Technology Capabilities
Technology CapabilitiesDigital twin technology is one of the fastest growing concepts of Industry 4.0. In the ...
In this post, we’re going to walkthrough some of the remaining post configuration tasks...
GlobalLogic provides unique experience and expertise at the intersection of data, design, and engineering.
Get in touchIn this post, we’re going to walkthrough how you can start customising Control Tower using the Security Reference Architecture (SRA). The SRA utilises Customisations for Control Tower (CfCT) which deploys a DevOps pipeline that works with CloudFormation templates and Control Tower lifecycle events.
By no means is this the only way of customising the Landing Zone that Control Tower deploys, but it’s how the previous version of AWS Landing Zones was based upon and therefore, more users will be familiar with its setup and configuration. It does have some drawbacks though, in that it is only single threaded and therefore slow in large environments.
Here are some alternatives:
The easiest way to answer this question is simply because whilst Control Tower provides the foundations for a Well-Architected Multi-Account Landing Zone, it’s not completely perfect.
In terms of AWS Services, Control Tower is still in its infancy and whilst AWS is constantly adding new functionality and guardrails, there are still some basic best practices that aren’t there natively. For example, in Part Three we mentioned that AWS Config doesn’t get configured in the Management Account but it is in every other Member AWS Account.
The reality is, there is no one size fits all, but there are synergies between them. With this in mind, the majority of organisations will need to tailor the Landing Zone to meet their specific security and governance requirements.
If you already have Control Tower enabled for you, this next section might not be relevant. However, it’s always worth double checking just to play safe.
A web browser will then open prompting for login credentials if you’re not already logged in.
Deploying the SRA Common Pre-Requisites
There are a few things that need to be installed on our local device as a pre-cursor for this part, including Git, Bash Shell, the AWS CLI v2 and 7-Zip. The following instructions will be based on running a Windows Device.
Now that we have the SRA source files locally, we need to start creating some CloudFormation Stacks in our Management Account using the YAML templates within the source. These templates setup the functionality for SRA to work before we even install the Customisations for Control Tower solution.
The team at AWS has developed the SRA utilised Customisations for Control Tower (CfCT) as the delivery mechanism for their customisations. But since they don’t maintain that solution itself, it’s strongly recommended to check the current version of CfCT here prior to launching the CloudFormation Template.
You may find that you wish to edit sra-common-cfct-setup-main.yaml to reflect the following change instead:
The architecture that is deployed by CfCT is shown below.
This is always very subjective and there are many things that may factor into the answer. That being said, here are a few suggestions, in no particular order! And best of all, they are all included within the SRA Source Files with the exceptions of the Service Control Policies (SCPs). There are also other CloudFormation Templates available within the SRA source files that could be used, or alternatively, you may wish to create your own.
CloudFormation
Service Control Policies
This section will go through customising Control Tower based on the author’s personal recommendations.
Note: You’ll need to ensure that you use the name of your AWS CLI profile prior to the @ as shown in the example above.
This will now trigger the DevOps Pipeline and, assuming that no issues have occurred, will show as Succeeded.
This is the end of our AWS Control Tower part four series. We hope it proved useful and enables you to customise your own Control Tower Environments.
Should you have any additional questions around cloud security governance, or comments in general, we’d love to hear from you. Drop us a message and the team will be in touch to arrange a follow-up call.
Adam Divall, Solutions Architect at GlobalLogic with over 20 years demonstrable experience in design, implementation, migration and support of large, complex solutions to support a customer’s long term business strategy. Divall holds all 12 available certifications for Amazon Web Services with specialisations including Networking, Security, Database, Data Analytics and Machine Learning.