A history of notable changes to the guide.
|February 2, 2021||Fixed bug in team development AWS SSO permission set and permission boundary policy examples||The AWS CloudFormation resource ARN had a bug in that it did not specify a wildcard
||1. Update the team development permission boundary stack set: Download the updated template
2. Update the team development AWS SSO permission set: Access AWS SSO, select
|November 9, 2020||Certificate-based authentication for site-to-site VPN connections||Updated the guide to highlight a GitHub repository that provides details on setting up certificate-based authentication for your site-to-site VPN connections.||To move from private shared key (PSK)-based authentication to using certificate-based authentication, you will need to create a new customer gateway and migrate your connection to use the new gateway.|
|November 5, 2020||New Environment guardrails section||Consolidated and enhanced information about using guardrails for your AWS environment in support of security, operations, and compliance requirements.||Not applicable. New capability.|
|October 29, 2020||Alternative site-to-site VPN architectures and cost examples||In the Hybrid Networking section, added alternative site-to-site VPN architecture to compare and contrast with the recommended use of AWS Transit Gateway. Included operational and cost considerations.||Not applicable. New capability.|
|October 27, 2020||AWS Cloud9 private subnet support||Following the release of Cloud9’s support for using private subnets, the guide has been updated to describe how you can make use of this capability in your team development AWS accounts.||Not applicable. New capability.|
|September 21, 2020||Simplified site structure||Decoupled setting up your base foundation from setting up your foundation for team development environments. Made team development environments an optional capability that you can defer if you’d like to go straight to setting up your foundation for test and production environments.||Not applicable. New capability.|
|September 15, 2020||Integrated AWS Site-to-Site VPN with AWS Transit Gateway||New section added to address this optional capability.||Not applicable. New capability.|
|June 24, 2020||Changed example system identifier from
||Example resource names were changed to refer to
||No changes necessary unless you’ve already used
|June 23, 2020||Provide Cloud Foundation team with development environment and sufficient access||Addressed provisioning a distinct team development AWS account for the Cloud Foundation team and a separate OU with less restrictive access controls so that the team can have more write access to VPC resources than other teams.||No changes necessary. You can review the updated documentation if you’d like to learn from the new configuration.|
|June 23, 2020||Streamline new AWS account user management||No longer create a new AWS SSO user when using AWS Control Tower’s Account Factory when creating a new AWS account. Instruct the customer to remove the individual permissions granted by Account Factory.||No changes necessary. You can review the updated documentation and remove any lingering and unnecessary AWS account level AWS SSO users.|
|June 21 2020||Realign example AWS account names, OUs, and AWS SSO group names||Diagrams have been added to show example OUs and AWS account names. Names of these resources have been better aligned with naming best practices.||No changes necessary. If you’d like to rename your existing AWS accounts and OUs, you can do so using standard processes, but you will need to update your landing zone via AWS Control Tower to bring it in sync with your name changes. See Managing Resources Outside of AWS Control Tower for details.|
|May 1 2020||Fix SCPs to work with AWS Control Tower new account baselining||The sample network oriented SCPs were modified to allow for AWS Control Tower to carry out its network baselining tasks when a new AWS account is created via the Account Factory.
The failure symptom is when you create a new AWS account via Account Factory and receive the error “Enrollment failed…” and the provisioned product in AWS Service Catalog states “not authorized to baseline the VPC”.
|As a Cloud Administrator in the master AWS account, use AWS Organizations to update the existing sample network oriented SCPs with the updated samples in this guide.
If you have a new AWS account in a failed state as described above, you can terminate the provisioned product in AWS Service Catalog and then use AWS Control Tower and Account Factory to go through the creation process again. Ensure that you enter the same email address and other information when you attempt the AWS account creation process the second time. The Account Factory will pick up where it left off and complete its provisioning process.
|April 23 2020||Introduce initial set of Service Control Policies (SCPs) and apply to team development environments||The sample IAM SAML policy and permissions boundary policy for team development environments were streamlined through the removal of the VPC related deny permissions and the introduction of several AWS Organizations Service Control Policies (SCPs) to deny these actions summarily across AWS accounts in the
||1. Follow the new instructions to create the SCPs and apply them to the
2. Redeploy the AWS SSO permission set for team development environment access using the updated sample policy.
3. Redeploy the CloudFormation StackSet for the team development IAM permissions boundary using the updated sample policy.
|April 22 2020||AWS Control Tower supports reusing existing master AWS accounts||Address scenarios where you might want to reuse an existing master AWS account with AWS Control Tower.||Applies only to new AWS environment build outs.|
|March 31 2020||No longer share public subnets||Share only private subnets with team development accounts so that builder teams can’t enable Internet access to their development workloads.||Review the updated instructions. In Resource Access Manager in the Network account, remove sharing of the public subnets.|
|March 27 2020||Enhance team development IAM policies with NotAction||Using the AWS managed IAM policy developer oriented
||1. Redeploy the AWS SSO permission set for team development environment access using the updated sample policy.
2. Redeploy the CloudFormation StackSet for the team development IAM permissions boundary using the updated sample policy.
|March 15 2020||Convert to Hugo static site generator||Make it easier to browse the guide via a web site as compared to browsing markdown files in the git repository.||No changes necessary.|
|March 1 2020||Initial form of team development access controls based on IAM permissions boundaries||A means to enable builder teams with wide ranging access in their team development environments, but not able to modify the underlying foundation resources.||See the instructions for setting up access control for team development environments.|