A Terraform module to configure AWS accounts with a secure baseline aligned to CIS AWS Foundations and AWS Foundational Security Best Practices.
terraform-aws-secure-baseline is a Terraform module that automatically configures AWS accounts with a secure baseline aligned to CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices. It sets up essential security services like CloudTrail, AWS Config, GuardDuty, and IAM policies to enforce compliance and monitoring across an AWS environment.
Cloud engineers, DevOps teams, and security professionals managing AWS infrastructure who need to enforce security compliance and best practices using infrastructure-as-code.
It provides a pre-built, opinionated module that reduces the complexity of manually configuring multiple AWS security services, ensures consistency across accounts, and helps meet regulatory and compliance requirements with minimal effort.
Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Implements a wide range of AWS security services including CloudTrail, Config, GuardDuty, and IAM policies aligned with CIS and AWS Foundational benchmarks, as listed in the features section.
Composed of independent submodules like alarm-baseline and cloudtrail-baseline, allowing selective deployment of components, detailed in the submodules section.
Supports AWS Organizations for centralized logging and security management, with examples for master and member accounts and input variables like account_type.
Provides repeatable, auditable security setups that reduce manual errors, emphasized in the philosophy and usage examples.
Requires defining AWS providers for each region individually, which is verbose and error-prone, as shown in the usage example with a long list of provider definitions.
Frequent upgrades mandate specific Terraform and AWS provider versions, requiring careful migration, noted in the compatibility section with upgrade guides for v1.0 and v0.20.
Enables services like CloudTrail Insights and SecurityHub by default without cost warnings, potentially increasing AWS bills significantly for unwary users.