Tech with Tyler
LinkedInGitHubYouTube
  • 👋Welcome!
    • whoami
    • !!! Disclaimer !!!
  • 🎓Academy
    • AWS Security Cookbook by Tyler
      • AWS Control Tower
        • Lab: Deploying AWS Control Tower via Terraform
      • AWS CloudTrail
      • AWS GuardDuty
        • Lab: Deploying AWS GuardDuty via Terraform
        • Lab: Logging GuardDuty Findings to S3
        • Lab: Adversary Simulation Detection with Stratus Red Team and GuardDuty
      • AWS Organizations
        • Lab: Deploying AWS Organizations via Terraform
      • AWS Root Account Management
        • Lab: Deploying AWS Root Account Management via Terraform
      • AWS Service Control Policies (SCPs)
        • Lab: Deploying AWS Service Control Policies (SCPs) via Terraform
      • TBD - Coming Soon!
        • [TBD] AWS Account Factory
        • [TBD] AWS Identity Center
    • My content on Cybr
      • Course - Terraform on AWS: From Zero to Cloud Infrastructure
      • Lab - Create Static AWS S3 Website with Terraform
      • Lab - Secure EC2 Access with SSM Session Manager and KMS
      • Lab - Encrypt and Decrypt Data with KMS and Data Encryption Keys
    • My content on PwnedLabs
      • Cyber Range - Electra
      • Lab - Abusing Identity Providers in AWS
      • Lab - Prowler and AWS Security Hub
      • Blog - Abusing Identity Providers in AWS
      • Blog - Building Security Guardrails with AWS Resource Control Policies
      • Blog - Defending Against the whoAMI Attack with AWS Declarative Policies
    • My content on YouTube
      • AWS Security Engineering
      • Linux in 60 Seconds!
  • ☁️Cloud Security
    • AWS Attacks and Techniques
      • Enumerate AWS Account IDs
      • Enumerate AWS IAM Users
      • Enumerate (Unauthenticated) IAM Users and Roles
      • Enumerate AWS Public Resources
      • Enumerate Secrets in AWS
      • Generate AWS Console Session
      • Generate IAM Access Keys from CloudShell
      • Password Spraying AWS IAM Users
      • Subdomain Takeovers
    • AWS Privilege Escalation
      • Identity Access Management (IAM)
      • IAM Trust Policies
      • Key Management Service (KMS)
      • Lightsail
      • OpenID Connect (OIDC)
      • S3
      • Secrets Manager
      • Security Token Service (STS)
    • AWS General Info
      • Amazon Bedrock
      • EC2
      • KMS
      • S3
      • SNS Topic
    • AWS CLI Cheat Sheet
    • Capture the Flags (CTFs)
      • Flaws.Cloud
        • Level 1
        • Level 2
        • Level 3
        • Level 4
        • Level 5
        • Level 6
      • PwnedLabs
        • Escalate Privileges by IAM Policy Rollback
        • Exploiting Weak S3 Bucket Policies
        • Leveraging S3 Bucket Versioning
        • S3 Enumeration Basics
        • Pillage Exposed RDS Instances
        • EC2 SSRF Attack
        • Hunt for Secrets in Git Repos
      • Cybr
        • Challenge - Secrets Unleashed
    • Tools
      • Tooling Index
      • dsnap
      • Pacu
      • s3-account-search
      • GoAWSConsoleSpray
      • aws_consoler
      • cloudenum
  • 📦Containers & Orchestration
    • Kubernetes
  • 👨‍💻Coding & CLI Tooling
    • CLI Tools
      • AWS CLI
      • Git
      • GitHub Copilot (CLI)
      • Homebrew
      • jq
      • ngrok
      • ssh
    • Coding and Scripting
      • Bash
      • Python
    • Terminal Customization
  • ⚙️DevSecOps
    • CI/CD
      • GitLab
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
      • tfsec
    • Secrets Scanning
      • Trufflehog
  • 🎁Miscellaneous
    • Jenkins
  • 💻Operating Systems
    • Linux
      • APT Package Manager
      • CLI Tools Cheat Sheet
      • Man Pages
      • Services
      • Users and Groups
  • 🏗️Projects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • 📌Other
    • Useful Resources
Powered by GitBook
On this page
  • ‍📖 Introduction to AWS Control Tower
  • 🗒️ Understanding Control Tower's Features
  • 1. Landing Zone
  • 2. AWS Account Factory
  • 3. Comprehensive Controls Management
  • 📚 Additional Resources
  • 🏗️ Hands-on Exercises

Was this helpful?

