Skip to content

Commit

Permalink
Merge pull request #5 from Coalfire-CF/ReadMe's-Review
Browse files Browse the repository at this point in the history
Read me's review
  • Loading branch information
kourosh-forti-hands authored Oct 3, 2023
2 parents f746ee7 + 7ecb6d4 commit dd064df
Show file tree
Hide file tree
Showing 3 changed files with 197 additions and 0 deletions.
55 changes: 55 additions & 0 deletions aws/terraform/us-gov-west-1/networking/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
# DAY 0 Deployment Management Account

## Description
This module includes the networking setup, including VPC provisions, Subnet creation and provisions, AWS network firewall policies, and other various network components.

FedRAMP Compliance: Moderate, High

## Dependencies
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | ~>1.5.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0 |

## Resource List
A high-level list of resources created as a part of this module.
- VPC
- Subnets
- Public
- Private
- Firewall
- Compute
- IAM Roles
- IAM Policies
- KMS Keys

## tfvars Example
``` hcl
resource_prefix = "<customer-prefix>"
deploy_aws_nfw = true
aws_region = "<aws-region>"
cidrs_for_remote_access = ["<Customer-IP>"]
mgmt_vpc_cidr = "<Customer-Custom-CIDR-Range"
profile = "<customer-prefix>-mgmt"
```

## Deployment Steps
- Change the working directory the `networking` folder
- If you are running this directory for the first time, comment out the S3 backend in `tstate.tf`
- From in front of `backend "s3"` to the bracket associated with the end of the code block
- Run `terraform init`
- Run `terraform plan` to review the resources being created
- If everything looks correct in the plan output, run `terraform apply`

``` hcl
data "terraform_remote_state" "day0" {
backend = "s3"
config = {
bucket = "ooc-us-gov-west-1-tf-state"
region = var.aws_region
key = "ooc-us-gov-west-1-tfsetup.tfstate"
profile = "ooc-mgmt"
}
}
```
71 changes: 71 additions & 0 deletions aws/terraform/us-gov-west-1/org-creation/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@
# DAY 0 Deployment Management Account

## Description
This module provisions the management account setup, including initial account confirguations, IAM roles, KMS keys, S3 bucket installs, etc.

FedRAMP Compliance: High

## Dependencies
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | ~>1.5.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0 |

## Resource List
A high-level list of resources created as a part of this module.
- IAM Roles
- IAM Policies
- IAM instance profiles
- KMS Keys
- S3 buckets
- Region Setup
- Security Core Module Resources

## Code Updates

`tstate.tf` Update to the appropriate version and storage accounts, see sample
``` hcl
terraform {
required_version = ">=1.5.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 5.0"
}
}
backend "s3" {
bucket = "ooc-us-gov-west-1-tf-state"
region = "us-gov-west-1"
key = "ooc-us-gov-west-1-tfsetup.tfstate"
dynamodb_table = "ooc-us-gov-west-1-state-lock"
encrypt = true
}
}
```

## Deployment Steps
- Change the working directory to the `management-account` directory
- If you are running this directory for the first time, comment out the S3 backend in `tstate.tf`
- From in front of `backend "s3"` to the bracket associated with the end of the code block
- Run `terraform init`
- Run `terraform plan` to review the resources being created
- If everything looks correct in the plan output, run `terraform apply -var-file ./tfvars/vars.tfvars`

``` hcl
terraform {
required_version = ">=1.5.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 5.0"
}
}
backend "s3" {
bucket = "ooc-us-gov-west-1-tf-state"
region = "us-gov-west-1"
key = "ooc-us-gov-west-1-tfsetup.tfstate"
dynamodb_table = "ooc-us-gov-west-1-state-lock"
encrypt = true
}
}
```
71 changes: 71 additions & 0 deletions aws/terraform/us-gov-west-1/org-onboarding/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@
# DAY 0 Deployment Management Account

## Description
This module provisions the management account setup, including initial account confirguations, IAM roles, KMS keys, S3 bucket installs, etc.

FedRAMP Compliance: High

## Dependencies
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | ~>1.5.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0 |

## Resource List
A high-level list of resources created as a part of this module.
- IAM Roles
- IAM Policies
- IAM instance profiles
- KMS Keys
- S3 buckets
- Region Setup
- Security Core Module Resources

## Code Updates

`tstate.tf` Update to the appropriate version and storage accounts, see sample
``` hcl
terraform {
required_version = ">=1.5.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 5.0"
}
}
backend "s3" {
bucket = "ooc-us-gov-west-1-tf-state"
region = "us-gov-west-1"
key = "ooc-us-gov-west-1-tfsetup.tfstate"
dynamodb_table = "ooc-us-gov-west-1-state-lock"
encrypt = true
}
}
```

## Deployment Steps
- Change the working directory to the `management-account` directory
- If you are running this directory for the first time, comment out the S3 backend in `tstate.tf`
- From in front of `backend "s3"` to the bracket associated with the end of the code block
- Run `terraform init`
- Run `terraform plan` to review the resources being created
- If everything looks correct in the plan output, run `terraform apply -var-file ./tfvars/vars.tfvars`

``` hcl
terraform {
required_version = ">=1.5.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 5.0"
}
}
backend "s3" {
bucket = "ooc-us-gov-west-1-tf-state"
region = "us-gov-west-1"
key = "ooc-us-gov-west-1-tfsetup.tfstate"
dynamodb_table = "ooc-us-gov-west-1-state-lock"
encrypt = true
}
}
```

0 comments on commit dd064df

Please sign in to comment.