Skip to content

Releases: awslabs/landing-zone-accelerator-on-aws

v1.4.0

05 May 15:00
Compare
Choose a tag to compare

Important

We highly recommend that you keep your environments up to date by upgrading to the latest version. To upgrade your environments to this version, use the CloudFormation console to update your AWSAccelerator-Installer stack using the latest installer template and ensure that that you set Branch Name to the latest version (release/v1.4.0 for this release). See Update the solution for more information.

Security groups defined in shared VPCs are now replicated to accounts where the subnets are shared. If you reference a prefix list from a security group, you need to update the deployment targets of the prefix list to deploy the prefix list in all shared accounts. (network-config.yaml)

Lambda runtimes for AWS Config rules were updated to NodeJs16. (security-config.yaml)

Cross-account IPAM subnet references have been updated and requires a configuration change. This only affects customers that are referencing IPAM-created subnets that exist in the same account and region the NACL rule is created in. To resolve this, you will need to:

  1. Comment out any NACL rules that reference IPAM-created subnets that reside in the same account+region of the account+region the NACL is being created in.
  2. Run the pipeline, which will delete the NACL rules.
  3. Uncomment the same-account NACLs and run the pipeline once again.

Added

  • feat(config): Utilize existing AWS Config Service Delivery Channel
  • feat(installer): Support custom prefix for LZA resources
  • feat(logging) Add S3 prefix to Config Recorder delivery channel
  • feat(networking): Added deploymentTargets property for prefix lists
  • feat(networking): add ability to reference same-account IPAM subnets in Security Groups and NACLs
  • feat(scp): Implement SCP allow-list strategy
  • feat(security-config) Add ability to define CloudWatch Log Groups
  • feat(security hub): allow definition of deploymentTargets for Security Hub standards
  • feat(validation): verify no ignored OU accounts are included in accounts-config file

Changed

  • chore(app): Update AWS CDK version to 2.70.0
  • chore(docs): adding optional flags and replacement warnings to SecurityConfig and NetworkConfig
  • chore(network): network stack refactor to assist in development efforts
  • enhancement(cdk): Configure CDK to use managementAccountAccessRole for all actions
  • enhancement(logging): Reduce logging in firehose processor to optimize cost
  • enhancement(networking): replicate Security Groups to Accounts with RAM shared subnets
  • enhancement(network): make vpcFlowLogs property optional

Fixed

  • fix(accounts): methods used to retrieve Account IDs for Root OU targets return ignored accounts
  • fix(bootstrap): Forced bootstrap update for non-centralized CDK buckets
  • fix(budgets): unable to deploy AWS Budgets in Regions without vpc endpoint
  • fix(ebs): EBS encryption policy references Account instead of Region
  • fix(logging): remove nested looping for additional statements
  • fix(networking): fix IPAM SSM lookup role name mismatch
  • fix(networking): VPC-level ALBs and NLBs may reference incorrect logging bucket region
  • fix(networking): replicating shared VPC/subnet tags to consumer account fails if sharing subnets from multiple owner accounts
  • fix(networking): default VPCs are not deleted if the excludedAccounts property is not included
  • fix(pipeline): Credential timeout for long running stages
  • fix(sso): permission sets and assignments created outside of LZA cause pipeline failure
  • chore(application-stack): refactor application stack to reduce complexity

Configuration Changes

  • feat(aws-best-practices-education): Added additional security-config controls
  • feat(aws-best-practices-tse-se): Added AWS Control Tower installation instructions
  • enhancement(aws-best-practices): Replace hard-coded management role in guardrail SCPs with a variable
  • enhancement(aws-best-practices-cccs-medium): updated configuration to utilize accelerator prefix feature
  • enhancement(aws-best-practices-tse-se): updated install instructions for GitHub personal access token

v1.3.2

03 Mar 02:29
Compare
Choose a tag to compare

Important

We highly recommend that you keep your environments up to date by upgrading to the latest version. To upgrade your environments to this version, use the CloudFormation console to update your AWSAccelerator-Installer stack using the latest installer template and ensure that that you set Branch Name to the latest version (release/v1.3.2 for this release). See Deploy the solution for more information.

Changed

  • enhancement(securityhub): enable nist 800-53 rev5 standard
  • fix(network): allow -1:-1 port range in NACL config
  • fix(validation): fix OU validation
  • fix: conflicting logical id for org lookup in createIpamSsmRole

Configuration Changes

  • chore: update best practices config to use nist 800-53 security hub standard

v1.3.1

28 Feb 20:44
Compare
Choose a tag to compare

Important

We highly recommend that you keep your environments up to date by upgrading to the latest version. To upgrade your environments to this version, use the CloudFormation console to update your AWSAccelerator-Installer stack using the latest installer template and ensure that that you set Branch Name to the latest version (release/v1.3.1 for this release). See Deploy the solution for more information.

