选择您的 Cookie 首选项

我们使用必要 Cookie 和类似工具提供我们的网站和服务。我们使用性能 Cookie 收集匿名统计数据,以便我们可以了解客户如何使用我们的网站并进行改进。必要 Cookie 无法停用,但您可以单击“自定义”或“拒绝”来拒绝性能 Cookie。

如果您同意,AWS 和经批准的第三方还将使用 Cookie 提供有用的网站功能、记住您的首选项并显示相关内容,包括相关广告。要接受或拒绝所有非必要 Cookie,请单击“接受”或“拒绝”。要做出更详细的选择,请单击“自定义”。

Optional controls - AWS Prescriptive Guidance
此页面尚未翻译为您的语言。 请求翻译

Optional controls

You can enable optional controls on OUs in the organization if you choose. These controls are categorized as strongly recommended or elective controls. Strongly recommended controls are based on best practices for well-architected, multi-account environments. Elective controls prevent or track attempts to perform commonly restricted actions in an AWS enterprise environment. Unlike mandatory controls, strongly recommended and elective controls aren't activated by default—you can activate and deactivate them according to your requirements.

Security and compliance requirements

Make sure that you customize and adapt your control configurations and choices according to your landing zone requirements. The security requirements of your organization determine which controls to use and which OUs to enable them on. Before you select optional controls, you should consider your organization's specific goals, requirements, and compliance needs. Perform a comprehensive risk assessment to identify the specific risks and vulnerabilities that your organization faces in its AWS environment, and gather your security and compliance requirements. After you list your requirements clearly, you can start selecting the optional controls.

Guidelines

Strongly recommended controls are rooted in industry best practices for setting up a secure landing zone. Therefore, unless you have specific requirements that prevent their implementation, we recommend that you enable these controls across all OUs where the associated resources are provisioned.

Elective controls encompass industry-specific best practices and are tailored to address the unique security and compliance requirements of certain industries. We recommend that you research the best practices for your industry and adapt the relevant elective controls accordingly. The controls are designed to strengthen the security and compliance of your AWS environment, and adhering to them helps you align with recognized security standards.

However, some OUs might have unique circumstances that warrant exceptions. For example, consider enabling controls related to Amazon Elastic Block Store (Amazon EBS) volume encryption in OUs, such as workload OUs, where sensitive data is expected. Conversely, in a sandbox OU where experimentation is encouraged and no sensitive data is involved, you might have the flexibility to skip certain controls. The key is to balance robust security, compliance, and operational flexibility. Always aim to apply controls where they provide the most value while respecting the specific needs of each OU.

Documenting optional controls for your organization

You can use a table similar to the following in your design document to mark which optional controls should be enabled on which OUs. You can extend this table with information about the mandatory and custom controls you're using in your organization.

This table includes both strongly recommended and elective controls. The AWS Security Hub standard controls, data residency controls, and proactive controls are additional optional controls that you can append to the table. These are described later in this section.

The following table shows example configurations and OUs that you should adjust for your specific security and compliance requirements.

Note

AWS Control Tower controls are continuously updated. For the most up-to-date and complete list, see Optional controls in the AWS Control Tower documentation.

Control

Guidance level

Behavior

Security OU

Infrastructure OU

Suspended OU

Workloads OU

Deployments OU

Sandbox OU

Purpose

Disallow Creation of Access Keys for the Root User

Strongly recommended

Preventive

Yes

Yes

Yes

Yes

Yes

Yes

Reduces the risk of unauthorized access to the sensitive root user.

Disallow Actions as a Root User

Strongly recommended

Preventive

Yes

Yes

Yes

Yes

Yes

Yes

Reduces the impact of unauthorized access to the sensitive root user.

Detect Whether Encryption is Enabled for Amazon EBS Volumes Attached to Amazon EC2 Instances

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

No

Ensures that encryption is enabled to strengthen data security, maintain compliance, mitigate risks, or align with security best practices.

Detect Whether Unrestricted Incoming TCP Traffic is Allowed

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

No

Helps reduce the network attack surface for TCP traffic.

