AWS Root Account baseline wrapper
A security baseline for AWS Landing Zone for configuring the root account (AKA master account) of an AWS Organization, including setting up child accounts, AWS Config, AWS CloudTrail, Amazon Guard Duty, IAM users, IAM groups, IAM password policy, and more.
View on GitHubReference
- Inputs
- Outputs
additional_config_rules
— Map of additional managed rules to add. The key is the name of the rule (e.g. ´acm-certificate-expiration-check´) and the value is an object specifying the rule details
allow_auto_deploy_from_other_account_arns
— A list of IAM ARNs from other AWS accounts that will be allowed to assume the auto deploy IAM role that has the permissions inauto_deploy_permissions
.
allow_billing_access_from_other_account_arns
— A list of IAM ARNs from other AWS accounts that will be allowed full (read and write) access to the billing info for this account.
allow_cloudtrail_access_with_iam
— If true, an IAM Policy that grants access to CloudTrail will be honored. If false, only the ARNs listed inkms_key_user_iam_arns
will have access to CloudTrail and any IAM Policy grants will be ignored. (true or false)
allow_dev_access_from_other_account_arns
— A list of IAM ARNs from other AWS accounts that will be allowed full (read and write) access to the services in this account specified indev_permitted_services
.
allow_full_access_from_other_account_arns
— A list of IAM ARNs from other AWS accounts that will be allowed full (read and write) access to this account.
allow_logs_access_from_other_account_arns
— A list of IAM ARNs from other AWS accounts that will be allowed read access to the logs in CloudTrail, AWS Config, and CloudWatch for this account. Ifcloudtrail_kms_key_arn
is specified, will also be given permissions to decrypt with the KMS CMK that is used to encrypt CloudTrail logs.
allow_read_only_access_from_other_account_arns
— A list of IAM ARNs from other AWS accounts that will be allowed read-only access to this account.
allow_ssh_grunt_access_from_other_account_arns
— A list of IAM ARNs from other AWS accounts that will be allowed read access to IAM groups and publish SSH keys. This is used for ssh-grunt.
allow_support_access_from_other_account_arns
— A list of IAM ARNs from other AWS accounts that will be allowed access to AWS support for this account.
auto_deploy_permissions
— A list of IAM permissions (e.g. ec2:) that will be added to an IAM Group for doing automated deployments. NOTE: Ifshould_create_iam_group_auto_deploy
is true, the list must have at least one element (e.g. '').
aws_account_id
— The AWS Account ID the template should be operated on. This avoids misconfiguration errors caused by environment variables.
aws_region
— The AWS Region to use as the global config recorder and seed region for GuardDuty.
child_accounts
— Map of child accounts to create. The map key is the name of the account and the value is an object containing account configuration variables. See the comments below for what keys and values this object should contain.
cloudtrail_allow_kms_describe_key_to_external_aws_accounts
— Whether or not to allow kms:DescribeKey to external AWS accounts with write access to the CloudTrail bucket. This is useful during deployment so that you don't have to pass around the KMS key ARN.
cloudtrail_cloudwatch_logs_group_name
— Specify the name of the CloudWatch Logs group to publish the CloudTrail logs to. This log group exists in the current account. Set this value tonull
to avoid publishing the trail logs to the logs group. The recommended configuration for CloudTrail is (a) for each child account to aggregate its logs in an S3 bucket in a single central account, such as a logs account and (b) to also store 14 days work of logs in CloudWatch in the child account itself for local debugging.
cloudtrail_data_logging_enabled
— If true, logging of data events will be enabled.
cloudtrail_data_logging_include_management_events
— Specify if you want your event selector to include management events for your trail.
cloudtrail_data_logging_read_write_type
— Specify if you want your trail to log read-only events, write-only events, or all. Possible values are: ReadOnly, WriteOnly, All.
cloudtrail_data_logging_resources
— Data resources for which to log data events. This should be a map, where each key is a data resource type, and each value is a list of data resource values. Possible values for data resource types are: AWS::S3::Object, AWS::Lambda::Function and AWS::DynamoDB::Table. See the'data_resource
' block within the'event_selector
' block of the'aws_cloudtrail
' resource for context:https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#data_resource
.
