Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Getting started aws #205

Merged
merged 3 commits into from
Dec 3, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ This is the ninth guide in the *Getting started with AWS series*.

- Completion of the previous guides in this series.
- Access to the Guardrails console with administrative privileges.
- Access to an AWS account with administrative privlidges to add permissions to the Guardrails cross-account role.
- Access to an AWS account with administrative privileges to add permissions to the Guardrails cross-account role.


## Step 1: Locate the IAM role
Expand Down Expand Up @@ -114,14 +114,12 @@ In this guide you increased the permissions scope for your cross-account role, e

In the [next guide](/guardrails/docs/getting-started/getting-started-aws/enable-enforcement) we’ll set Guardrails to automatically enforce these actions continuously.


## Progress tracker

- [x] Prepare an AWS Account for import to Guardrails
- [x] Prepare an AWS Account for Import to Guardrails
- [x] Connect an AWS Account to Guardrails
- [x] Observe AWS Resource Activity
- [x] Enable Your First Policy Pack
- [x] Review Account-Wide Bucket Versioning
- [x] Review Account-Wide Governance
- [x] Create a Static Exception to a Guardrails Policy
- [x] Create a Calculated Exception to a Guardrails Policy
- [x] Send an Alert to Email
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -71,11 +71,11 @@ In the [next guide](/guardrails/docs/getting-started/getting-started-aws/observe
If you run into issues following this guide, jump in the `#guardrails` channel in the [Turbot Community Slack](https://turbot.com/community/join), or [open a support ticket](https://support.turbot.com/hc/en-us/requests/new).

## Progress tracker

- [x] Prepare an AWS Account for import to Guardrails
- [x] Prepare an AWS Account for Import to Guardrails
- [x] **Connect an AWS Account to Guardrails**
- [ ] Observe AWS Resource Activity
- [ ] Enable Your First Policy Pack
- [ ] Review Account-Wide Bucket Versioning
- [ ] Review Account-Wide Governance
- [ ] Create a Static Exception to a Guardrails Policy
- [ ] Create a Calculated Exception to a Guardrails Policy
- [ ] Send an Alert to Email
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -125,14 +125,12 @@ In this guide you created your first calculated policy and tested it using the S

In the [next guide](/guardrails/docs/getting-started/getting-started-aws/send-alert-to-email) we’ll see how to subscribe to these status alerts via email, Slack, or MS Teams.


## Progress tracker

- [x] Prepare an AWS Account for import to Guardrails
- [x] Prepare an AWS Account for Import to Guardrails
- [x] Connect an AWS Account to Guardrails
- [x] Observe AWS Resource Activity
- [x] Enable Your First Policy Pack
- [x] Review Account-Wide Bucket Versioning
- [x] Review Account-Wide Governance
- [x] Create a Static Exception to a Guardrails Policy
- [x] **Create a Calculated Exception to a Guardrails Policy**
- [ ] Send an Alert to Email
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Create a Static Exception to a Guardrails Policy
Sidebar_label: Create a policy exception
Sidebar_label: Create a Policy Exception
---

# Create a Static Exception to a Guardrails AWS Policy
Expand All @@ -12,7 +12,7 @@ This is the sixth guide in the *Getting started with AWS* series.
**Prerequisites**:

- Completion of the previous guides in this series.
- Access to the Guardrails console with administrative privlidges.
- Access to the Guardrails console with administrative privileges.

## Step 1: Open the Controls by State report

Expand Down Expand Up @@ -91,12 +91,11 @@ In this guide you created a resource-level exception for the Bucket Versioning c
In the [next guide](/guardrails/docs/getting-started/getting-started-aws/create-calculated-exception) we’ll see how to dynamically calculate an exception based on a resource tag.

## Progress tracker

- [x] Prepare an AWS Account for import to Guardrails
- [x] Prepare an AWS Account for Import to Guardrails
- [x] Connect an AWS Account to Guardrails
- [x] Observe AWS Resource Activity
- [x] Enable Your First Policy Pack
- [x] Review Account-Wide Bucket Versioning
- [x] Review Account-Wide Governance
- [x] **Create a Static Exception to a Guardrails Policy**
- [ ] Create a Calculated Exception to a Guardrails Policy
- [ ] Send an Alert to Email
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -60,13 +60,13 @@ This Getting Started series just scratches the surface of what you can do with G

## Progress tracker

**Congratulations! You did it!**
*Congratulations! You did it!**

- [x] Prepare an AWS Account for import to Guardrails
- [x] Prepare an AWS Account for Import to Guardrails
- [x] Connect an AWS Account to Guardrails
- [x] Observe AWS Resource Activity
- [x] Enable Your First Policy Pack
- [x] Review Account-Wide Bucket Versioning
- [x] Review Account-Wide Governance
- [x] Create a Static Exception to a Guardrails Policy
- [x] Create a Calculated Exception to a Guardrails Policy
- [x] Send an Alert to Email
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -83,14 +83,12 @@ In this guide you’ve attached a Policy Pack to your AWS account to check S3 bu

In the [next guide](/guardrails/docs/getting-started/getting-started-aws/review-account-wide) you will create some additional buckets to see how the Policy Pack responds to new resource creation.


