Guided Walkthroughs
Step-by-step configuration wizards for your environment
Dedicated Security Account
AWS Backup Strategy
VPC Connectivity Setup
Automated Patching
All Guides
Auto remediation configuration to enable S3 Bucket Logging if an S3 bucket created with logging disabled. Detection uses a managed AWS Config Rule and remediation is with SSM Automation.
AWSTemplateFormatVersion: '2010-09-09'
Description: ''
Resources:
ConfigRule:
Type: 'AWS::Config::ConfigRule'
Properties:
ConfigRuleName: s3-bucket-logging-enabled
Scope:
ComplianceResourceTypes:
- 'AWS::S3::Bucket'
Description: Auto remediation configuration to enable S3 Bucket Logging if an S3 bucket created with logging disabled. Detection uses a managed AWS Config Rule and remediation is with SSM Automation.
Source:
Owner: AWS
SourceIdentifier: S3_BUCKET_LOGGING_ENABLED
RemediationForConfigRule:
Type: 'AWS::Config::RemediationConfiguration'
Properties:
Automatic: true
ConfigRuleName:
Ref: ConfigRule
MaximumAutomaticAttempts: 5
RetryAttemptSeconds: 60
TargetId: AWS-ConfigureS3BucketLogging
TargetType: SSM_DOCUMENT
TargetVersion: '1'
Parameters:
AutomationAssumeRole:
StaticValue:
Values:
- 'Fn::GetAtt':
- AutoRemediationIamRole
- Arn
BucketName:
ResourceValue:
Value: RESOURCE_ID
AutoRemediationIamRole:
Type: 'AWS::IAM::Role'
Properties:
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal:
Service:
- ec2.amazonaws.com
- events.amazonaws.com
- ssm.amazonaws.com
Action:
- 'sts:AssumeRole'
ManagedPolicyArns:
- 'arn:aws:iam::aws:policy/service-role/AmazonSSMAutomationRole'
Policies:
- PolicyName: AllowPutBucketLogging
PolicyDocument:
Version: '2012-10-17'
Statement:
- Sid: AllowPutBucketLogging
Effect: Allow
Action: 's3:PutBucketLogging'
Resource: 'arn:aws:s3:::*'
AutomationPassRolePolicy:
Type: 'AWS::IAM::Policy'
Properties:
PolicyName: passAutomationRole
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- 'iam:PassRole'
Resource:
'Fn::GetAtt':
- AutoRemediationIamRole
- Arn
Roles:
- Ref: AutoRemediationIamRole
Parameters: {}
Metadata: {}
Conditions: {}