You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -707,7 +707,7 @@ The `terraform-docs` utility is used to generate this README. Follow the below s
707
707
| <aname="input_region"></a> [region](#input\_region)| The region to deploy the resources |`string`| n/a | yes |
708
708
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to the resources |`map(string)`| n/a | yes |
709
709
| <aname="input_access_analyzer"></a> [access\_analyzer](#input\_access\_analyzer)| Configuration for the AWS Access Analyzer service | <pre>object({<br/> enable_unused_analyzer = optional(bool, true)<br/> # Indicates whether to enable the unused AWS Access Analyzer service<br/> unused_analyzer_name = optional(string, "lza-unused-access-analyzer")<br/> # The name of the unused AWS Access Analyzer service<br/> unused_access_age = optional(number, 90)<br/> })</pre> |`null`| no |
710
-
| <a name="input_config"></a> [config](#input\_config) | Configuration for the securityhub organization managed rules | <pre>object({<br/> stackset_name_prefix = optional(string, "lza-config-")<br/> # The prefix added to the stacksets<br/> rule_groups = optional(map(object({<br/> associations = list(string)<br/> # List of organizational units to deploy the managed rules<br/> description = string<br/> # Description for the rule group<br/> enabled_regions = optional(list(string), null)<br/> # List of regions to enable these rules<br/> exclude_accounts = optional(list(string), null)<br/> # The list of accounts to exclude from the organization managed rule<br/> rules = map(object({<br/> description = string<br/> # The description of the organization managed rules<br/> identifier = string<br/> # The identifier of the organization managed rule<br/> inputs = optional(map(string), {})<br/> # The identifier of the organization managed rule scope<br/> resource_types = list(string)<br/> # The list of resource types to scope the organization managed rule<br/> max_execution_frequency = optional(string, null)<br/> # The max_execution_frequency of the rule<br/> }))<br/> })), {})<br/> # The configuration for the securityhub organization managed rules<br/> })</pre> | <pre>{<br/> "rule_groups": {}<br/>}</pre> | no |
710
+
| <a name="input_config"></a> [config](#input\_config) | Configuration for the securityhub organization managed rules | <pre>object({<br/> stackset_name_prefix = optional(string, "lza-config-")<br/><br/> # The prefix added to the stacksets<br/> rule_groups = optional(map(object({<br/> associations = list(string)<br/> # List of organizational units to deploy the managed rules<br/> description = string<br/> # Description for the rule group<br/> enabled_regions = optional(list(string), null)<br/> # List of regions to enable these rules<br/> exclude_accounts = optional(list(string), null)<br/> # The list of accounts to exclude from the organization managed rule<br/> rules = map(object({<br/> description = string<br/> # The description of the organization managed rules<br/> identifier = string<br/> # The identifier of the organization managed rule<br/> inputs = optional(map(string), {})<br/> # The identifier of the organization managed rule scope<br/> resource_types = list(string)<br/> # The list of resource types to scope the organization managed rule<br/> max_execution_frequency = optional(string, null)<br/> # The max_execution_frequency of the rule<br/> }))<br/> })), {})<br/> # The configuration for the securityhub organization managed rules<br/> })</pre> | <pre>{<br/> "rule_groups": {}<br/>}</pre> | no |
711
711
| <aname="input_inspector"></a> [inspector](#input\_inspector)| Organizational configuration for the AWS Inspector service | <pre>object({<br/> account_id = optional(string, null)<br/> # The delegated administrator account ID for the AWS Inspector service<br/> enable = optional(bool, false)<br/> # Indicates whether to enable the AWS Inspector service<br/> enable_ec2_scan = optional(bool, false)<br/> # Indicates whether to enable the AWS Inspector service for EC2 instances<br/> enable_ecr_scan = optional(bool, false)<br/> # Indicates whether to enable the AWS Inspector service for ECR repositories<br/> enable_lambda_scan = optional(bool, false)<br/> # Indicates whether to enable the AWS Inspector service for Lambda functions<br/> enable_lambda_code_scan = optional(bool, false)<br/> # Indicates whether to enable the AWS Inspector service for Lambda code<br/> })</pre> | <pre>{<br/> "enable": false<br/>}</pre> | no |
712
712
| <aname="input_macie"></a> [macie](#input\_macie)| Configuration for the AWS Macie service | <pre>object({<br/> enable = optional(bool, false)<br/> # Indicates whether to enable the AWS Macie service should be enabled in all accounts<br/> excluded_accounts = optional(list(string), null)<br/> # The list of accounts to exclude from the AWS Macie service<br/> frequency = optional(string, "FIFTEEN_MINUTES")<br/> # The frequency at which the AWS Macie service should be enabled<br/> organizational_units = optional(list(string), null)<br/> # The list of member accounts to associate with the AWS Macie service<br/> stackset_name = optional(string, "lza-macie-configuration")<br/> })</pre> |`null`| no |
@@ -721,3 +721,4 @@ The `terraform-docs` utility is used to generate this README. Follow the below s
721
721
| <aname="output_securityhub_policy_associations"></a> [securityhub\_policy\_associations](#output\_securityhub\_policy\_associations)| A map of policy associations by policy name |
722
722
| <aname="output_securityhub_policy_configurations"></a> [securityhub\_policy\_configurations](#output\_securityhub\_policy\_configurations)| A map of all the policies to the central configuration arns |
|[aws_iam_policy_document.mgmt_config_recorder_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
28
+
|[aws_organizations_organization.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/organizations_organization)| data source |
29
+
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
30
+
31
+
## Inputs
32
+
33
+
| Name | Description | Type | Default | Required |
| <aname="input_config_retention_in_days"></a> [config\_retention\_in\_days](#input\_config\_retention\_in\_days)| The number of days to store config historical data (defaults to one year) |`number`|`366`| no |
36
+
| <aname="input_control_tower_sns_topic_arn"></a> [control\_tower\_sns\_topic\_arn](#input\_control\_tower\_sns\_topic\_arn)| The ARN of the SNS topic created by Control Tower for AWS notifications |`string`| n/a | yes |
37
+
| <aname="input_logarchive_account_id"></a> [logarchive\_account\_id](#input\_logarchive\_account\_id)| The AWS account id for the logarchive account created by Control Tower |`string`| n/a | yes |
38
+
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to the resources |`map(string)`|`{}`| no |
39
+
40
+
## Outputs
41
+
42
+
| Name | Description |
43
+
|------|-------------|
44
+
| <aname="output_aws_config_delivery_channel_id"></a> [aws\_config\_delivery\_channel\_id](#output\_aws\_config\_delivery\_channel\_id)| The ID of Config delivery channel |
45
+
| <aname="output_aws_config_recorder_id"></a> [aws\_config\_recorder\_id](#output\_aws\_config\_recorder\_id)| The ID of Config recorder |
0 commit comments