A terraform module to set up your AWS account with the reasonably secure configuration baseline.Most configurations are based on CIS Amazon Web Services Foundations v1.4.0 and AWS Foundational Security Best Practices v1.0.0.
See Benchmark Compliance to check which items in various benchmarks are covered.
data "aws_caller_identity" "current" {}
data "aws_region" "current" {}
module "secure_baseline" {
source = "nozaq/secure-baseline/aws"
audit_log_bucket_name = "YOUR_BUCKET_NAME"
aws_account_id = data.aws_caller_identity.current.account_id
region = data.aws_region.current.name
support_iam_role_principal_arns = ["YOUR_IAM_USER"]
providers = {
aws = aws
aws.ap-northeast-1 = aws.ap-northeast-1
aws.ap-northeast-2 = aws.ap-northeast-2
aws.ap-northeast-3 = aws.ap-northeast-3
aws.ap-south-1 = aws.ap-south-1
aws.ap-southeast-1 = aws.ap-southeast-1
aws.ap-southeast-2 = aws.ap-southeast-2
aws.ca-central-1 = aws.ca-central-1
aws.eu-central-1 = aws.eu-central-1
aws.eu-north-1 = aws.eu-north-1
aws.eu-west-1 = aws.eu-west-1
aws.eu-west-2 = aws.eu-west-2
aws.eu-west-3 = aws.eu-west-3
aws.sa-east-1 = aws.sa-east-1
aws.us-east-1 = aws.us-east-1
aws.us-east-2 = aws.us-east-2
aws.us-west-1 = aws.us-west-1
aws.us-west-2 = aws.us-west-2
}
}
Check the example to understand how these providers are defined.Note that you need to define a provider for each AWS region and pass them to the module. Currently this is the recommended way to handle multiple regions in one module.Detailed information can be found at Providers within Modules - Terraform Docs.
A new S3 bucket to store audit logs is automatically created by default, while the external S3 bucket can be specified. It is useful when you already have a centralized S3 bucket to store all logs. Please see external-bucket example for more detail.
When you have multiple AWS accounts in your AWS Organization, secure-baseline
module configures the separated environment for each AWS account. You can change this behavior to centrally manage security information and audit logs from all accounts in one master account.Check organization example for more detail.
This module is composed of several submodules and each of which can be used independently.Modules in Package Sub-directories - Terraform describes how to source a submodule.
Name | Version |
---|---|
terraform | >= 0.15 |
aws | >= 3.50.0 |
Name | Version |
---|---|
aws | >= 3.50.0 |
Name | Source | Version |
---|---|---|
alarm_baseline | ./modules/alarm-baseline | n/a |
analyzer_baseline_ap-northeast-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_ap-northeast-2 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_ap-northeast-3 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_ap-south-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_ap-southeast-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_ap-southeast-2 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_ca-central-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_eu-central-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_eu-north-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_eu-west-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_eu-west-2 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_eu-west-3 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_sa-east-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_us-east-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_us-east-2 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_us-west-1 | ./modules/analyzer-baseline | n/a |
analyzer_baseline_us-west-2 | ./modules/analyzer-baseline | n/a |
audit_log_bucket | ./modules/secure-bucket | n/a |
cloudtrail_baseline | ./modules/cloudtrail-baseline | n/a |
config_baseline_ap-northeast-1 | ./modules/config-baseline | n/a |
config_baseline_ap-northeast-2 | ./modules/config-baseline | n/a |
config_baseline_ap-northeast-3 | ./modules/config-baseline | n/a |
config_baseline_ap-south-1 | ./modules/config-baseline | n/a |
config_baseline_ap-southeast-1 | ./modules/config-baseline | n/a |
config_baseline_ap-southeast-2 | ./modules/config-baseline | n/a |
config_baseline_ca-central-1 | ./modules/config-baseline | n/a |
config_baseline_eu-central-1 | ./modules/config-baseline | n/a |
config_baseline_eu-north-1 | ./modules/config-baseline | n/a |
config_baseline_eu-west-1 | ./modules/config-baseline | n/a |
config_baseline_eu-west-2 | ./modules/config-baseline | n/a |
config_baseline_eu-west-3 | ./modules/config-baseline | n/a |
config_baseline_sa-east-1 | ./modules/config-baseline | n/a |
config_baseline_us-east-1 | ./modules/config-baseline | n/a |
config_baseline_us-east-2 | ./modules/config-baseline | n/a |
config_baseline_us-west-1 | ./modules/config-baseline | n/a |
config_baseline_us-west-2 | ./modules/config-baseline | n/a |