cloudtrail_enable_key_rotation
— Whether or not to enable automatic annual rotation of the KMS key. Defaults to true.
cloudtrail_force_destroy
— If set to true, when you run 'terraform destroy', delete all objects from the bucket so that the bucket can be destroyed without error. Warning: these objects are not recoverable so only use this if you're absolutely sure you want to permanently delete everything!
cloudtrail_is_organization_trail
— Specifies whether the trail is an AWS Organizations trail. Organization trails log events for the root account and all member accounts. Can only be created in the organization root account. (true or false)
cloudtrail_kms_key_administrator_iam_arns
— All CloudTrail Logs will be encrypted with a KMS Key (a Customer Master Key) that governs access to write API calls older than 7 days and all read API calls. The IAM Users specified in this list will have rights to change who can access this extended log data. Note that if you specify a logs account (by settingis_logs_account
= true on one of the accounts inchild_accounts
), the KMS CMK will be created in that account, and the root of that account will automatically be made an admin of the CMK.
cloudtrail_kms_key_arn
— All CloudTrail Logs will be encrypted with a KMS CMK (Customer Master Key) that governs access to write API calls older than 7 days and all read API calls. If that CMK already exists, set this to the ARN of that CMK. Otherwise, set this to null, and a new CMK will be created. If you setis_logs_account
to true on one of the accounts inchild_accounts
, the KMS CMK will be created in that account (this is the recommended approach!).
cloudtrail_kms_key_arn_is_alias
— If thekms_key_arn
provided is an alias or alias ARN, then this must be set to true so that the module will exchange the alias for a CMK ARN. Setting this to true and using aliases requirescloudtrail_allow_kms_describe_key_to_external_aws_accounts
to also be true for multi-account scenarios.
cloudtrail_kms_key_user_iam_arns
— All CloudTrail Logs will be encrypted with a KMS Key (a Customer Master Key) that governs access to write API calls older than 7 days and all read API calls. The IAM Users specified in this list will have read-only access to this extended log data.
cloudtrail_num_days_after_which_archive_log_data
— After this number of days, log files should be transitioned from S3 to Glacier. Enter 0 to never archive log data.
cloudtrail_num_days_after_which_delete_log_data
— After this number of days, log files should be deleted from S3. Enter 0 to never delete log data.
cloudtrail_num_days_to_retain_cloudwatch_logs
— After this number of days, logs stored in CloudWatch will be deleted. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, 3653, and 0 (default). When set to 0, logs will be retained indefinitely.
cloudtrail_organization_id
— The ID of the organization. Required only if an organization wide CloudTrail is being setup and `create_organization
` is set to false. The organization ID is required to ensure that the entire organization is whitelisted in the CloudTrail bucket write policy.
cloudtrail_s3_bucket_name
— The name of the S3 Bucket where CloudTrail logs will be stored. This could be a bucket in this AWS account or the name of a bucket in another AWS account where CloudTrail logs should be sent. If you setis_logs_account
on one of the accounts inchild_accounts
, the S3 bucket will be created in that account (this is the recommended approach!).
cloudtrail_s3_mfa_delete
— Enable MFA delete for either 'Change the versioning state of your bucket' or 'Permanently delete an object version'. This setting only applies to the bucket used to storage Cloudtrail data. This cannot be used to toggle this setting but is available to allow managed buckets to reflect the state in AWS. For instructions on how to enable MFA Delete, check out the README from the terraform-aws-security/private-s3-bucket module.
cloudtrail_should_create_s3_bucket
— If true, create an S3 bucket of namecloudtrail_s3_bucket_name
for CloudTrail logs, either in the logs account—the account inchild_accounts
that hasis_logs_account
set to true (this is the recommended approach!)—or in this account if none of the child accounts are marked as a logs account. If false, assumecloudtrail_s3_bucket_name
is an S3 bucket that already exists. We recommend setting this to true and settingis_logs_account
to true on one of the accounts inchild_accounts
to use that account as a logs account where you aggregate all your CloudTrail data. In case you want to disable the CloudTrail module and the S3 bucket, you need to set bothenable_cloudtrail
andcloudtrail_should_create_s3_bucket
to false.