## Progress tracker

- [x] Prepare an AWS Account for import to Guardrails
- [x] Prepare an AWS Account for Import to Guardrails
- [x] Connect an AWS Account to Guardrails
- [x] Observe AWS Resource Activity
- [x] **Enable Your First Policy Pack**
- [ ] Review Account-Wide Bucket Versioning
- [ ] Review Account-Wide Governance
- [ ] Create a Static Exception to a Guardrails Policy
- [ ] Create a Calculated Exception to a Guardrails Policy
- [ ] Send an Alert to Email
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ This is the third guide in the *Getting started with AWS* series.
## Prerequisites

- Completion of the previous guides in this series.
- Access to the Guardrails console with administrative privlidges.
- Access to the Guardrails console with administrative privileges.
- Console access to an AWS account and the ability to create and modify S3 buckets.

> [!NOTE]
Expand Down Expand Up @@ -85,14 +85,12 @@ In this guide you changed the versioning property of an S3 bucket and observed h

Next we’ll explore [how to enable a policy pack](/guardrails/docs/getting-started/getting-started-aws/enable-policy-pack) that requires buckets to enable versioning.


## Progress tracker

- [x] Prepare an AWS Account for import to Guardrails
- [x] Prepare an AWS Account for Import to Guardrails
- [x] Connect an AWS Account to Guardrails
- [x] **Observe AWS Resource Activity**
- [ ] Enable Your First Policy Pack
- [ ] Review Account-Wide Bucket Versioning
- [ ] Review Account-Wide Governance
- [ ] Create a Static Exception to a Guardrails Policy
- [ ] Create a Calculated Exception to a Guardrails Policy
- [ ] Send an Alert to Email
Expand Down
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
---
title: Prepare an AWS Account for import to Guardrails
title: Prepare an AWS Account for Import to Guardrails
sidebar_label: Prepare the AWS Account
---

# Prepare an AWS Account for import to Guardrails
# Prepare an AWS Account for Import to Guardrails

In this guide, you will prepare an AWS account to be imported into Guardrails by deploying an IAM access role using a CloudFormation template.

Expand Down Expand Up @@ -93,12 +93,11 @@ In the [next guide](/guardrails/docs/getting-started/getting-started-aws/connect
If you run into issues following this guide, jump in the `#guardrails` channel in the [Turbot Community Slack](https://turbot.com/community/join), or [open a support ticket](https://support.turbot.com/hc/en-us/requests/new).

## Progress tracker

- [x] **Prepare an AWS Account for import to Guardrails**
- [x] **Prepare an AWS Account for Import to Guardrails**
- [ ] Connect an AWS Account to Guardrails
- [ ] Observe AWS Resource Activity
- [ ] Enable Your First Policy Pack
- [ ] Review Account-Wide Bucket Versioning
- [ ] Review Account-Wide Governance
- [ ] Create a Static Exception to a Guardrails Policy
- [ ] Create a Calculated Exception to a Guardrails Policy
- [ ] Send an Alert to Email
Expand Down
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
---
title: Review Account-wide governance
sidebar_label: Account-wide governance
title: Review Account-Wide Governance
sidebar_label: Account-Wide Governance
---


# Review Account-wide governance
# Review Account-wide Governance

In this guide you’ll see how a single Policy Pack can govern all resources across an account.

Expand All @@ -13,7 +13,7 @@ This is the fifth guide in the *Getting started with AWS* series.
## Prerequisites

- Completion of the previous guides in this series.
- Access to the Guardrails console with administrative privlidges.
- Access to the Guardrails console with administrative privileges.

## Step 1: Open the Controls by State report

Expand Down Expand Up @@ -55,12 +55,11 @@ In this guide you created three new S3 buckets and observed how the Policy Pack
In the [next guide](/guardrails/docs/getting-started/getting-started-aws/create-static-exception) we’ll learn how to create a static exception so that a bucket can be exempt from the versioning requirement.

## Progress tracker

- [x] Prepare an AWS Account for import to Guardrails
- [x] Prepare an AWS Account for Import to Guardrails
- [x] Connect an AWS Account to Guardrails
- [x] Observe AWS Resource Activity
- [x] Enable Your First Policy Pack
- [x] **Review Account-Wide Bucket Versioning**
- [x] **Review Account-Wide Governance**
- [ ] Create a Static Exception to a Guardrails Policy
- [ ] Create a Calculated Exception to a Guardrails Policy
- [ ] Send an Alert to Email
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -104,12 +104,11 @@ In this guide you configured a simple notification rule and triggered a notifica
In the [next guide](/guardrails/docs/getting-started/getting-started-aws/apply-quick-action) you’ll learn how to configure for [Quick Actions]([/guardrails/docs/guides/quick-actions](https://turbot.com/guardrails/docs/guides/quick-actions#enabling-quick-actions)) so you can, for example, directly enable versioning on a bucket that’s now in the `Alarm` state and make it green.

## Progress tracker

- [x] Prepare an AWS Account for import to Guardrails
- [x] Prepare an AWS Account for Import to Guardrails
- [x] Connect an AWS Account to Guardrails
- [x] Observe AWS Resource Activity
- [x] Enable Your First Policy Pack
- [x] Review Account-Wide Bucket Versioning
- [x] Review Account-Wide Governance
- [x] Create a Static Exception to a Guardrails Policy
- [x] Create a Calculated Exception to a Guardrails Policy
- [x] **Send an Alert to Email**
Expand Down
Loading