This module includes security and operational baselines implemented by Cloud Platform team in their AWS Accounts.
module "baselines" {
source = "github.com/ministryofjustice/cloud-platform-terraform-awsaccounts-baselines?ref=0.0.1"
account_name = "cloud-platform-production"
}
Name | Version |
---|---|
terraform | >= 1.2.5 |
No providers.
Name | Source | Version |
---|---|---|
access_analyzer | ./modules/access-analyzer | n/a |
cloudwatch | ./modules/cloudwatch | n/a |
lambdas | ./modules/lambdas | n/a |
logging | ./modules/logging | n/a |
slack_integration | terraform-aws-modules/notify-slack/aws | ~> 6.0 |
No resources.
Name | Description | Type | Default | Required |
---|---|---|---|---|
buckets_prefix | Prefix for bucket names | string |
"cp" |
no |
buckets_suffix | Suffix for bucket names | string |
"do-not-delete" |
no |
cloudtrail_name | The name of the trail which is going to be streaming logs to S3 | string |
"cloud-platform-cloudtrail" |
no |
enable_cloudwatch | Enable/Disable cloudwatch module. | bool |
true |
no |
enable_logging | Enable/Disable logging module - it creates S3 buckets and forwards all cloudtrail logs to them | bool |
true |
no |
enable_slack_integration | Enable/Disable slack integration module - it creates SNS and Lambda function to send slack notifications | bool |
true |
no |
region | Region the SNS topic is in | string |
n/a | yes |
s3_bucket_block_publicaccess_exceptions | S3 buckets exceptions for publicaccess remediation | list(string) |
[ |
no |
s3_bucket_enforce_encryption_exceptions | S3 buckets exceptions for encryption remediation | list(string) |
[ |
no |
slack_channel | Slack channel where alerts are sent | string |
"" |
no |
slack_webhook | Slack Webhook URL for sending alerts | string |
"" |
no |
tags | A map of tags to add to all resources. | map(string) |
{ |
no |
Name | Description |
---|---|
cloudtraillogs_bucket_arn | Cloudtrail logs S3 bucket arn |
logging_buckets | Buckets created for all account logs related |
slack_sns_topic | Slack integration sns topic name |