget): budgets scope based on account or ou
  • enhancement(backup): update backup vaults to use the accelerator key
  • enhancement(pipeline): move config lint checks to build stage
  • enhancement(organizations): add pitr to config table
  • chore(build): update to javascript sdk v2.1152.0
  • chore(build): upgrade to cdk v2.25.0
  • chore(build): update lerna to 5.1.8
  • chore(readme): update installer stack instructions
  • chore(iam): Update default boundary policy to require MFA
  • chore(installer): Added email constraints for installer stack

v1.0.1

10 Jun 17:15

Choose a tag to compare

Changed

  • fix(installer): require branch param in installer
  • fix(accounts): accounts stack fails in GovCloud when enabling SERVICE_CONTROL_POLICY type
  • enhancement: added more explicit error message in account config
  • fix(controltower): support creation of new account in nested OU with Control Tower

See changelog for more information.

v1.0.0

23 May 12:47

Choose a tag to compare

Added

  • All files, initial version

See changelog for more information.