ebs_baseline_ap-northeast-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_ap-northeast-2 | ./modules/ebs-baseline | n/a |
ebs_baseline_ap-northeast-3 | ./modules/ebs-baseline | n/a |
ebs_baseline_ap-south-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_ap-southeast-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_ap-southeast-2 | ./modules/ebs-baseline | n/a |
ebs_baseline_ca-central-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_eu-central-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_eu-north-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_eu-west-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_eu-west-2 | ./modules/ebs-baseline | n/a |
ebs_baseline_eu-west-3 | ./modules/ebs-baseline | n/a |
ebs_baseline_sa-east-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_us-east-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_us-east-2 | ./modules/ebs-baseline | n/a |
ebs_baseline_us-west-1 | ./modules/ebs-baseline | n/a |
ebs_baseline_us-west-2 | ./modules/ebs-baseline | n/a |
guardduty_baseline_ap-northeast-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_ap-northeast-2 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_ap-northeast-3 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_ap-south-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_ap-southeast-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_ap-southeast-2 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_ca-central-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_eu-central-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_eu-north-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_eu-west-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_eu-west-2 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_eu-west-3 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_sa-east-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_us-east-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_us-east-2 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_us-west-1 | ./modules/guardduty-baseline | n/a |
guardduty_baseline_us-west-2 | ./modules/guardduty-baseline | n/a |
iam_baseline | ./modules/iam-baseline | n/a |
s3_baseline | ./modules/s3-baseline | n/a |
securityhub_baseline_ap-northeast-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_ap-northeast-2 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_ap-northeast-3 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_ap-south-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_ap-southeast-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_ap-southeast-2 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_ca-central-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_eu-central-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_eu-north-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_eu-west-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_eu-west-2 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_eu-west-3 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_sa-east-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_us-east-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_us-east-2 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_us-west-1 | ./modules/securityhub-baseline | n/a |
securityhub_baseline_us-west-2 | ./modules/securityhub-baseline | n/a |
vpc_baseline_ap-northeast-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_ap-northeast-2 | ./modules/vpc-baseline | n/a |
vpc_baseline_ap-northeast-3 | ./modules/vpc-baseline | n/a |
vpc_baseline_ap-south-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_ap-southeast-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_ap-southeast-2 | ./modules/vpc-baseline | n/a |
vpc_baseline_ca-central-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_eu-central-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_eu-north-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_eu-west-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_eu-west-2 | ./modules/vpc-baseline | n/a |
vpc_baseline_eu-west-3 | ./modules/vpc-baseline | n/a |
vpc_baseline_sa-east-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_us-east-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_us-east-2 | ./modules/vpc-baseline | n/a |
vpc_baseline_us-west-1 | ./modules/vpc-baseline | n/a |
vpc_baseline_us-west-2 | ./modules/vpc-baseline | n/a |
Name | Description | Type | Default | Required |
---|---|---|---|---|
account_type | The type of the AWS account. The possible values are individual , master and member . Specify master and member to set up centalized logging for multiple accounts in AWS Organization. Use individual otherwise. |
string |
"individual" |
no |
alarm_namespace | The namespace in which all alarms are set up. | string |
"CISBenchmark" |
no |
