diff --git a/aws-config-conformance-packs/Operational-Best-Practices-for-NCSC-CloudSec-Principles.yaml b/aws-config-conformance-packs/Operational-Best-Practices-for-NCSC-CloudSec-Principles.yaml index f4f6b58f..d8873caf 100644 --- a/aws-config-conformance-packs/Operational-Best-Practices-for-NCSC-CloudSec-Principles.yaml +++ b/aws-config-conformance-packs/Operational-Best-Practices-for-NCSC-CloudSec-Principles.yaml @@ -10,6 +10,12 @@ ################################################################################## Parameters: + InternetGatewayAuthorizedVpcOnlyParamAuthorizedVpcIds: + Default: '' + Type: String + NoUnrestrictedRouteToIgwParamRouteTableIds: + Default: '' + Type: String AccessKeysRotatedParamMaxAccessKeyAge: Default: '90' Type: String @@ -17,13 +23,13 @@ Parameters: Default: '90' Type: String CloudwatchAlarmActionCheckParamAlarmActionRequired: - Default: 'TRUE' + Default: 'true' Type: String CloudwatchAlarmActionCheckParamInsufficientDataActionRequired: - Default: 'TRUE' + Default: 'true' Type: String CloudwatchAlarmActionCheckParamOkActionRequired: - Default: 'FALSE' + Default: 'false' Type: String CwLoggroupRetentionPeriodCheckParamMinRetentionTime: Default: '365' @@ -68,13 +74,13 @@ Parameters: Default: '90' Type: String RedshiftClusterConfigurationCheckParamClusterDbEncrypted: - Default: 'TRUE' + Default: 'true' Type: String RedshiftClusterConfigurationCheckParamLoggingEnabled: - Default: 'TRUE' + Default: 'true' Type: String RedshiftClusterMaintenancesettingsCheckParamAllowVersionUpgrade: - Default: 'TRUE' + Default: 'true' Type: String RestrictedIncomingTrafficParamBlockedPort1: Default: '20' @@ -92,16 +98,16 @@ Parameters: Default: '4333' Type: String S3AccountLevelPublicAccessBlocksPeriodicParamBlockPublicAcls: - Default: 'TRUE' + Default: 'true' Type: String S3AccountLevelPublicAccessBlocksPeriodicParamBlockPublicPolicy: - Default: 'TRUE' + Default: 'true' Type: String S3AccountLevelPublicAccessBlocksPeriodicParamIgnorePublicAcls: - Default: 'TRUE' + Default: 'true' Type: String S3AccountLevelPublicAccessBlocksPeriodicParamRestrictPublicBuckets: - Default: 'TRUE' + Default: 'true' Type: String VpcSgOpenOnlyToAuthorizedPortsParamAuthorizedTcpPorts: Default: '443' @@ -871,6 +877,12 @@ Resources: Source: Owner: AWS SourceIdentifier: INTERNET_GATEWAY_AUTHORIZED_VPC_ONLY + InputParameters: + AuthorizedVpcIds: + Fn::If: + - internetGatewayAuthorizedVpcOnlyParamAuthorizedVpcIds + - Ref: InternetGatewayAuthorizedVpcOnlyParamAuthorizedVpcIds + - Ref: AWS::NoValue Type: AWS::Config::ConfigRule KinesisStreamEncrypted: Properties: @@ -945,6 +957,12 @@ Resources: Source: Owner: AWS SourceIdentifier: NO_UNRESTRICTED_ROUTE_TO_IGW + InputParameters: + routeTableIds: + Fn::If: + - noUnrestrictedRouteToIgwParamRouteTableIds + - Ref: NoUnrestrictedRouteToIgwParamRouteTableIds + - Ref: AWS::NoValue Type: AWS::Config::ConfigRule OpensearchEncryptedAtRest: Properties: @@ -1586,3 +1604,13 @@ Conditions: - Fn::Equals: - '' - Ref: VpcSgOpenOnlyToAuthorizedPortsParamAuthorizedTcpPorts + internetGatewayAuthorizedVpcOnlyParamAuthorizedVpcIds: + Fn::Not: + - Fn::Equals: + - '' + - Ref: InternetGatewayAuthorizedVpcOnlyParamAuthorizedVpcIds + noUnrestrictedRouteToIgwParamRouteTableIds: + Fn::Not: + - Fn::Equals: + - '' + - Ref: NoUnrestrictedRouteToIgwParamRouteTableIds