Added

  • feat: add region support for me-central-1
  • feat: add region support for ap-south-2, ap-southeast-3, ap-southeast-4
  • feat: add region support for eu-central-2, eu-south-2
  • feat(controltower): create up to 5 ControlTower accounts accounts concurrently
  • feat(servicecatalog): add ability to define Service Catalog portfolios and products
  • feat(servicecatalog): enable principal association with existing IAM resources
  • feat(servicecatalog): add option to propagate principal associations for Service Catalog portfolios
  • feat(servicecatalog): add support for AWS Identity Center (formerly SSO) principal associations with Service Catalog portfolios
  • feat(installer): allow installer stack to use an existing config repository
  • feat(network): remove default Security Group ingress and egress rules of VPC
  • feat(network): elastic IP address allocation for NAT gateway
  • feat(network): add support for referencing cross-account and cross-region subnets in network ACLs
  • feat(iam): allow account lookups for IAM trust policies
  • feat(identitycenter): add support for overriding delegated admin in Identity Center
  • feat(account): add account warming
  • feat(logs): add S3 prefixes for GuardDuty, Config and ELB
  • feat(customizations): add capability to pass parameters to Stacks and StackSets
  • feat(config): add support to enable config aggregation
  • feat(docs): added FAQ

Changed

  • enhancement(network): add validation for route table names
  • enhancement(network): GWLB VPC type and delegated admin account validation checks
  • enhancement(network): add ability to define private NAT gateway connectivity type
  • enhancement(network): modularize network validation classes
  • enhancement(network): improve VPC validation
  • enhancement(network): improve transitGateways validation
  • enhancement(network): add validation for dhcpOptions and prefixLists
  • enhancement(network): improve centralNetworkServices validation
  • enhancement(network): update NFW config objects for enhanced error checking
  • enhancement(network): allow specification of TGW attachment options in GovCloud
  • enhancement(cloudformation): upload StackSet template as asset before deployment
  • enhancement(accounts): validate account limit before creating new account
  • enhancement(builds): disable privileged mode in Code Build
  • chore(logger): move logger to accelerator utils
  • chore(logger): improved logger usage
  • fix(app): throw error at app-level try/catch
  • fix(installer): github token not properly updating in Code Pipeline
  • fix(sts): assume role plugin uses regional sts endpoints
  • fix(logging): use correct region for organization trail centralized logging
  • fix(network): allow TGW route table associations/propagations for separate attachments to the same VPC
  • fix(network): cannot create a STRICT_ORDER rule group when using rulesFile
  • fix(network): ALB/NLB bucket region correction for accessLogs
  • fix(network): fix cross-account nacl entry construct name
  • fix(network): fix IPAM CIDR Role
  • fix(network): fix security group enum typo from MYSQL to MSSQL
  • fix(network): VPC using IPAM not creating cross-region
  • fix(network): S2S VPN resource reference fails in GovCloud
  • fix(network): inter-region tgw peering unable to find SSM parameter in second region
  • fix(securityhub): failure disabling SecurityHub standards
  • fix:(guardduty): issue configuring GuardDuty for opt-in regions
  • fix(uninstaller): delete termination protected config repo
  • fix(uninstaller): ecr delete error handling
  • fix(uninstaller): ecr cleanups with full uninstall option
  • fix(logging): ignore CloudWatch logs retention when existing log retention is higher than specified in global config
  • fix(logging): fix organization trail centralized logging region parameter
  • fix(config): VPC route validation fails when no route specified
  • fix(cloudtrail): check for cloudtrail.enable property before creating account trails

Configuration Changes

  • chore: consolidate finance configs to best-practices
  • chore: remove default limits increase from aws-best-practices config
  • chore: update education config
  • chore: add lifecycle rules to aws-best-practices
  • fix: update the readme file name in AWS GovCloud (US) configurations
  • fix: update lock down scp with control tower role
  • enhancement: enabled versioning on sample template s3 buckets

v1.3.0

21 Dec 17:31
Compare
Choose a tag to compare

Important

We highly recommend that you keep your environments up to date by upgrading to the latest version. To upgrade your environments to this version, use the CloudFormation console to update your AWSAccelerator-Installer stack using the latest installer template and ensure that that you set Branch Name to the latest version (release/v1.3.0 for this release). See Deploy the solution for more information.