alarm_sns_topic_kms_master_key_id | To enable SNS Topic encryption enter value with the ID of a custom master KMS key that is used for encryption | any |
null |
no |
alarm_sns_topic_name | The name of the SNS Topic which will be notified when any alarm is performed. | string |
"CISAlarm" |
no |
allow_users_to_change_password | Whether to allow users to change their own password. | bool |
true |
no |
analyzer_name | The name for the IAM Access Analyzer resource to be created. | string |
"default-analyzer" |
no |
audit_log_bucket_custom_policy_json | Override policy for the audit log bucket. Allows addition of extra policies. | string |
"{}" |
no |
audit_log_bucket_force_destroy | A boolean that indicates all objects should be deleted from the audit log bucket so that the bucket can be destroyed without error. These objects are not recoverable. | bool |
false |
no |
audit_log_bucket_name | The name of the S3 bucket to store various audit logs. | any |
n/a | yes |
audit_log_lifecycle_glacier_transition_days | The number of days after log creation when the log file is archived into Glacier. | number |
90 |
no |
aws_account_id | The AWS Account ID number of the account. | any |
n/a | yes |
aws_config_changes_enabled | The boolean flag whether the aws_config_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
cloudtrail_cfg_changes_enabled | The boolean flag whether the cloudtrail_cfg_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
cloudtrail_cloudwatch_logs_enabled | Specifies whether the trail is delivered to CloudWatch Logs. | bool |
true |
no |
cloudtrail_cloudwatch_logs_group_name | The name of CloudWatch Logs group to which CloudTrail events are delivered. | string |
"cloudtrail-multi-region" |
no |
cloudtrail_dynamodb_event_logging_tables | The list of DynamoDB table ARNs on which to enable event logging. | list |
[ |
no |
cloudtrail_iam_role_name | The name of the IAM Role to be used by CloudTrail to delivery logs to CloudWatch Logs group. | string |
"CloudTrail-CloudWatch-Delivery-Role" |
no |
cloudtrail_iam_role_policy_name | The name of the IAM Role Policy to be used by CloudTrail to delivery logs to CloudWatch Logs group. | string |
"CloudTrail-CloudWatch-Delivery-Policy" |
no |
cloudtrail_key_deletion_window_in_days | Duration in days after which the key is deleted after destruction of the resource, must be between 7 and 30 days. Defaults to 30 days. | number |
10 |
no |
cloudtrail_lambda_invocation_logging_lambdas | The list of lambda ARNs on which to enable invocation logging. | list |
[ |
no |
cloudtrail_name | The name of the trail. | string |
"cloudtrail-multi-region" |
no |
cloudtrail_s3_key_prefix | The prefix used when CloudTrail delivers events to the S3 bucket. | string |
"cloudtrail" |
no |
cloudtrail_s3_object_level_logging_buckets | The list of S3 bucket ARNs on which to enable object-level logging. | list |
[ |
no |
cloudtrail_sns_topic_enabled | Specifies whether the trail is delivered to a SNS topic. | bool |
true |
no |
cloudtrail_sns_topic_name | The name of the SNS topic to link to the trail. | string |
"cloudtrail-multi-region-sns-topic" |
no |
cloudwatch_logs_retention_in_days | Number of days to retain logs for. CIS recommends 365 days. Possible values are: 0, 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, and 3653. Set to 0 to keep logs indefinitely. | number |
365 |
no |
config_aggregator_name | The name of the organizational AWS Config Configuration Aggregator. | string |
"organization-aggregator" |
no |
config_aggregator_name_prefix | The prefix of the name for the IAM role attached to the organizational AWS Config Configuration Aggregator. | string |
"config-for-organization-role" |
no |
config_baseline_enabled | Boolean whether config-baseline is enabled. | bool |
true |
no |
config_delivery_frequency | The frequency which AWS Config sends a snapshot into the S3 bucket. | string |
"One_Hour" |
no |
config_global_resources_all_regions | Record global resources in all regions. If false, only default region will record global resources. | bool |
false |
no |
config_iam_role_name | The name of the IAM Role which AWS Config will use. | string |
"Config-Recorder" |
no |
config_iam_role_policy_name | The name of the IAM Role Policy which AWS Config will use. | string |
"Config-Recorder-Policy" |
no |
config_s3_bucket_key_prefix | The prefix used when writing AWS Config snapshots into the S3 bucket. | string |
"config" |
no |
config_sns_topic_kms_master_key_id | To enable SNS Topic encryption enter value with the ID of a custom master KMS key that is used for encryption | any |
null |
no |
config_sns_topic_name | The name of the SNS Topic to be used to notify configuration changes. | string |
"ConfigChanges" |
no |
console_signin_failures_enabled | The boolean flag whether the console_signin_failures alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