cloudtrail_tags
— Tags to apply to the CloudTrail resources.
config_aggregate_config_data_in_external_account
— Set to true to send the AWS Config data to another account (e.g., a logs account) for aggregation purposes. You must set the ID of that other account via theconfig_central_account_id
variable. Note that if one of the accounts inchild_accounts
hasis_logs_account
set to true (this is the approach we recommended!), this variable will be assumed to be true, so you don't have to pass any value for it. This redundant variable has to exist because Terraform does not allow computed data in count andfor_each
parameters andconfig_central_account_id
may be computed if its the ID of a newly-created AWS account.
config_central_account_id
— If the S3 bucket and SNS topics used for AWS Config live in a different AWS account, set this variable to the ID of that account. If the S3 bucket and SNS topics live in this account, set this variable to an empty string. Note that if one of the accounts inchild_accounts
hasis_logs_account
set to true (this is the approach we recommended!), that account's ID will be used automatically, and you can leave this variable null.
config_create_account_rules
— Set to true to create account-level AWS Config rules directly in this account. Set false to create org-level rules that apply to this account and all child accounts. We recommend setting this to true to use account-level rules because org-level rules create a chicken-and-egg problem with creating new accounts (see this module's README for details).
config_force_destroy
— If set to true, when you run 'terraform destroy', delete all objects from the bucket so that the bucket can be destroyed without error. Warning: these objects are not recoverable so only use this if you're absolutely sure you want to permanently delete everything!
config_num_days_after_which_archive_log_data
— After this number of days, log files should be transitioned from S3 to Glacier. Enter 0 to never archive log data.
config_num_days_after_which_delete_log_data
— After this number of days, log files should be deleted from S3. Enter 0 to never delete log data.
config_opt_in_regions
— Creates resources in the specified regions. The best practice is to enable AWS Config in all enabled regions in your AWS account. This variable must NOT be set to null or empty. Otherwise, we won't know which regions to use and authenticate to, and may use some not enabled in your AWS account (e.g., GovCloud, China, etc). To get the list of regions enabled in your AWS account, you can use the AWS CLI: aws ec2 describe-regions.
config_s3_bucket_name
— The name of the S3 Bucket where Config items will be stored. This could be a bucket in this AWS account or the name of a bucket in another AWS account where Config items should be sent. If you setis_logs_account
to true on one of the accounts inchild_accounts
, the S3 bucket will be created in that account (this is the recommended approach!).
config_s3_mfa_delete
— Enable MFA delete for either 'Change the versioning state of your bucket' or 'Permanently delete an object version'. This setting only applies to the bucket used to storage AWS Config data. This cannot be used to toggle this setting but is available to allow managed buckets to reflect the state in AWS. For instructions on how to enable MFA Delete, check out the README from the terraform-aws-security/private-s3-bucket module.
config_should_create_s3_bucket
— If true, create an S3 bucket of nameconfig_s3_bucket_name
for AWS Config data, either in the logs account—the account inchild_accounts
that hasis_logs_account
set to true (this is the recommended approach!)—or in this account if none of the child accounts are marked as a logs account. If false, assumeconfig_s3_bucket_name
is an S3 bucket that already exists. We recommend setting this to true and settingis_logs_account
to true on one of the accounts inchild_accounts
to use that account as a logs account where you aggregate all your AWS Config data. In case you want to disable the AWS Config module and the S3 bucket, you need to set bothenable_config
andconfig_should_create_s3_bucket
to false.
config_should_create_sns_topic
— Set to true to create an SNS topic in this account for sending AWS Config notifications. Set to false to assume the topic specified inconfig_sns_topic_name
already exists in another AWS account (e.g the logs account).
config_sns_topic_name
— The name of the SNS Topic in where AWS Config notifications will be sent. Can be in the same account or in another account.
