Sitemap

AWS Control Tower

16 min readMay 8, 2023
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

AWS CT Landing Zone

Press enter or click to view image in full size

This is set up when you 1st deploy the control tower in your environment.

Press enter or click to view image in full size

Management account: central Hub for managing CT and managing an organization. CT is providing and configuring existing services work together and follow best practices.

AWS Organizations: That's the service CT is using to set up automation for the backbone of organizational structure within AWS.

sometimes you won't need to deploy security standards. That's the greater way to divide up Organizational Units (OUs). ex: we have super secure applications and will put them in their own ou. So we can apply a certain set of security best practices for those particular workloads.

Sandbox ou: give developers to try out services and features, run these experiments (limited amount of connectivity and a limited amount of damage )

Security ou: This includes an Audit account. That is a read-only account that gives access to CT login and views the information to complete the audit.

Log Archive Account: That is the centralized AWS cloud trail and config logs that going to include changes to all of the AWS resources done in your entire AWS account. One centralized place for auditing logs in your entire environment.

AWS Single Sign-On: SSO gives the ability to sign for another source or identity, by default SSO directory. But you can configure an external identity provider. once you sign with that external source then sso is give you permission across the entire environment. ( I have access to my sandbox and access to dev 1, dev 2, and pro account 1. You singing to sso you see a landing screen you choose all of the accounts you have access to and you can sign in to those individual accounts on the AWS console.)

That sso is setup in preconfigured by the control tower

AWS CloudFormation StackSets: this is a control tower that is used to change to an entire multi-account environment.

AWS Service Catalog: CT is used for Account Factory. everyone within the environment that has access to can go to that account factory and create any account in aws organization guidance and best practices.

CT Landing zone is also supports life cycle events. That means you can configure customer automation as part of new account creation. Always you can extend the functionality of the landing zone as you grow.

Initial Dashboard for control tower:

Press enter or click to view image in full size

Preventive Guardrails: Block particular actions

Detective Gurdrails: Allow you to particular resources out of compliance over time

NonCompliant Resources: Any particular resources are across your current environment currently that might be violated one of your detective guardrail

You can see this dashboard all the environment and monitor on particular dashboards in our entire state.

Centralized Identity and Access, Logging & Monitoring

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

This is a dedicated account set up that automatically binds in the landing zone. There is a s3 bucket, that is managed by the account. every account in CT for it deployed is going to be configured to send a copy of cloud trail config logs to this log archive account

Press enter or click to view image in full size

In some sort of emergency situation need access to manage the account, then you can use one of the cross-account roles in the security account to provide access to compromise the account.

This account recommends restrictions for the authorized account and personalizes comprehensive only. Only install security or audit tools into this account.

Automate Compliant Account Provisioning

Press enter or click to view image in full size

Account factroy is a one of the core self service feature in CT enviremnt. Idea is here in that you can have service catalog . If you not have service catalog, service catalog create , manage and ditribute portpolio of the products to end users. Who then have access to product they need in the personalized portal.

ex: web server, DB server ; you can define configurations as a server as a product and have that entry in service catalog. Any one who has access to with in you entire envirement can go in to “hey I need to depoy database. Im going to deploy our one of the standerd database products that has been pre approved and pre valid set by the admins use the aws envirement”. You can controll the users to that have access to each product.

Press enter or click to view image in full size

IN a CT landing zone the landing zone its selft use service catalog for the account factory.

Press enter or click to view image in full size

Architecture overview of customization of control tower

Press enter or click to view image in full size

CT Account Factory for Terraform

Press enter or click to view image in full size

Establish Guardrails

Press enter or click to view image in full size

Guardtails are control tower feature that audit your entire aws envirements for perticuler guardrails. Two different type of guardrails.

  1. Preventive
  2. Detective
Press enter or click to view image in full size

In CT dashboard you can see which perticuler duardrails you want to apply to OUs, or endividual accounts. If you have a perticuler OU, has it own complience or regulatary requments you can apply different setup guardrails that OU and suppose to other OUs and that might be applice be under set up of govenence.

When we talk about guardrails, these are automations of the existing aws services.