create_manager_role | Define if the manager role should be created. | bool |
true |
no |
create_master_role | Define if the master role should be created. | bool |
true |
no |
create_password_policy | Define if the password policy should be created. | bool |
true |
no |
create_support_role | Define if the support role should be created. | bool |
true |
no |
disable_or_delete_cmk_enabled | The boolean flag whether the disable_or_delete_cmk alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
guardduty_disable_email_notification | Boolean whether an email notification is sent to the accounts. | bool |
false |
no |
guardduty_enabled | Boolean whether the guardduty-baseline module is enabled or disabled | bool |
true |
no |
guardduty_finding_publishing_frequency | Specifies the frequency of notifications sent for subsequent finding occurrences. | string |
"SIX_HOURS" |
no |
guardduty_invitation_message | Message for invitation. | string |
"This is an automatic invitation message from guardduty-baseline module." |
no |
iam_changes_enabled | The boolean flag whether the iam_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
manager_iam_role_name | The name of the IAM Manager role. | string |
"IAM-Manager" |
no |
manager_iam_role_policy_name | The name of the IAM Manager role policy. | string |
"IAM-Manager-Policy" |
no |
master_account_id | The ID of the master AWS account to which the current AWS account is associated. Required if account_type is member . |
string |
"" |
no |
master_iam_role_name | The name of the IAM Master role. | string |
"IAM-Master" |
no |
master_iam_role_policy_name | The name of the IAM Master role policy. | string |
"IAM-Master-Policy" |
no |
max_password_age | The number of days that an user password is valid. | number |
0 |
no |
member_accounts | A list of IDs and emails of AWS accounts which associated as member accounts. | list(object({ |
[] |
no |
minimum_password_length | Minimum length to require for user passwords. | number |
14 |
no |
nacl_changes_enabled | The boolean flag whether the nacl_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
network_gw_changes_enabled | The boolean flag whether the network_gw_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
no_mfa_console_signin_enabled | The boolean flag whether the no_mfa_console_signin alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
organizations_changes_enabled | The boolean flag whether the organizations_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
password_reuse_prevention | The number of previous passwords that users are prevented from reusing. | number |
24 |
no |
region | The AWS region in which global resources are set up. | any |
n/a | yes |
require_lowercase_characters | Whether to require lowercase characters for user passwords. | bool |
false |
no |
require_numbers | Whether to require numbers for user passwords. | bool |
false |
no |
require_symbols | Whether to require symbols for user passwords. | bool |
false |
no |
require_uppercase_characters | Whether to require uppercase characters for user passwords. | bool |
false |
no |
root_usage_enabled | The boolean flag whether the root_usage alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
route_table_changes_enabled | The boolean flag whether the route_table_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
s3_block_public_acls | Whether Amazon S3 should block public ACLs for buckets in this account. Defaults to true. | bool |
true |
no |
s3_block_public_policy | Whether Amazon S3 should block public bucket policies for buckets in this account. Defaults to true. | bool |
true |
no |
s3_bucket_policy_changes_enabled | The boolean flag whether the s3_bucket_policy_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
s3_ignore_public_acls | Whether Amazon S3 should ignore public ACLs for buckets in this account. Defaults to true. | bool |
true |
no |
s3_restrict_public_buckets | Whether Amazon S3 should restrict public bucket policies for buckets in this account. Defaults to true. | bool |
true |
no |
security_group_changes_enabled | The boolean flag whether the security_group_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
securityhub_enable_aws_foundational_standard | Boolean whether AWS Foundations standard is enabled. | bool |
true |
no |
securityhub_enable_cis_standard | Boolean whether CIS standard is enabled. | bool |
true |
no |
securityhub_enable_pci_dss_standard | Boolean whether PCI DSS standard is enabled. | bool |
false |
no |
securityhub_enable_product_arns | List of Security Hub product ARNs, <REGION> will be replaced. See https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-partner-providers.html for list. |
list(string) |
[] |
no |
securityhub_enabled | Boolean whether the securityhub-baseline module is enabled or disabled | bool |