Detect Whether Unrestricted Internet Connection Through SSH is Allowed

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

No

Helps reduce the network attack surface for SSH traffic.

Detect Whether MFA for the Root User is Enabled

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

Yes

Helps reduce the risk of unauthorized access to the sensitive root user through multi-factor authentication.

Detect Whether Public Read Access to Amazon S3 Buckets is Allowed

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

No

Mitigates the risk of unauthorized read access to sensitive data by identifying S3 buckets that might be publicly accessible.

Detect Whether Public Write Access to Amazon S3 Buckets is Allowed

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

No

Mitigates the risk of unauthorized write access to sensitive data by identifying S3 buckets that might be publicly accessible.

Detect Whether Amazon EBS Volumes are Attached to Amazon EC2 Instances

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

No

Detects whether an Amazon EBS volume device persists independently from an Amazon EC2 instance.

Detect Whether Amazon EBS Optimization is Enabled for Amazon EC2 Instances

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

No

Detects  EC2 instances where performance and cost can be improved by using Amazon EBS optimization.

Detect Whether Public Access to Amazon RDS Database Instances is Enabled

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

No

Detects publicly accessible Amazon Relational Database Service (Amazon RDS) database instances to secure sensitive data.

Detect Whether Public Access to Amazon RDS Database Snapshots is Enabled

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

Yes

Detects publicly accessible Amazon RDS database snapshots to secure sensitive data.

Detect Whether Storage Encryption is Enabled for Amazon RDS Database Instances

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

No

Identifies unencrypted Amazon RDS instances to mitigate risk of sensitive data exposure.

Detect whether an account has AWS CloudTraill or CloudTrail Lake enabled

Strongly recommended

Detective

Yes

Yes

Yes

Yes

Yes

Yes

Ensures that proper monitoring is enabled by using CloudTrail.

Disallow Changes to Replication Configuration for Amazon S3 Buckets

Elective

Preventive

Yes

Yes

Yes

Yes

Yes

No

Prevents unauthorized alterations to replication configurations to ensure consistent data replication and adherence to regulatory requirements.

Disallow Delete Actions on Amazon S3 Buckets Without MFA

Elective

Preventive

Yes

Yes

Yes

Yes

Yes

No

Prevents accidental or malicious deletion of S3 buckets by requiring multi-factor authentication.

Detect Whether MFA is Enabled for AWS IAM Users

Elective

Detective

Yes

Yes

Yes

Yes

Yes

No

Identifies IAM users that don't have multi-factor authentication enabled, to mitigate the risk of unauthorized access.

Detect Whether MFA is Enabled for AWS IAM Users of the AWS Console

Elective

Detective

Yes

Yes

Yes

Yes

Yes

No

Identifies IAM users  in the AWS Management Console that don't have multi-factor authentication enabled, to mitigate the risk of unauthorized access.

Detect Whether Versioning for Amazon S3 Buckets is Enabled

Elective

Detective

Yes

Yes

Yes

Yes

Yes

No

Identifies S3 buckets where versioning isn't enabled, to mitigate the risk of accidental deletion or modification of data.

Disallow Changes to Encryption Configuration for Amazon S3 Buckets

Elective

Preventive

Yes

Yes

Yes

Yes

Yes

No

Prevents changes to encryption configuration of S3 buckets to protect sensitive data.

Disallow Changes to Logging Configuration for Amazon S3 Buckets 

Elective

Preventive

Yes

Yes

Yes

Yes

Yes

No

Prevents changes to logging configuration for S3 buckets to ensure consistent and reliable audit logging.

Disallow Changes to Bucket Policy for Amazon S3 Buckets

Elective

Preventive

Yes

Yes

Yes

Yes

Yes

No

Prevents changes to bucket policies for S3 buckets to maintain proper access controls.

Disallow Changes to Lifecycle Configuration for Amazon S3 Buckets

Elective

Preventive

Yes

Yes

Yes

Yes

Yes

No

Prevents changes to lifecycle configurations for S3 buckets to help maintain data management consistency and compliance.