config_tags
— A map of tags to apply to the S3 Bucket. The key is the tag name and the value is the tag value.
configrules_excluded_accounts
— List of AWS account identifiers to exclude from org-level Config rules. Only used ifconfig_create_account_rules
is false (not recommended).
configrules_maximum_execution_frequency
— The maximum frequency with which AWS Config runs evaluations for the ´PERIODIC´ rules. Seehttps://www.terraform.io/docs/providers/aws/r/config_organization_managed_rule.html#maximum_execution_frequency
create_organization
— Set to true to create/configure AWS Organizations for the first time in this account. If you already configured AWS Organizations in your account, set this to false; alternatively, you could set it to true and run 'terraform import' to import you existing Organization.
cross_account_access_all_group_name
— The name of the IAM group that will grant access to all external AWS accounts iniam_groups_for_cross_account_access
.
dev_permitted_services
— A list of AWS services for which the developers from the accounts inallow_dev_access_from_other_account_arns
will receive full permissions. See https://goo.gl/ZyoHlz to find the IAM Service name. For example, to grant developers access only to EC2 and Amazon Machine Learning, use the value ["ec2","machinelearning"]. Do NOT add iam to the list of services, or that will grant Developers de facto admin access.
ebs_enable_encryption
— If set to true (default), all new EBS volumes will have encryption enabled by default
ebs_kms_key_arns
— Optional map of region names to KMS keys to use for EBS volume encryption whenebs_use_existing_kms_keys
is enabled.
ebs_opt_in_regions
— Creates resources in the specified regions. The best practice is to enable EBS Encryption in all enabled regions in your AWS account. This variable must NOT be set to null or empty. Otherwise, we won't know which regions to use and authenticate to, and may use some not enabled in your AWS account (e.g., GovCloud, China, etc). To get the list of regions enabled in your AWS account, you can use the AWS CLI: aws ec2 describe-regions. The value provided forglobal_recorder_region
must be in this list.
ebs_use_existing_kms_keys
— If set to true, the KMS Customer Managed Keys (CMK) specified inebs_kms_key_arns
will be set as the default for EBS encryption. When false (default), the AWS-managed aws/ebs key will be used.
enable_cloudtrail
— Set to true to enable CloudTrail in the root account. Set to false to disable CloudTrail (note: all other CloudTrail variables will be ignored). In case you want to disable the CloudTrail module and the S3 bucket, you need to set bothenable_cloudtrail
andcloudtrail_should_create_s3_bucket
to false.
enable_cloudtrail_s3_server_access_logging
— Enables S3 server access logging which sends detailed records for the requests that are made to the bucket. Defaults to false.
enable_config
— Set to true to enable AWS Config in the root account. Set to false to disable AWS Config (note: all other AWS config variables will be ignored). In case you want to disable the CloudTrail module and the S3 bucket, you need to set bothenable_cloudtrail
andcloudtrail_should_create_s3_bucket
to false.
enable_encrypted_volumes
— Checks whether the EBS volumes that are in an attached state are encrypted.
enable_iam_access_analyzer
— A feature flag to enable or disable this module.
enable_iam_cross_account_roles
— A feature flag to enable or disable this module.
enable_iam_groups
— A feature flag to enable or disable this module.
enable_iam_password_policy
— Checks whether the account password policy for IAM users meets the specified requirements.
enable_insecure_sg_rules
— Checks whether the security group with 0.0.0.0/0 of any Amazon Virtual Private Cloud (Amazon VPC) allows only specific inbound TCP or UDP traffic.
enable_rds_storage_encrypted
— Checks whether storage encryption is enabled for your RDS DB instances.
enable_root_account_mfa
— Checks whether users of your AWS account require a multi-factor authentication (MFA) device to sign in with root credentials.
enable_s3_bucket_public_read_prohibited
— Checks that your Amazon S3 buckets do not allow public read access.
enable_s3_bucket_public_write_prohibited
— Checks that your Amazon S3 buckets do not allow public write access.