Added

  • feat(installer): add support for organization only install
  • feat(network): add ability to create site-to-site vpn to tgw
  • feat(network): add ability to specify file with list of suricata rules for network firewall
  • feat(network): add ability to specify transit gateway peering
  • feat(network): add ability to create routes for vpc peering connections
  • feat(network): add ability to create and reference VGWs for VPNs, subnet routes, and gateway route table associations
  • feat(network): add ability to create third-party firewalls
  • feat(network): add ability to configure firewall manager
  • feat(network): add ability to define ALBs and NLBs
  • feat(logs): allow specification of centralized logging bucket region independent of home region
  • feat(iam): add ability for IAM policy replacements
  • feat(organizations): add support to ignore organizational units
  • feat(organizations): add functionality to move accounts between ous (orgs-only install)
  • feat(security): add centralized and configurable sns topics
  • feat(security): add ability to create ACM from s3 and integrate that with ELBv2
  • feat(guardDuty): enable S3 export config override
  • feat(guardDuty): provide functionality to enable EKS protection
  • feat(ssm): enable SSM Inventory
  • feat(securityhub): add support for CIS 1.4.0 controls in SecurityHub
  • feat(cloudformation): Create custom CloudFormation stacks
  • feat(s3): add ability to define policy statements to s3 buckets and keys
  • feat(quotas): limits increase for services
  • feat(sso): add ability to configure iam identity center
  • feat(mad): add ability to configure managed ad
  • feat(kms): allow parameter replacement in key files

Changed

  • enhancement(network): add use of static CIDR property for VPC templates
  • enhancement(network): update Direct Connect custom resource logic to handle asynchronous actions
  • enhancement(network): add Resolver endpoint name to deployed endpoints
  • enhancement(logging): transform cloudwatch logs data to allow query from athena
  • enhancement(organizations): move replacements to stack level
  • enhancement(organizations): added checks for scps with no OUs or accounts
  • enhancement(organizations): validate scp count
  • enhancement(configs): add config rules and ssm auto remediation in AWS GovCloud (US) reference config
  • fix(logging): update central log key lookup set log bucket to central log region
  • fix(logging): move account CloudTrail S3 logs to central log bucket
  • fix(organizations): add cases for null organizations and accounts in SCP
  • fix(pipeline): force bootstraping to run in global region and home region if missing
  • fix(ssm) limit api calls to 20 accounts per invocation
  • fix(sns): update sns policies
  • fix(sns): added account check on sns kms key policy
  • fix(kms): add ebs kms policy for cloud9
  • fix(security): updated sns topic to use home region rather than global region

New Configurations

v1.2.2

15 Nov 22:48
Compare
Choose a tag to compare

Important

This release fixes an issue with the deployment of AWS Budgets, and only affects customers that have deployed an AWS Budget, with multiple enabled regions defined in their global-config.yaml, and are using v1.2.1.

In v1.2.1, the definition of AWS Budgets was not limited to only the home region, which caused the object to be deployed to multiple regions. In this release, logic has been added to ensure that AWS Budgets are only added in the defined home region.
These steps are required for if you currently have an AWS Budget deployed through LZA release/v1.2.1:

  1. In the AWS console, delete the existing budget within management or any other account where a budget was deployed.
  2. Go into the LZA config repository and remove (or comment out) budgets from the config.
  3. Update to this version (release/v1.2.2) by updating the branch name for your InstallerStack through the AWS CloudFormation console.
  4. Release the changes to the LZA pipeline within the AWS console once to ensure that the current budget is removed from the account.
  5. Once the pipeline has completed, add the budgets back into the global-config.yaml file and release the CodePipeline for LZA

Changed

  • fix(app) wrap execution in try/catch to surface errors
  • fix(budgets) budgets causing operations stack to fail

We highly recommend that you keep your environments up to date by upgrading to the latest version. To upgrade your environments to this version, use the CloudFormation console to update your AWSAccelerator-Installer stack using the latest installer template and ensure that that you set Branch Name to the latest version (release/v1.2.2 for this release)

v1.2.1

13 Oct 15:10
Compare
Choose a tag to compare

Added

  • feat(govcloud): add updated govcloud config files
  • feat(govcloud): add govcloud account vending service catalog product
  • feat(configs): add healthcare best practices config files
  • feat(configs): add support aws-cn and config files

Changed

  • fix(cloudwatch): change security config to support CT organization-level cloudtrail log metrics creation
  • fix(logging): cloudwatch log replication in aws-us-gov partition
  • fix(config): syntax error AWS GovCloud (US) config
  • fix(bootstrap): cdk centralization bug fix
  • fix(logging): move session manager principal access
  • fix(security): update package dependencies
  • fix(installer): solution-helper is emitting delete event
  • fix(installer): remove installer kms key from loggroup
  • fix(logging): log replication KMS created in log receiving account only
  • fix(config): update network config to align with best practices diagram
  • fix(logging): set resource dependence for accountTrail CloudWatch log group.
  • fix (pipeline): fix issue with changeset creation and bootstrap

