Skip to content

Commit

Permalink
Merge pull request #57 from CrowdStrike/enhancements-0824
Browse files Browse the repository at this point in the history
Fix/Enhancements 0824
  • Loading branch information
kkvinjam authored Aug 9, 2024
2 parents 7287c5b + 59d5d9a commit 466bf82
Show file tree
Hide file tree
Showing 7 changed files with 283 additions and 176 deletions.
25 changes: 19 additions & 6 deletions .taskcat.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,14 +18,14 @@ tests:
regions:
- us-east-1
template: templates/crowdstrike_init_stack.yaml
cw-test-ct:
cw-test-trail:
parameters:
FalconClientID: $[taskcat_ssm_/crowdstrike/falcon_client_id]
FalconSecret: $[taskcat_ssm_/crowdstrike/falcon_secret]
SourceS3BucketName: $[taskcat_autobucket]
S3BucketRegion: $[taskcat_current_region]
ProvisionOU: $[taskcat_ssm_/crowdstrike/provision-ou]
CreateOrgTrail: "true"
CreateIOAOrgTrail: "true"
ExcludeRegions: $[taskcat_ssm_/crowdstrike/exclude_regions]
regions:
- us-east-1
Expand Down Expand Up @@ -63,23 +63,36 @@ tests:
ProvisionOU: $[taskcat_ssm_/crowdstrike/provision-ou]
ExcludeRegions: $[taskcat_ssm_/crowdstrike/exclude_regions]
EnableSSMDistributor: "true"
CreateOrgTrail: "true"
CreateIOAOrgTrail: "true"
CreateSRAOrgTrail: "true"
regions:
- us-east-1
template: templates/crowdstrike_init_stack.yaml
cw-test-nonct:
cw-test-sra:
parameters:
FalconClientID: $[taskcat_ssm_/crowdstrike/falcon_client_id]
FalconSecret: $[taskcat_ssm_/crowdstrike/falcon_secret]
SourceS3BucketName: $[taskcat_autobucket]
S3BucketRegion: $[taskcat_current_region]
ProvisionOU: $[taskcat_ssm_/crowdstrike/provision-ou]
CreateOrgTrail: "true"
CreateSRAOrgTrail: "true"
ExcludeRegions: $[taskcat_ssm_/crowdstrike/exclude_regions]
regions:
- us-east-1
template: templates/crowdstrike_init_stack.yaml
cw-test-sra-nonct:
parameters:
FalconClientID: $[taskcat_ssm_/crowdstrike/falcon_client_id]
FalconSecret: $[taskcat_ssm_/crowdstrike/falcon_secret]
SourceS3BucketName: $[taskcat_autobucket]
S3BucketRegion: $[taskcat_current_region]
ProvisionOU: $[taskcat_ssm_/crowdstrike/provision-ou]
CreateSRAOrgTrail: "true"
ExcludeRegions: $[taskcat_ssm_/crowdstrike/exclude_regions]
pControlTower: 'false'
pLogArchiveAccountId: $[taskcat_ssm_/nonct/log-archive-account-id]
pSecurityAccountId: $[taskcat_ssm_/nonct/audit-account-id]
pGovernedRegions: 'us-east-1,us-east-2'
regions:
- us-east-1
template: templates/crowdstrike_init_stack.yaml
template: templates/crowdstrike_init_stack.yaml
4 changes: 1 addition & 3 deletions guide/content/cleanup-instructions.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,5 @@ description: Instructions to clean up the resources created by the ABI solution.

1. Delete CloudFormation Stack:
* Stack name: `template-crowdstrike-enable-integrations`
2. Delete CloudWatch Log Group:
* Log Group name: aws/lambda/crowdstrike-org-id
3. Empty and Delete S3 Bucket
2. Empty and Delete S3 Bucket
* S3 Bucket Name: aws-abi-${AWS::AccountId}-${AWS::Region}
5 changes: 5 additions & 0 deletions guide/content/deployment-options.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,5 +21,10 @@ You may use this solution to register the following account types:

**Note:** When registering Commercial AWS with GovCloud Falcon, this solution **must be launched in us-east-1**

#### Optional CloudTrail

This solution can deploy a CloudTrail for you AWS Organization.

* Create Default Organization CloudTrail: This optional trail is required if you do not have an Organization CloudTrail enabled for you AWS Organization.