encrypted_volumes_kms_id
— ID or ARN of the KMS key that is used to encrypt the volume. Used for configuring the encrypted volumes config rule.
force_destroy_users
— When destroying this user, destroy even if it has non-Terraform-managed IAM access keys, login profile, or MFA devices. Withoutforce_destroy
a user with non-Terraform-managed access keys and login profile will fail to be destroyed.
guardduty_cloudwatch_event_rule_name
— Name of the Cloudwatch event rules.
guardduty_finding_publishing_frequency
— Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty master account and cannot be modified, otherwise defaults toSIX_HOURS
. For standalone and GuardDuty master accounts, it must be configured in Terraform to enable drift detection. Valid values for standalone and master accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
.
guardduty_findings_sns_topic_name
— Specifies a name for the created SNS topics where findings are published.publish_findings_to_sns
must be set to true.
guardduty_opt_in_regions
— Creates resources in the specified regions. The best practice is to enable GuardDuty in all enabled regions in your AWS account. This variable must NOT be set to null or empty. Otherwise, we won't know which regions to use and authenticate to, and may use some not enabled in your AWS account (e.g., GovCloud, China, etc). To get the list of regions enabled in your AWS account, you can use the AWS CLI: aws ec2 describe-regions. The value provided forglobal_recorder_region
must be in this list.
guardduty_publish_findings_to_sns
— Send GuardDuty findings to SNS topics specified byfindings_sns_topic_name
.
iam_access_analyzer_name
— The name of the IAM Access Analyzer module
iam_access_analyzer_opt_in_regions
— Creates resources in the specified regions. The best practice is to enable IAM Access Analyzer in all enabled regions in your AWS account. This variable must NOT be set to null or empty. Otherwise, we won't know which regions to use and authenticate to, and may use some not enabled in your AWS account (e.g., GovCloud, China, etc). To get the list of regions enabled in your AWS account, you can use the AWS CLI: aws ec2 describe-regions. The value provided forglobal_recorder_region
must be in this list.
iam_access_analyzer_type
— If set to ORGANIZATION, the analyzer will be scanning the current organization and any policies that refer to linked resources such as S3, IAM, Lambda and SQS policies.
iam_group_developers_permitted_services
— A list of AWS services for which the developers IAM Group will receive full permissions. See https://goo.gl/ZyoHlz to find the IAM Service name. For example, to grant developers access only to EC2 and Amazon Machine Learning, use the value ["ec2","machinelearning"]. Do NOT add iam to the list of services, or that will grant Developers de facto admin access. If you need to grant iam privileges, just grant the user Full Access.
iam_groups_for_cross_account_access
— This variable is used to create groups that allow IAM users to assume roles in your other AWS accounts. It should be a list of objects, where each object has the fields'group_name
', which will be used as the name of the IAM group, and'iam_role_arns
', which is a list of ARNs of IAM Roles that you can assume when part of that group. For each entry in the list of objects, we will create an IAM group that allows users to assume the given IAM role(s) in the other AWS account. This allows you to define all your IAM users in one account (e.g. the users account) and to grant them access to certain IAM roles in other accounts (e.g. the stage, prod, audit accounts).
iam_password_policy_allow_users_to_change_password
— Allow users to change their own password.
iam_password_policy_hard_expiry
— Password expiration requires administrator reset.
iam_password_policy_max_password_age
— Number of days before password expiration.
iam_password_policy_minimum_password_length
— Password minimum length.
iam_password_policy_password_reuse_prevention
— Number of passwords before allowing reuse.
iam_password_policy_require_lowercase_characters
— Require at least one lowercase character in password.
iam_password_policy_require_numbers
— Require at least one number in password.
iam_password_policy_require_symbols
— Require at least one symbol in password.
iam_password_policy_require_uppercase_characters
— Require at least one uppercase character in password.
iam_role_tags
— The tags to apply to all the IAM role resources.
insecure_sg_rules_authorized_tcp_ports
— Comma-separated list of TCP ports authorized to be open to 0.0.0.0/0. Ranges are defined by a dash; for example, '443,1020-1025'.