v1.2.0

23 Sep 00:16
Compare
Choose a tag to compare

Added

  • feat(iam): add path property to IAM RoleSets
  • feat(logging): Allow configuration of CloudTrail Insights and configuration of Organization Trail
  • feat(logging): Centralized Logging
  • feat(network): add ability to configure Gateway Load Balancer
  • feat(network): AWS Outpost Support
  • feat(network): Add ability to configure Direct Connect
  • feat(network): add ability to define gateway route tables
  • feat(organizations): Update guardrail scp to include CloudTrail and CloudWatch Logs
  • feat(partition): add support for aws-iso-b
  • feat(s3): Apply Lifecycle Rules to Central Log Bucket
  • feat(security): localize KMS key for every environment and service
  • feat(security): Add Custom KMS CMKs
  • enhancement(network): Add tags to RAM shared subnets/vpc

Changed

  • fix(budgets): Budget reports deployment targets bug
  • fix(config): add checks for OU presence in organization config file from other config files where OUs are referred
  • fix(config): Fix issues in network-config.yaml reference
  • fix(iam): iam user password is not set properly
  • fix(iam): Cross Account SSM parameter role creates in every region
  • fix(installer): Updating git Personal Access Token not working once it's expired
  • fix(installer): Fix duplicate execution of pipeline
  • fix(logging):Update sessionmanager logging
  • fix(logging): Existing organization trail fails in organization stack
  • fix(logging) - lambdaKey lookup only in homeRegion
  • fix(network): VPC templates rework
  • fix(network): Fix bug with tcpFlags and source/destination bug with network firewall
  • fix(network): move endpoint creation to new GWLB-specific stack
  • fix(network): allow multiple VPCs to fetch a RAM share ID for the same IPAM pool or network firewall policy
  • fix(network): VPC flowlog bucket exists failure when network-vpc stack updates with new vpc with s3 flow log destination
  • fix(s3): added error logic for expiration values
  • fix(security) AWS Macie ExportConfigClassification fails when new account added
  • fix(security): Check keyManagementService for undefined
  • fix(security): permissions for CrossAccountAcceleratorSsmParamAccessRole
  • fix(security): When excluded in config, do not enable the automatically enabled standards for security hub
  • fix(security): Fix issue with GuardDuty S3 protection not enabled in all accounts
  • fix(security): Empty EBS encryption key in default config file causes pipeline failure
  • fix(installer): Enable pipeline notification only for the regions that support AWS CodeStar
  • chore(build): upgrade to cdk v2.28.0

v1.1.0

04 Aug 16:05
Compare
Choose a tag to compare

Added

  • feat(auditmanager): add support to enable AWS Audit Manager
  • feat(cloudformation): enable termination protection for all stacks
  • feat(config): Add the ability to add tags to AWS Config rules
  • feat(controltower): add drift detection for AWS Control Tower
  • feat(detective): add support to enable Amazon Detective
  • feat(installer): add ability to launch the accelerator pipeline at completion of installer pipeline
  • feat(network): add managed prefix list as a destination in subnet and tgw route tables
  • feat(network): add ability to define Amazon Route 53 resolver SYSTEM rules
  • feat(vpc): add ability to use IPAM address pools
  • enhancement: add AWS GovCloud (US) sample configuration

Changed

  • fix(organizations): security services Amazon GuardDuty, Amazon Macie, and AWS Security Hub failing when multiple new regions registered
  • fix(organizations): fix organizational unit creation and GovCloud account add to organization
  • fix(iam): fix failing pipeline tests due to service linked role descriptions
  • fix(network): vpc interface endpoints workflows for GovCloud
  • fix(network): outbound NACL entries causing duplicate entry error
  • fix(network): Add check for route entry types in network-vpc stack
  • fix(route53): add uuid to r53association custom resource to force reevaluation
  • enhancement(network): make route table target property optional
  • enhancement(budget): budgets scope based on account or ou
  • enhancement(backup): update backup vaults to use the accelerator key
  • enhancement(pipeline): move config lint checks to build stage
  • enhancement(organizations): add pitr to config table
  • chore(build): update to javascript sdk v2.1152.0
  • chore(build): upgrade to cdk v2.25.0
  • chore(build): update lerna to 5.1.8
  • chore(readme): update installer stack instructions
  • chore(iam): Update default boundary policy to require MFA
  • chore(installer): Added email constraints for installer stack

v1.0.1

10 Jun 17:15
Compare
Choose a tag to compare

Changed

  • fix(installer): require branch param in installer
  • fix(accounts): accounts stack fails in GovCloud when enabling SERVICE_CONTROL_POLICY type
  • enhancement: added more explicit error message in account config
  • fix(controltower): support creation of new account in nested OU with Control Tower

See changelog for more information.

v1.0.0

23 May 12:47
Compare
Choose a tag to compare

Added

  • All files, initial version

See changelog for more information.