You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
https://www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin[vulnerabilities with the cellular system],
984
984
so using a virtual or hardware MFA device is preferable; that said, MFA with SMS is still better than no MFA at all.
985
985
986
-
=== Apply the security baseline to the root account
986
+
=== Configure the security baseline for the root account
987
987
988
-
Next, we'll apply a security baseline to the root account that is responsible for creating all the child accounts.
988
+
Next, we'll configure a security baseline for the root account that is responsible for creating all the child accounts.
989
989
It will also configure AWS Organizations, IAM Roles, IAM Users, IAM Groups, IAM Password Policies, Amazon GuardDuty,
990
990
AWS CloudTrail and AWS Config.
991
991
992
-
Let's first apply the security baseline by using the `account-baseline-root` module from https://github.com/gruntwork-io/module-security[module-security].
992
+
We'll be using the `account-baseline-root` module from https://github.com/gruntwork-io/module-security[module-security].
993
993
994
994
[.exceptional]
995
995
IMPORTANT: You must be a [js-subscribe-cta]#Gruntwork subscriber# to access `module-security`.
@@ -1360,9 +1360,20 @@ repo, setting the `ref` param to the version you released earlier:
IMPORTANT: We **strongly** recommend setting Terraform parallelism to a low value (e.g., `-parallelism=2`), as shown above, with the `account-baseline-xxx` modules. This is because these modules deploy multi-region resources (e.g., GuardDuty, AWS Config, etc), and for each region, Terraform spins up a separate process, so if you don't limit the parallelism, it may peg all your CPU cores and lead to network connectivity errors.
1376
+
1366
1377
Set the variables for the `account-baseline-root` module in this environment in the `inputs = { ... }` block of `terragrunt.hcl`:
IMPORTANT: We **strongly** recommend setting Terraform parallelism to a low value (e.g., `-parallelism=2`) with the `account-baseline-xxx` modules. This is because these modules deploy multi-region resources (e.g., GuardDuty, AWS Config, etc), and for each region, Terraform spins up a separate process, so if you don't limit the parallelism, it may peg all your CPU cores and lead to network connectivity errors.
1551
+
You should get a whole bunch of log output, including something that looks like this:
Where `<ACCOUNT_NAME>` is the name you used for the account in the `child_accounts` variable and `<ACCOUNT_ID>` is the
1667
+
12-digit ID of that AWS account.
1668
+
1669
+
Once you're done importing, you'll want to undo the `aws-provider-patch` workaround. The easiest way to do that is to
1670
+
delete the `.terraform` or `.terragrunt-cache` folders to remove any locally cached modules, as they would've been
1671
+
modified by the `aws-provider-patch` command.
1672
+
1673
+
[source,bash]
1674
+
----
1675
+
rm -rf .terragrunt-cache
1676
+
----
1677
+
1678
+
=== Apply the security baseline to the root account
1679
+
1680
+
You're now ready to apply the security baseline to the root account. You should be authenticated as the same IAM user
1681
+
in the root account as in the previous two sections. To apply the security baseline, you run `terragrunt apply`:
1682
+
1683
+
[source,bash]
1684
+
----
1685
+
cd infrastructure-live/root/_global/account-baseline
1686
+
aws-vault exec root-iam-user -- terragrunt apply
1687
+
----
1514
1688
1515
1689
[.exceptional]
1516
1690
IMPORTANT: On some operating systems, such as MacOS, you may also need to increase your open files limit to avoid "pipe: too many open files" errors by running: `ulimit -n 1024`.
@@ -1837,9 +2011,20 @@ repo, setting the `ref` param to the version you released earlier:
IMPORTANT: We **strongly** recommend setting Terraform parallelism to a low value (e.g., `-parallelism=2`), as shown above, with the `account-baseline-xxx` modules. This is because these modules deploy multi-region resources (e.g., GuardDuty, AWS Config, etc), and for each region, Terraform spins up a separate process, so if you don't limit the parallelism, it may peg all your CPU cores and lead to network connectivity errors.
2027
+
1843
2028
Set the variables for the `account-baseline-app` module in this environment in the `inputs = { ... }` block of `terragrunt.hcl`:
IMPORTANT: We **strongly** recommend setting Terraform parallelism to a low value (e.g., `-parallelism=2`) with the `account-baseline-xxx` modules. This is because these modules deploy multi-region resources (e.g., GuardDuty, AWS Config, etc), and for each region, Terraform spins up a separate process, so if you don't limit the parallelism, it may peg all your CPU cores and lead to network connectivity errors.
1944
-
1945
2128
IMPORTANT: On some operating systems, such as MacOS, you may also need to increase your open files limit to avoid "pipe: too many open files" errors by running: `ulimit -n 1024`.
1946
2129
1947
2130
=== Apply the security baseline to the security account
@@ -2376,9 +2559,20 @@ repo, setting the `ref` param to the version you released earlier:
IMPORTANT: We **strongly** recommend setting Terraform parallelism to a low value (e.g., `-parallelism=2`), as shown above, with the `account-baseline-xxx` modules. This is because these modules deploy multi-region resources (e.g., GuardDuty, AWS Config, etc), and for each region, Terraform spins up a separate process, so if you don't limit the parallelism, it may peg all your CPU cores and lead to network connectivity errors.
2575
+
2382
2576
Set the variables for the `account-baseline-security` module in this environment in the `inputs = { ... }` block of `terragrunt.hcl`:
IMPORTANT: We **strongly** recommend setting Terraform parallelism to a low value (e.g., `-parallelism=2`) with the `account-baseline-xxx` modules. This is because these modules deploy multi-region resources (e.g., GuardDuty, AWS Config, etc), and for each region, Terraform spins up a separate process, so if you don't limit the parallelism, it may peg all your CPU cores and lead to network connectivity errors.
2542
-
2543
2734
[.exceptional]
2544
2735
IMPORTANT: On some operating systems, such as MacOS, you may also need to increase your open files limit to avoid "pipe: too many open files" errors by running: `ulimit -n 1024`.
2545
2736
@@ -2586,9 +2777,20 @@ repo, setting the `ref` param to the latest version:
IMPORTANT: We **strongly** recommend setting Terraform parallelism to a low value (e.g., `-parallelism=2`), as shown above, with the `account-baseline-xxx` modules. This is because these modules deploy multi-region resources (e.g., GuardDuty, AWS Config, etc), and for each region, Terraform spins up a separate process, so if you don't limit the parallelism, it may peg all your CPU cores and lead to network connectivity errors.
2793
+
2592
2794
Set the variables for the `account-baseline-app` module in this environment in the `inputs = { ... }` block of `terragrunt.hcl`:
IMPORTANT: We **strongly** recommend setting Terraform parallelism to a low value (e.g., `-parallelism=2`) with the `account-baseline-xxx` modules. This is because these modules deploy multi-region resources (e.g., GuardDuty, AWS Config, etc), and for each region, Terraform spins up a separate process, so if you don't limit the parallelism, it may peg all your CPU cores and lead to network connectivity errors.
2701
-
2702
2901
[.exceptional]
2703
2902
IMPORTANT: On some operating systems, such as MacOS, you may also need to increase your open files limit to avoid "pipe: too many open files" errors by running: `ulimit -n 1024`.
0 commit comments