Mandatory controls - AWS Prescriptive Guidance

Mandatory controls

Mandatory controls are enforced by AWS Control Tower to protect AWS Control Tower managed resources. You can’t deactivate mandatory controls.

Documenting mandatory controls for your organization

In your landing zone design document, you can document the mandatory controls that AWS Control Tower enforces by using the following table format. You can extend this table with optional controls and custom controls, as discussed later in this section.

Note

AWS Control Tower controls are continuously updated. For the most up-to-date and complete list of controls, see Mandatory controls in the AWS Control Tower documentation.

Control

Guidance level

Behavior

Default OU

Purpose

Disallow Changes to Encryption Configuration for AWS Control Tower Created Amazon S3 Buckets in Log Archive

Mandatory

Preventive

Security OU

Protects the encryption configuration for buckets deployed by AWS Control Tower in the Log Archive account so that encryption cannot be turned off for sensitive logs.

Disallow Changes to Logging Configuration for AWS Control Tower Created Amazon S3 Buckets in Log Archive

Mandatory

Preventive

Security OU

Protects the logging configuration for buckets deployed by AWS Control Tower in the Log Archive account so that only AWS Control Tower can make changes to these configurations.

Disallow Changes to Bucket Policy for AWS Control Tower Created Amazon S3 Buckets in Log Archive

Mandatory

Preventive

Security OU

Protects the bucket policies for buckets deployed by AWS Control Tower in the Log Archive account. This helps ensure that only AWS Control Tower can edit the permissions for the centralized logs, and that sensitive logs are secured.

Disallow Changes to Lifecycle Configuration for AWS Control Tower Created Amazon S3 Buckets in Log Archive

Mandatory

Preventive

Security OU

Protects the lifecycle configuration for buckets deployed by AWS Control Tower in the Log Archive account so that logs are stored for the required amount of time.

Disallow Changes to Amazon CloudWatch Logs Log Groups set up by AWS Control Tower

Mandatory

Preventive

All OUs

Protects the retention policy for the CloudWatch logs set up by AWS Control Tower in the Log Archive account so that only AWS Control Tower can make changes and logs are secured.

Disallow Deletion of AWS Config Aggregation Authorizations Created by AWS Control Tower

Mandatory

Preventive

All OUs

Protects the AWS Config aggregation authorizations set up by AWS Control Tower in the Audit account. This helps ensure that only AWS Control Tower can modify or disable account authorizations and that all authorization changes can be logged.

Disallow Deletion of Log Archive

Mandatory

Preventive

Security OU

Prevents deletion of the S3 buckets created by AWS Control Tower in the Log Archive account. This helps ensure that no one can remove the central log buckets.

Detect Public Read Access Setting for Log Archive

Mandatory

Detective

Security OU

Detects changes to read access permissions to the bucket deployed by AWS Control Tower in the Log Archive account. Such changes could risk exposing the central logs to the public.

Detect Public Write Access Setting for Log Archive

Mandatory

Detective

Security OU

Detects changes to write access permissions to the bucket deployed by AWS Control Tower. Such changes could risk exposing the central logs to the public.

Disallow Configuration Changes to CloudTrail

Mandatory

Preventive

All OUs

Protects the configuration of the organization trail deployed by AWS Control Tower. This helps ensure that only AWS Control Tower can modify the trail.

Integrate CloudTrail Events with Amazon CloudWatch Logs

Mandatory

Preventive

All OUs

Protects the CloudTrail event selectors of the organization trail deployed by AWS Control Tower.

Enable CloudTrail in All Available Regions                        

Mandatory

Preventive

All OUs

Protects the configuration of the organization trail deployed by AWS Control Tower in all enabled AWS Regions. This helps ensure that CloudTrail always collects logs in all enabled Regions.

Enable Integrity Validation for CloudTrail Log File

Mandatory

Preventive

All OUs

Protects the integrity of CloudTrail log files in the organization trail deployed by AWS Control Tower. Enabling integrity validation helps ensure that the digest file created for the logs can always prove that logs have not been modified.

Disallow Changes to Amazon CloudWatch Set Up by AWS Control Tower

Mandatory

Preventive

All OUs

Protects the CloudWatch logs set up by AWS Control Tower from modification or removal so that AWS Control Tower log configurations aren't modified.

Disallow Changes to Tags Created by AWS Control Tower for AWS Config Resources

Mandatory

Preventive

All OUs

Prevents changes to the tags that AWS Control Tower created when you set up the landing zone. This helps secure the AWS Control Tower functionality that is dependent on those tags.

Disallow Configuration Changes to AWS Config

Mandatory

Preventive

All OUs

Protects the AWS Config configuration set up by AWS Control Tower so that AWS Config recording cannot be modified or stopped.

Enable AWS Config in All Available Regions

Mandatory

Preventive

All OUs

Protects the AWS Config configuration set up by AWS Control Tower so that AWS Config recording cannot be modified or stopped in any AWS Region.

Disallow Changes to AWS Config Rules Set Up by AWS Control Tower

Mandatory

Preventive

All OUs

Protects the AWS Config Rules that are set up by AWS Control Tower to prevent them from being modified or removed. This helps ensure that the controls that are specific to AWS Control Tower are managed by AWS Control Tower only.

Disallow Changes to AWS IAM Roles Set Up by AWS Control Tower and AWS CloudFormation

Mandatory

Preventive

All OUs

Prevents changes to the IAM roles that AWS Control Tower created when you set up the landing zone so that the landing zone is secured.

Disallow Changes to AWS Lambda Functions Set Up by AWS Control Tower

Mandatory

Preventive

All OUs

Prevents changes to the AWS Lambda functions that are set up by AWS Control Tower so that the landing zone is secured.

Disallow Changes to Amazon SNS Set Up by AWS Control Tower

Mandatory

Preventive

All OUs

Prevents changes to the Amazon SNS topics that are set up by AWS Control Tower so that the landing zone is secured.

Disallow Changes to Amazon SNS Subscriptions Set Up by AWS Control Tower

Mandatory

Preventive

All OUs

Prevents changes to the Amazon SNS subscriptions that are set up by AWS Control Tower so that the integrity of Amazon SNS subscription settings for your landing zone are secured.

Detect whether shared accounts under the Security organizational unit have AWS CloudTrail or CloudTrail Lake enabled

Mandatory

Detective

Security OU

Detects whether AWS CloudTrail and AWS CloudTrail Lake are disabled in the accounts under the security OU.