Disallow management of resource types, modules, and hooks within the AWS CloudFormation registry

Elective

Preventive

(Note: You must enable this control when you activate proactive controls in your environment.)

Yes

Yes

Yes

Yes

Yes

Yes

Prevents unintended management of resource type, modules, and hooks to help ensure the stability and security of infrastructure deployments.

AWS Security Hub controls

AWS Control Tower is integrated with AWS Security Hub through a Security Hub standard. This integration provides additional controls that help you streamline security and compliance management in your AWS environment.

You can combine more than 230 detective controls from Security Hub with AWS Control Tower controls to help cover your security and compliance requirements. You can add your selected controls to the table that you set up in the previous section.

Note

To start using Security Hub controls in AWS Control Tower, go to the AWS Control Tower controls library and enable the desired Security Hub control. AWS Control Tower takes care of the activation process and creates a new standard named Service-Managed Standard: AWS Control Tower in Security Hub. This standard provides visibility into activated controls and their evaluations, which simplifies monitoring and compliance efforts. For more information, see Security Hub standard in the AWS Control Tower documentation.

Data residency controls

Data residency controls enforce data residency requirements in your organization. These elective controls are included in AWS Control Tower to help ensure that your data is stored and processed in compliance with your regulations and policies. You should consider using data residency controls in scenarios such as the following:

  • Regulatory compliance: You want to ensure that data is stored and processed in the designated geographic regions to meet regulatory requirements such as General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), or industry-specific regulations.

  • International operations: You want to segment your AWS workloads based on their geographic locations and ensure that data remains within the desired region.

  • Risk mitigations: You want to mitigate the risk of data exposure from accidental or unauthorized data transfers across regions, to reduce the risk of data leakage or non-compliance.

  • Data sovereignty: You run workloads in countries that have laws that require data to remain within the country's borders.

  • Data classification: You want to classify data based on its sensitivity or regulatory requirements, and then apply specific policies to each data classification.

It is essential to thoroughly understand your organization's data residency requirements and the relevant regulations before implementing data residency controls in AWS Control Tower.

Documenting data residency controls for your organization

When you design your data residency controls, you can use the optional controls table provided previously in this section and append the data residency controls that you have selected to meet your requirements. The following table lists the existing controls and examples of when to use them.

Note

AWS Control Tower controls are continuously updated. For the most up-to-date and complete list of controls, see Controls that enhance data residency protection in the AWS Control Tower documentation.

Control

Guidance level

Behavior

Default OU

Purpose

Deny access to AWS based on the requested AWS Region

Elective

Preventive

All OUs, if enabled in AWS Control Tower landing zone settings.

(This control is frequently referred to as the Region deny control.)

Ensures that AWS resources are provisioned only in approved AWS Regions, aligning with data residency and compliance requirements.

Disallow internet access for an Amazon VPC instance managed by a customer

Elective

Preventive

Prevents internet access in VPCs to reduce the risk of unauthorized access or data exposure to the public when there are data residency and privacy requirements.

Disallow AWS Virtual Private Network (AWS VPN) connections

Elective

Preventive

Restricts VPN connections to guard against unauthorized access, data exfiltration, or bypassing security controls.

Disallow cross-region networking for Amazon EC2, Amazon CloudFront, and AWS Global Accelerator

Elective

Preventive

Prevents cross-Region networking to maintain data residency and help ensure that data remains within approved Regions. Public access could inadvertently lead to data being distributed outside these boundaries.

Detect whether public IP addresses for Amazon EC2 autoscaling are enabled through launch configurations

Elective

Detective

Monitors and controls the exposure of instances to the public internet. This helps reduce the attack surface and risk of unauthorized access that might compromise data residency and security.

Detect whether replication instances for AWS Database Migration Service are public

Elective

Detective

Ensures that replication instances aren't publicly accessible, which helps protect sensitive data from unauthorized access and data residency violations.