  1. Academy
  2. AWS Security Cookbook by Tyler

AWS Control Tower

An overview of AWS Control Tower

PreviousAWS Security Cookbook by TylerNextLab: Deploying AWS Control Tower via Terraform

Last updated 10 hours ago

Was this helpful?

‍📖 Introduction to AWS Control Tower

AWS Control Tower offers a robust solution for swiftly setting up and managing a secure, multi-account AWS environment. By following AWS best practices, it simplifies security, governance, and compliance across your organization.

Deployment takes about an hour and during that time Control Tower acts on your behalf to orchestrate and configure AWS services such as Organizations, Service Control Policies, CloudTrail, AWS Config, Account Factory, Identity Center, and more.


🗒️ Understanding Control Tower's Features

1. Landing Zone

A Landing Zone is an environment based on AWS's well-architected, multi-account best practices. The following features are components of this:

  • AWS Organizations:

    • Unless you already have an Organization, this will be set up for you

    • It enables grouping AWS accounts into different Organizational Units and applying policy options (SCPs, RCPs, Declarative, Tagging, and more)

  • AWS CloudTrail:

    • Enables an Organization trail to log all events in AWS member accounts

    • You're able to use an existing CloudTrail if you have one rather than let Control Tower set one up but if you do, Control Tower's SCPs won't protect it (it protects the one it creates)

  • AWS Identity Center:

    • Optionally enables AWS Identity Center allowing for centralized management of AWS Groups and Permission sets across all of your AWS accounts

    • Enables the ability to use AWS Single Sign-On (SSO) or to integrate with a different Identity Provider (IdP) such as Okta or Active Directory

    • Identities created here are federated users and are not the same as traditional IAM Users and Roles that are managed in IAM

  • AWS "Audit" and "Log Archive" Accounts:

    • Unless you specified existing accounts to use, Control Tower creates two new AWS accounts

      • The Audit account is used for managing AWS Config and remediation actions while also receiving Simple Notification Service (SNS) notifications related to CloudTrail, AWS Config, CloudWatch, GuardDuty, and event or Control Tower drift changes

      • The Log Archive account stores AWS CloudTrail and AWS Config logs

    • You don't have to use the accounts this way but they are enabled for you to do so

2. AWS Account Factory

  • Enables deploying new AWS accounts which you can customize to your needs e.g., provisioning the accounts without default VPCs or enabling account-wide controls like blocking S3 buckets

3. Comprehensive Controls Management

Controls are high-level rules that provide ongoing governance for your AWS environment. The following types of controls are supported:

  • Mandatory Controls:

    • These controls are owned by AWS Control Tower and protect related resources

    • They cannot be disabled and are enforced via Service Control Policies and AWS Config rules

  • Detective Controls:

    • These controls check for noncompliant resources

    • They can be enabled/disabled

    • Examples include checking for encryption at rest or in transit or ensuring EC2 auto-scaling groups associated with an Elastic Load Balancer are using health checks

  • Proactive Controls:

    • These controls ensure resources created through CloudFormation meet policies and can block non-compliant resources

    • They can be enabled/disabled

    • Examples include validating whether GuardDuty's S3 protection is enabled or that an Elastic Kubernetes Service cluster's API endpoint is not publicly exposed

  • Preventative Controls:

    • These controls block actions related to policy violations

    • They must be created in the form of Service Control Policies, Resource Control Policies, or Declarative Policies, and AWS Backup or Digital sovereignty controls

    • Examples include preventing EBS snapshots or AMIs from being shared publicly, requiring all objects uploaded to S3 to be encrypted, and much more


📚 Additional Resources


🏗️ Hands-on Exercises

Check out the to learn more

Check out the to learn more

Check out the to learn more

Check out the to learn more

🎓
AWS Organizations module
AWS CloudTrail module
AWS Identity Center module
AWS Account Factory module
The controls can be found here
AWS Control Tower Documentation
Lab: Deploying AWS Control Tower via Terraform
Depiction of AWS Control Tower Organizational Unit Structure
Drawing