Preventive: most of the guardrails are implement in CSPs. When you deploy and CSP whe to your OU that going to actually block oparations are happenning. we have SCP for users can only deploy for oncly ec2s that are T or N series. Someone goes to deploy C series that operation will be block by CSP.

Detective: These guardrails are once enforce with AWS config rules . EX: you dont have ssh access to SG. If you choose to enable and guardrails. Thats an optional. If you enble guardrail for perticular OU or Account then it going to be shutdown an instance that might be vialoting . But it give you notification on your CT dashboard , this perticulaer resourse in this perticuler account is out of complience with this guardrail. Detective guardrails are detect policy vialations and provide you and alert in the dashboard.

3 trypes of Guardtrails:

  1. mandatory
  2. recommended
  3. elective

Guardrail while in guidance

It also functions in regions where the AWS Control Tower is present, and as a result, the AWS Control Tower offers three distinct types of guidance: mandatory, strongly recommended, and elective guardrails.

  • Mandatory

When a new landing zone is created, this category ensures that the guardrail is constantly enforced, and these restrictions are turned on automatically by default. They are affected by it. For example, untrusted users are unable to make any changes to the AWS infrastructure. Therefore, any regulations that fall under this must be labeled as “Mandatory.”

  • Strongly recommended

In this subcategory, simply a few of the best practices that are implemented can result in an organization that is well-architected, and there is also the potential for many accounts. For instance, according to the policies of the organization, no bucket should be required to be public by default, and editing access should not be granted to anybody and everyone for those buckets. These kinds of policies will be of assistance in the process of putting into practise the most effective safety procedures within the firm.

  • Elective guardrails:

Within an Amazon Web Services (AWS) enterprise environment, you may use elective guardrails to lock down or trace attempts to conduct commonly forbidden actions. These barriers are not activated by default and have the ability to be turned off.

Guardrails we can apply Account level or OU level.

The organization has the ability to choose the mode of the guardrails based on the requirements that they have. If the user gives it the instruction to operate in detection mode, then it will only recognise potentially harmful configurations of AWS resources. For example, if a company decides to implement a policy that states, “None of the S3 buckets that have been deployed should be accessible publicly,” Guardrail will recognise this violation of the policy and send a notification to all of the user’s registered email addresses informing them that the particular bucket in question has been made public by the offending user. Therefore, with the notification team’s help, they will be able to take the necessary precautions or activities to protect themselves. If Guardrails is set to operate in the preventative mode, then no user will be able to deploy a bucket that has public access enabled. This is because Guardrails will begin preventing the appropriate action and will protect the organizations from something that is going to deploy publicly.

Guardrail while in behavior:

Monitoring, recognizing when policies have been violated, and preventing an organization from violating policies are all possible uses for this tool.

Press enter or click to view image in full size
Press enter or click to view image in full size

Introduction to Multi Account Strategy in AWS Control Tower

Press enter or click to view image in full size
Press enter or click to view image in full size

whats the multi account envirement for keep these workloads isolated as simple billing structure, simple permission structure redusing some of the risk.

CT is setup aws organization units. This is the envirement we are working with below.

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

This is how to organiz that one account and break that up multi accounts envirement thats going to give you some benifits is billing , cleariy, isolation and permissions isolation.

It is possible to use AWS Control Tower If you alredy have existing AWS organization?

Press enter or click to view image in full size
Press enter or click to view image in full size

Migrate your existing aws organization structure if you one in the CT you want to complete with pre requisites

Press enter or click to view image in full size

AWS Control Tower Extensions and Enhancements

Press enter or click to view image in full size

more that just the applince comes with the house actually work how enhancements and extentions to CT. So we have 5 key usecases . Securty , Network management , identity management ,operation managemnet and globle security and compliance.

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

How to deploy Control Tower?

Press enter or click to view image in full size
Press enter or click to view image in full size

During the control Tower setup Landing zone is created automatically.

When some questions have. Whre is the region set up on your landing zone. When we create a control tower its create 2 mandadory OUs. its not a choice.

OU1: Securty (ou)— Log Archive and Audit accounts

OU2:Sandbox (ou)-optional OU— Sandbox account

Any other OUs that you build, no any other plicies are apply. You can customiz and enbale those policies.