**Next:** Choose [Predeployment steps](/pre-deployment-steps/index.html).
31 changes: 16 additions & 15 deletions guide/content/deployment-steps.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,11 @@ description: Deployment steps.
* **Enable IOA Scanning**: Whether to enable IOA Scanning. Allowed vlaues include `true` or `false`. Default is `true`
* **StackSet Administration Role**: Name of StackSet Administration role. Default is `AWSCloudFormationStackSetAdministrationRole`
* **StackSet Execution Role**: Name of StackSet Execution role. Default is `AWSCloudFormationStackSetExecutionRole`
* **Create Optional Organization CloudTrail**: Whether to create an additional CLoudTrail to enable ReadOnly IOAs. Allowed values include `true` or `false`. The default is `false`
* **Create Optional Organization CloudTrail**: Whether you plan to create an additional CloudTrail to enable ReadOnly IOAs. If `true` the CrowdStrike Bucket name (target for your CloudTrail) will be in the outputs and exports of this stack. Allowed values include `true` or `false`. The default is `false`
* **Exclude Prohibited Regions**: List of regions to exclude from deployment. Use this when SCPs cause stacksets to fail. Eg. `[<region-1>,<region-2>,....]`
* Sensor Management
* **Enable Sensor Management**
* **API Credentials Storage Mode**
* Provision OUs
* **The Organization Root ID or Organizational Unit (OU) IDs to Provision**: Comma Delimited List of AWS OU(s) to provision. If you are provisioning the entire organization, please enter the Root OU `r-******`
* Deploy Falcon Sensors with SSM Distributor
Expand All @@ -37,23 +40,21 @@ description: Deployment steps.
* **Cron Schedule Expression**: If EnableSSMDistributor is `true`: Define the schedule or rate by which the SSM Automation runs. The default is `cron(0 0 */1 * * ? *)` (runs every hour)
* **Max Errors Allowed**: If EnableSSMDistributor is `true`: The number or percent of errors that are allowed before the system stops sending requests to run the association on additional targets. The default is `10%`
* **Max Concurrency Allowed**: If EnableSSMDistributor is `true`: The maximum number or percent of targets allowed to run the association at the same time. The default is `20%`
* Sensor Management
* **Enable Sensor Management**
* **API Credentials Storage Mode**

* Use the default values for the following parameters:
* AWS S3 Bucket
* **Source S3 Bucket Name**
* **S3 Bucket Region**
* **Source S3 Bucket Name Prefix**
* **Source S3 Bucket Name**: Name of the S3 Bucket for staging files. The default is `aws-abi-${AWS::AccountId}-${AWS::Region}`
* **S3 Bucket Region**: Region of the S3 Bucket for staging files.
* **Source S3 Bucket Name Prefix**: Prefix of the S3 Bucket for sourcing files. Do not change the defult value.
* AWS Organization ID - Lambda Function Properties
* **AWS Organization ID - Lambda Role Name**
* **AWS Organization ID - Lambda Function Name**
* **AWS Organization ID - Lambda Role Name**: Name of the Organization ID Lambda Function execution Role. The default is `sra-sh-org-id-lambda`
* **AWS Organization ID - Lambda Function Name**: Name of the Organization ID Lambda Function. The default is `crowdstrike-org-id`
* Advanced Configuration Properties
* **pControlTower**
* **pGovernedRegions**
* **pSecurityAccountId**
* **pLogArchiveAccountId**
* **Delegated Administrator Account**: Indicates whether this is a Delegated Administrator account. Allowed values include `true` or `false`. Default is `false`
* Create Organization CloudTrail
* **Create Default Organization CloudTrail**: Create org-wide trail, bucket, and bucket policy to enable EventBridge event collection. If you already have either an Organization CloudTrail or CloudTrails enabled in each account, please leave this parameter false.
* **Control Tower**: If Create Default Org Trail = true: Indicates whether AWS Control Tower is deployed and being used for this AWS environment.
* **Governed Regions**: If Create Default Org Trail = true: for AWS Control Tower, set to ct-regions (default). If not using AWS Control Tower, specify comma separated list of regions (e.g. us-west-2,us-east-1,ap-south-1) in lower case.
* **Security Account Id**: If Create Default Org Trail = true: AWS Account ID of the Security Tooling account (ignored for AWS Control Tower environments).
* **Log Archive Account Id**: If Create Default Org Trail = true: AWS Account ID of the Log Archive account (ignored for AWS Control Tower environments).

3. Select both of the following capabilities and choose **Submit** to launch the stack.

Expand Down
Loading

0 comments on commit 466bf82

Please sign in to comment.