https://github.com/tanishkamarrott/secure-cloud-architecture-with-scps-and-opcs
Repository containing best practices for securing cloud architectures using SCPs and OPCs, with sample policies and implementation scripts to enforce a holistic security posture
https://github.com/tanishkamarrott/secure-cloud-architecture-with-scps-and-opcs
aws cloud-architecture cloud-infrastructure cloud-security gcp iam security-architecture
Last synced: 4 months ago
JSON representation
Repository containing best practices for securing cloud architectures using SCPs and OPCs, with sample policies and implementation scripts to enforce a holistic security posture
- Host: GitHub
- URL: https://github.com/tanishkamarrott/secure-cloud-architecture-with-scps-and-opcs
- Owner: TanishkaMarrott
- License: mit
- Created: 2024-08-11T19:18:59.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-08-12T05:54:54.000Z (about 1 year ago)
- Last Synced: 2025-03-22T14:24:12.246Z (7 months ago)
- Topics: aws, cloud-architecture, cloud-infrastructure, cloud-security, gcp, iam, security-architecture
- Homepage:
- Size: 15.6 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Enforcing Security Best Practices with AWS SCPs and GCP OPCs
## Overview
This repository is dedicated to showcasing effective strategies for implementing Organizational Policies (OPCs) and Service Control Policies (SCPs) in cloud environments to achieve a holistic security posture.
This includes detailed code snippets, configuration files, and real-world use cases to help you secure your cloud infrastructure.
## Repository Structure
- **/policies**: Contains sample Organizational Policies and Service Control Policies.
## Key Features
- **Top 5 Organizational Policies (OPCs)**:
- Restrict VMs from having external IPs (`compute.vmExternalIpAccess`)
- Enforce HTTPS communication for GCS (`storage.requireTls`)
- Disable OS Login for SSH access (`compute.disableOsLogin`)
- Require Uniform Bucket-Level Access on GCS (`storage.uniformBucketLevelAccess`)
- Restrict Public IPs for SQL Instances (`sql.restrictPublicIp`)- **Top 5 Service Control Policies (SCPs)**:
- Deny Disablement of Security Monitoring (`ec2:DisableVpcClassicLink`)
- Prevent Deletion of Logging Buckets (`s3:DeleteBucket`)
- Deny IAM Policies with Wildcards (`iam:PassRole`)
- Require MFA for IAM Actions (`iam:ChangePassword`)
- Enforce KMS Key Usage for Encryption (`kms:Decrypt`)## Value-Add
Implementing these policies enhances your cloud environment's security by reducing exposure to potential threats, ensuring compliance with industry standards, and automating security enforcement across your organization.
## Getting Started
1. **Clone the repository:**
```bash
git clone https://github.com/TanishkaMarrott/Secure-Cloud-Architecture-with-SCPs-and-OPCs.git
```2. **Navigate to the repository:**
```bash
cd Secure-Cloud-Architecture-with-SCPs-and-OPCs
```3. **Review the policies:**
- Browse the `/policies` directory to see the Organizational Policies and Service Control Policies.4. **Apply the policies:**
- Use the scripts in `/scripts` to apply the policies in your cloud environment.## Contribution
We welcome contributions from the community! If you have additional policies, use cases, or enhancements, please feel free to submit a pull request.
## License
This repository is licensed under the MIT License. See `LICENSE` for more information.