Press enter or click to view image in full size

When you deploy the control tower you get fedarated single sign on access. You can use AWS SSO, now we can call “AWS Identity Center”. Adenticy center is provide derectory, but you want to provide external directoy like octa, microsoft active directry you can actually intergrate that as well. Account factory you can basically use provisioned accounts.

You want to deploy in a controll tower Managemnt Account.

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

In here we need to create 2 accounts. 1 account is specifically for log archive. These e mail has been unique.

Press enter or click to view image in full size

In audit account enter new email address. this is 2 unique accounts. we want to 2 unique email address for create this 2 accounts.

Press enter or click to view image in full size

CloudTrail is basically AWS organizational level. That gets enable.

Press enter or click to view image in full size

If you want to enable encryption , you can actually do that too. (this demo we are leave it)

Press enter or click to view image in full size

Setup Landing Zone. This process take 60–90 mins complete.

Press enter or click to view image in full size

Once the deployment is complete, you will see the organizational structure

Press enter or click to view image in full size
Press enter or click to view image in full size

This guardrails are basically on our foundational mandotory OUs.

Press enter or click to view image in full size

Sanbox and Securty Ous are in under the Root OU. You can creates multi levels of organizational structure. We can create up to 5 nested OUs. But it not be the right practice. Keep you organizational structure as simple.

In Account factory you can create your accounts. When you create a AWS account via account factory default VPC is created this address range(172.31.0.0/16). But we can edit this vpc range.

Press enter or click to view image in full size

If you select a region its will enabled(default vpc is created). Thats mean its will default at default vpc. but you dont select any region, that means its desabled.

Press enter or click to view image in full size

Account Factory:

Press enter or click to view image in full size

When you have create new account, you must have unique email address.

Press enter or click to view image in full size

This process is take few minitues.

Create OUs:

Press enter or click to view image in full size
Press enter or click to view image in full size

You can like move the accounts between OUs too.

Add guardrails in OU:

Press enter or click to view image in full size

How when deploy CT you get a landing zone. As part of the landing zone you will get sso.

Press enter or click to view image in full size

AWS SSo provide directry and you can enable for users.

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

In member account:

Press enter or click to view image in full size

you cant enble control tower in member account

Press enter or click to view image in full size

Now we use a AWS provide SSO directry. We can use external directry.

Press enter or click to view image in full size

Then eny identy you will create in Octa, is availble in AWS identity center.

Press enter or click to view image in full size

##############################################################

1) . Multi Account Strategy in AWS Control Tower

Press enter or click to view image in full size

Benifits of using multiple AWS accounts:

Press enter or click to view image in full size

Why suing multiple AWS accounts:

Press enter or click to view image in full size

Muti account comes with more challanges. That why AWS organization comes in. AWS organization is Account management service. That enable you to consolidate multiple AWS accounts in to one singale organization.

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

Design principles for multiple AWS accounts:

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

Recommended OUs:

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

2. Existing AWS Organizations

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

What happend during the setup?

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

Existing Account Entrollment:

Press enter or click to view image in full size

we seen setting up controll tower in existing AWS organization. Now existing account entrollment. I have existing aws account and then I have setup my controll tower. Once I complete controll tower I might have entroll my existing accounts in control tower.

Press enter or click to view image in full size

That aws account must be in the same ognization. then what we do is account wchich you are trying to envolve you will create a policy. Policy name is AWSContrilTowerExecution role. And then delete AWS config recorder and delivery channel.

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

DEMO:

Press enter or click to view image in full size

create OU:

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

Now we can bring AWS account to OU. There are 2 ways for that.

  1. you have existing account, go to OU and enter account ID and its send the invitation to account admin. Once accept that invitation that account will be added.
  2. 2. Create accounr in Account Factory. refer below screenshots.
Press enter or click to view image in full size
Press enter or click to view image in full size

This process takes 5–10mins.

Press enter or click to view image in full size

If you dont want the default VPC to be created ,

Press enter or click to view image in full size
Press enter or click to view image in full size

Logging to newly created AWS account via Administrator user permissions.

Press enter or click to view image in full size

--

Achintha Bandaranaike
Achintha Bandaranaike

Written by Achintha Bandaranaike

AWS Community Builder ☁️| Cloud Enthusiast | 3xAWS | 3xAzure | Terraform Certified | 1xGCP

No responses yet