insecure_sg_rules_authorized_udp_ports
— Comma-separated list of UDP ports authorized to be open to 0.0.0.0/0. Ranges are defined by a dash; for example, '500,1020-1025'.
is_multi_region_trail
— Specifies whether CloudTrail will log only API calls in the current region or in all regions. (true or false)
name_prefix
— The name used to prefix AWS Config and Cloudtrail resources, including the S3 bucket names and SNS topics used for each.
organizations_aws_service_access_principals
— List of AWS service principal names for which you want to enable integration with your organization. Must have `organizations_feature_set
set to ALL. See [
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_integrate_services`](#https://docs.aws.amazon.com/organizations/latest/userguide/orgs_integrate_services).html
organizations_default_iam_user_access_to_billing
— If set to ALLOW, the new account enables IAM users to access account billing information if they have the required permissions. If set to DENY, then only the root user of the new account can access account billing information.
organizations_default_role_name
— The name of an IAM role that Organizations automatically preconfigures in the new member account. This role trusts the master account, allowing users in the master account to assume the role, as permitted by the master account administrator.
organizations_default_tags
— Default tags to add to accounts. Will be appended to´child_account
.*.tags´
organizations_enabled_policy_types
— List of Organizations policy types to enable in the Organization Root. Seehttps://docs.aws.amazon.com/organizations/latest/APIReference/API_EnablePolicyType
.html
organizations_feature_set
— SpecifyALL
or `CONSOLIDATED_BILLING
`.
password_reset_required
— Force the user to reset their password on initial login. Only used for users withcreate_login_profile
set to true.
rds_storage_encrypted_kms_id
— KMS key ID or ARN used to encrypt the storage. Used for configuring the RDS storage encryption config rule.
should_create_iam_group_auto_deploy
— Should we create the IAM Group for auto-deploy? Allows automated deployment by granting the permissions specified inauto_deploy_permissions
. (true or false)
should_create_iam_group_billing
— Should we create the IAM Group for billing? Allows read-write access to billing features only. (true or false)
should_create_iam_group_developers
— Should we create the IAM Group for developers? The permissions of that group are specified viaiam_group_developers_permitted_services
. (true or false)
should_create_iam_group_full_access
— Should we create the IAM Group for full access? Allows full access to all AWS resources. (true or false)
should_create_iam_group_houston_cli_users
— Should we create the IAM Group for houston CLI users? Allows users to use the houston CLI for managing and deploying services.
should_create_iam_group_logs
— Should we create the IAM Group for logs? Allows read access to logs in CloudTrail, AWS Config, and CloudWatch. Ifcloudtrail_kms_key_arn
is specified, will also be given permissions to decrypt with the KMS CMK that is used to encrypt CloudTrail logs. (true or false)
should_create_iam_group_read_only
— Should we create the IAM Group for read-only? Allows read-only access to all AWS resources. (true or false)
should_create_iam_group_support
— Should we create the IAM Group for support? Allows access to AWS support. (true or false)
should_create_iam_group_use_existing_iam_roles
— Should we create the IAM Group for use-existing-iam-roles? Allow launching AWS resources with existing IAM Roles, but no ability to create new IAM Roles. (true or false)
should_create_iam_group_user_self_mgmt
— Should we create the IAM Group for user self-management? Allows users to manage their own IAM user accounts, but not other IAM users. (true or false)
should_require_mfa
— Should we require that all IAM Users use Multi-Factor Authentication for both AWS API calls and the AWS Web Console? (true or false)
users
— A map of users to create. The keys are the user names and the values are an object with the optional keys 'groups' (a list of IAM groups to add the user to), 'tags' (a map of tags to apply to the user),'pgp_key
' (either a base-64 encoded PGP public key, or a keybase username in the form keybase:username, used to encrypt the user's credentials; required ifcreate_login_profile
orcreate_access_keys
is true),'create_login_profile
' (if set to true, create a password to login to the AWS Web Console),'create_access_keys
' (if set to true, create access keys for the user), 'path' (the path), and'permissions_boundary
' (the ARN of the policy that is used to set the permissions boundary for the user).
