AWS Control Tower
Last updated
Was this helpful?
Last updated
Was this helpful?
AWS Control Tower helps with data governance and prevents deviation from best practices. This is done using guardrails that provide preventive controls. Guardrails can make sure that security logs and permissions for cross-account access are maintained unaltered.
Guardrails can be categorized based on their behavior or guidance. The behavior of a guardrail can be either preventive or detective:
Preventive guardrails disallow any actions violating compliance rules and can be in either enforced or not enabled states. They are implemented using service control policies (SCPs).
Detective guardrails provide alerts of violations of policy and non-compliance occurrences through a dashboard. They can be in either clear, in violation, or not enforced states and are implemented through AWS Config rules.
AWS Control Tower provides mandatory, strongly recommended, and elective guardrails as guidance categories:
Mandatory guardrails are enforced at all times.
Strongly recommended guardrails are created for ensuring best practices.
Elective guardrails allow you to lock down any action that is not permitted in an AWS environment for an enterprise.
AWS Control Tower is the quickest way to create and manage a secure, compliant, multi-account environment based on best practices
Governance: Easy way to set up and govern an AWS multi-account environment.
Orchestration: Automate account creation and security controls via other AWS services
Extension: Extends AWS Organizations to prevent governance drift, and leverages different guardrails
New AWS Accounts: users can provision new AWS accounts quickly, using central admin established compliance policies
Features:
Landing zone: Well-architected, multi-account environment based on compliance and security best practices.
Guardrails: High-level rules providing continuous governance for the AWS environment.
Two different rules types:
Ensures accounts maintain governance by disallowing violating actions
Detects and alerts on non compliant resources within all accounts
Leverages service control policies
Leverages AWS Config rules
Statuses of enforced or not enabled
Status of clear, in violation, or not enabled
Supported in all Regions
Only apply to certain Regions
Account Factory: Configurable account template for standardising pre-approved configs on new accounts.
CloudFormation StackSet: Automated deployments of templates deploying repeated resources for governance.
Shared Accounts: Three accounts used by Control Tower created during landing zone creation.