true |
no |
support_iam_role_name | The name of the the support role. | string |
"IAM-Support" |
no |
support_iam_role_policy_name | The name of the support role policy. | string |
"IAM-Support-Role" |
no |
support_iam_role_principal_arns | List of ARNs of the IAM principal elements by which the support role could be assumed. | list(any) |
n/a | yes |
tags | Specifies object tags key and value. This applies to all resources created by this module. | map |
{} |
no |
target_regions | A list of regions to set up with this module. | list |
[ |
no |
unauthorized_api_calls_enabled | The boolean flag whether the unauthorized_api_calls alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
use_external_audit_log_bucket | A boolean that indicates whether the specific audit log bucket already exists. Create a new S3 bucket if it is set to false. | bool |
false |
no |
vpc_changes_enabled | The boolean flag whether the vpc_changes alarm is enabled or not. No resources are created when set to false. | bool |
true |
no |
vpc_enable | Boolean whether the VPC baseline module should be enabled | bool |
true |
no |
vpc_enable_flow_logs | The boolean flag whether to enable VPC Flow Logs in default VPCs | bool |
true |
no |
vpc_flow_logs_destination_type | The type of the logging destination. Valid values: cloud-watch-logs, s3 | string |
"cloud-watch-logs" |
no |
vpc_flow_logs_log_group_name | The name of CloudWatch Logs group to which VPC Flow Logs are delivered. | string |
"default-vpc-flow-logs" |
no |
vpc_flow_logs_retention_in_days | Number of days to retain logs if vpc_log_destination_type is cloud-watch-logs. CIS recommends 365 days. Possible values are: 0, 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, and 3653. Set to 0 to keep logs indefinitely. | number |
365 |
no |
vpc_flow_logs_s3_arn | ARN of the S3 bucket to which VPC Flow Logs are delivered if vpc_log_destination_type is s3. | string |
"" |
no |
vpc_flow_logs_s3_key_prefix | The prefix used when VPC Flow Logs delivers logs to the S3 bucket. | string |
"flow-logs" |
no |
vpc_iam_role_name | The name of the IAM Role which VPC Flow Logs will use. | string |
"VPC-Flow-Logs-Publisher" |
no |
vpc_iam_role_policy_name | The name of the IAM Role Policy which VPC Flow Logs will use. | string |
"VPC-Flow-Logs-Publish-Policy" |
no |
Name | Description |
---|---|
alarm_sns_topic | The SNS topic to which CloudWatch Alarms will be sent. |
audit_bucket | The S3 bucket used for storing audit logs. |
cloudtrail | The trail for recording events in all regions. |
cloudtrail_kms_key | The KMS key used for encrypting CloudTrail events. |
cloudtrail_log_delivery_iam_role | The IAM role used for delivering CloudTrail events to CloudWatch Logs. |
cloudtrail_log_group | The CloudWatch Logs log group which stores CloudTrail events. |
cloudtrail_sns_topic | The sns topic linked to the cloudtrail. |
config_configuration_recorder | The configuration recorder in each region. |
config_iam_role | The IAM role used for delivering AWS Config records to CloudWatch Logs. |
config_sns_topic | The SNS topic that AWS Config delivers notifications to. |
default_network_acl | The default network ACL. |
default_route_table | The default route table. |
default_security_group | The ID of the default security group. |
default_vpc | The default VPC. |
guardduty_detector | The GuardDuty detector in each region. |
support_iam_role | The IAM role used for the support user. |
vpc_flow_logs_group | The CloudWatch Logs log group which stores VPC Flow Logs in each region. |
vpc_flow_logs_iam_role | The IAM role used for delivering VPC Flow Logs to CloudWatch Logs. |
Terraform AWS frontend module Collection of Terraform modules for frontend app deployment on AWS. List of submodules Frontend app Maintainers Bartłomiej Wójtowicz (@qbart) Łukasz Pawlik (@LukeP91) LIC
Terraform Provider for AWS Website: terraform.io Tutorials: learn.hashicorp.com Forum: discuss.hashicorp.com Chat: gitter Mailing List: Google Groups The Terraform AWS provider is a plugin for Terrafo
AWS VPC Terraform module Terraform module which creates VPC resources on AWS. Usage module "vpc" { source = "terraform-aws-modules/vpc/aws" name = "my-vpc" cidr = "10.0.0.0/16" azs = [
Mastodon on AWS with Terraform Terraform module for mastodon service deploy Will deploy an ec2 instance with mastodon and run the service. Requirements AWS account EC2 domain with Route53 Terraform Us
AWS RDS Terraform module Terraform module which creates RDS resources on AWS. Root module calls these modules which can also be used separately to create independent resources: db_instance - creates R
AWS Identity and Access Management (IAM) Terraform module Features Cross-account access. Define IAM roles using iam_assumable_role or iam_assumable_roles submodules in "resource AWS accounts (prod, st