Detect whether Amazon EBS snapshots are restorable by all AWS accounts

Elective

Detective

Limits access to EBS snapshots to help prevent unauthorized access, data breaches, and potential non-compliance with data residency regulations.

Detect whether any Amazon EC2 instance has an associated public IPv4 address

Elective

Detective

Helps identify and mitigate security risks associated with instances that have public IP addresses. These instances might be more vulnerable to attacks.

Detect whether Amazon S3 settings to block public access are set as true for the account

Elective

Detective

Enforces strict access controls on Amazon S3 buckets to prevent unauthorized public access to sensitive data, to align with data residency and privacy needs.

Detects whether an Amazon EKS endpoint is blocked from public access

Elective

Detective

Ensures that Amazon Elastic Kubernetes Service (Amazon EKS) cluster endpoints aren't accessible from the public internet. This helps prevent unauthorized sharing of sensitive data that might compromise data residency requirements.

Detect whether an Amazon OpenSearch Service domain is in Amazon VPC

Elective

Detective

Ensures that Amazon OpenSearch Service domain endpoints aren't public. Deploying these domains within VPCs improves data security by preventing public access and maintaining data residency within trusted network boundaries.

Detect whether any Amazon EMR cluster master nodes have public IP addresses

Elective

Detective

Reduces security risks of compromising data residency requirements by ensuring that Amazon EMR cluster master nodes don't have publicly accessible IP addresses.

Detect whether the AWS Lambda function policy attached to the Lambda resource blocks public access

Elective

Detective

Controls access to AWS Lambda functions and prevents unauthorized public invocation or exposure of sensitive functions.

Detect whether public routes exist in the route table for an Internet Gateway (IGW)

Elective

Detective

Helps maintain network security by ensuring that public routes through an internet gateway are configured only where necessary.

Detect whether Amazon Redshift clusters are blocked from public access

Elective

Detective

Ensures that Amazon Redshift clusters aren't publicly accessible. This helps protect clusters from unauthorized access that could compromise data residency.

Detect whether an Amazon SageMaker AI notebook instance allows direct internet access

Elective

Detective

Helps prevents direct internet access to SageMaker AI notebook instances to align with data residency and security requirements, and to reduce exposure to potential threats.

Detect whether any Amazon VPC subnets are assigned a public IP address

Elective

Detective

Helps maintain network isolation to reduce the risk of unauthorized data exposure and data residency violations.

Detect whether AWS Systems Manager documents owned by the account are public

Elective

Detective

Helps ensure that Systems Manager documents aren't publicly accessible. This helps protect sensitive data and maintain data residency and security.

Proactive controls

Proactive controls are optional controls that are implemented with AWS CloudFormation Hooks. This mechanism enables you to run custom logic during the deployment of CloudFormation stacks to monitor and validate the configuration settings and resources that are defined in the CloudFormation templates. If proactive controls detect any deviations or non-compliance issues, they can take immediate action, such as halting the deployment, sending notifications, or initiating remediation processes, to help mitigate potential risks and maintain the desired security posture.

Proactive controls in AWS Control Tower help you identify and address issues before they become vulnerabilities or compliance violations, and ensure a robust and well-governed AWS environment. These controls are designed to complement the existing guardrails and controls within AWS Control Tower. They can provide an additional layer of security and compliance assurance, especially in scenarios where early prevention and continuous monitoring are essential. However, the specific proactive controls you choose to implement should align with your organization's goals, risk profile, and compliance needs. If your organization has specific security requirements that go beyond the default AWS Control Tower controls, you can customize proactive controls to meet these needs.

These controls are categorized by service and listed in the Proactive controls section of the AWS Control Tower documentation. You can choose from a large selection of controls and add them to your selected controls table.

Note

AWS CloudFormation Hooks isn't supported in all AWS Regions where AWS Control Tower is available. Therefore, when you deploy a proactive control, it might not operate in all AWS Regions that you govern with AWS Control Tower.

隐私网站条款Cookie 首选项
© 2025, Amazon Web Services, Inc. 或其附属公司。保留所有权利。