aws_ebs_encryption_by_default_enabled
— A map from region to a boolean indicating whether or not EBS encryption is enabled by default for each region.
aws_ebs_encryption_default_kms_key
— A map from region to the ARN of the KMS key used for default EBS encryption for each region.
child_accounts
— A map of all accounts created by this module (NOT including the root account). The keys are the names of the accounts and the values are the attributes for the account as defined in theaws_organizations_account
resource.
cloudtrail_cloudwatch_group_arn
— The ARN of the cloudwatch log group.
cloudtrail_cloudwatch_group_name
— The name of the cloudwatch log group.
cloudtrail_iam_role_arn
— The ARN of the IAM role used by the cloudwatch log group.
cloudtrail_iam_role_name
— The name of the IAM role used by the cloudwatch log group.
cloudtrail_kms_key_alias_name
— The alias of the KMS key used by the S3 bucket to encrypt cloudtrail logs.
cloudtrail_kms_key_arn
— The ARN of the KMS key used by the S3 bucket to encrypt cloudtrail logs.
cloudtrail_kms_key_arn_with_dependency
— The ARN of the KMS key used by the S3 bucket to encrypt cloudtrail logs.
cloudtrail_s3_access_logging_bucket_arn
— The ARN of the S3 bucket where access logs for the CloudTrail S3 bucket are delivered.
cloudtrail_s3_access_logging_bucket_name
— The name of the S3 bucket where access logs for the CloudTrail S3 bucket are delivered.
cloudtrail_s3_bucket_arn
— The ARN of the S3 bucket where cloudtrail logs are delivered.
cloudtrail_s3_bucket_name
— The name of the S3 bucket where cloudtrail logs are delivered.
cloudtrail_s3_bucket_name_with_dependency
— The name of the S3 bucket where cloudtrail logs are delivered. Sources from 'data'.
cloudtrail_trail_arn
— The ARN of the cloudtrail trail.
config_iam_role_arns
— The ARNs of the IAM role used by the config recorder.
config_recorder_names
— The names of the configuration recorder.
config_s3_bucket_arn
— The ARN of the S3 bucket used by AWS Config to store configuration items.
config_s3_bucket_name
— The name of the S3 bucket used by AWS Config to store configuration items.
config_s3_bucket_name_with_dependency
— The name of the S3 bucket used by AWS Config to store configuration items, sources from 'data'.
config_sns_topic_arns
— The ARNs of the SNS Topic used by the config notifications.
guardduty_cloudwatch_event_rule_arns
— The ARNs of the cloudwatch event rules used to publish findings to sns ifpublish_findings_to_sns
is set to true.
guardduty_cloudwatch_event_target_arns
— The ARNs of the cloudwatch event targets used to publish findings to sns ifpublish_findings_to_sns
is set to true.
guardduty_detector_ids
— The IDs of the GuardDuty detectors.
guardduty_findings_sns_topic_arns
— The ARNs of the SNS topics where findings are published ifpublish_findings_to_sns
is set to true.
guardduty_findings_sns_topic_names
— The names of the SNS topic where findings are published ifpublish_findings_to_sns
is set to true.
master_account_arn
— ARN of the master account.
master_account_email
— Email address of the master account.
master_account_id
— Identifier of the master account.
organization_arn
— ARN of the organization.
organization_id
— Identifier of the organization.
organization_root_id
— Identifier of the root of this organization.
user_access_keys
— A map of user name to that user's access keys (a map with keysaccess_key_id
andsecret_access_key
), with thesecret_access_key
encrypted with that user's PGP key (only shows up for users withcreate_access_keys
= true). You can decrypt thesecret_access_key
on the CLI: echo<secret_access_key
> | base64 --decode | keybase pgp decrypt
user_arns
— A map of user name to the ARN for that IAM user.
user_passwords
— A map of user name to that user's AWS Web Console password, encrypted with that user's PGP key (only shows up for users withcreate_login_profile
= true). You can decrypt the password on the CLI: echo <password> | base64 --decode | keybase pgp decrypt