공유 계정에서 생성된 리소스 - AWS Control Tower

기계 번역으로 제공되는 번역입니다. 제공된 번역과 원본 영어의 내용이 상충하는 경우에는 영어 버전이 우선합니다.

공유 계정에서 생성된 리소스

이 섹션에서는 랜딩 영역을 설정할 때 AWS Control Tower가 공유 계정에서 생성하는 리소스를 보여줍니다.

멤버 계정 리소스에 대한 자세한 내용은 Account Factory에 대한 리소스 고려 사항 섹션을 참조하세요.

관리 계정 리소스

랜딩 영역을 설정하면 관리 계정 내에 다음 AWS 리소스가 생성됩니다.

AWS 서비스 리소스 유형 리소스 이름
AWS Organizations 계정

audit

log archive

AWS Organizations OUs

Security

Sandbox

AWS Organizations 서비스 제어 정책

aws-guardrails-*

AWS CloudFormation 스택

AWSControlTowerBP-BASELINE-CLOUDTRAIL-MASTER

AWSControlTowerBP-BASELINE-CONFIG-MASTER (버전 2.6 이상)

AWS CloudFormation StackSets

AWSControlTowerBP-BASELINE-CLOUDTRAIL (3.0 이상에서는 배포되지 않음)

AWSControlTowerBP_BASELINE_SERVICE_LINKED_ROLE (Deployed in 3.2 and later)

AWSControlTowerBP-BASELINE-CLOUDWATCH

AWSControlTowerBP-BASELINE-CONFIG

AWSControlTowerBP-BASELINE-ROLES

AWSControlTowerBP-BASELINE-SERVICE-ROLES

AWSControlTowerBP-SECURITY-TOPICS

AWSControlTowerGuardrailAWS-GR-AUDIT-BUCKET-PUBLIC-READ-PROHIBITED

AWSControlTowerGuardrailAWS-GR-AUDIT-BUCKET-PUBLIC-WRITE-PROHIBITED

AWSControlTowerLoggingResources

AWSControlTowerSecurityResources

AWSControlTowerExecutionRole

AWS Service Catalog 제품 AWS Control Tower 계정 팩토리
AWS Config 집계자 aws-controltower-ConfigAggregatorForOrganizations
AWS CloudTrail 추적 aws-controltower-BaselineCloudTrail
Amazon CloudWatch CloudWatch 로그 aws-controltower/CloudTrailLogs
AWS Identity and Access Management 역할

AWSControlTowerAdmin

AWSControlTowerStackSetRole

AWSControlTowerCloudTrailRolePolicy

AWS Identity and Access Management 정책

AWSControlTowerServiceRolePolicy

AWSControlTowerAdminPolicy

AWSControlTowerCloudTrailRolePolicy

AWSControlTowerStackSetRolePolicy

AWS IAM Identity Center 디렉터리 그룹

AWSAccountFactory

AWSAuditAccountAdmins

AWSControlTowerAdmins

AWSLogArchiveAdmins

AWSLogArchiveViewers

AWSSecurityAuditors

AWSSecurityAuditPowerUsers

AWSServiceCatalogAdmins

AWS IAM Identity Center 권한 세트

AWSAdministratorAccess

AWSPowerUserAccess

AWSServiceCatalogAdminFullAccess

AWSServiceCatalogEndUserAccess

AWSReadOnlyAccess

AWSOrganizationsFullAccess

참고

는 AWS CloudFormation StackSet BP_BASELINE_CLOUDTRAIL 랜딩 영역 버전 3.0 이상에 배포되지 않습니다. 그러나 랜딩 존을 업데이트할 때까지 이전 버전의 랜딩 존에는 계속 존재합니다.

로그 아카이브 계정 리소스

랜딩 영역을 설정하면 로그 아카이브 계정 내에 다음 AWS 리소스가 생성됩니다.

AWS 서비스 리소스 유형 Resource Name
AWS CloudFormation 스택

StackSet-AWSControlTowerGuardrailAWS-GR-AUDIT-BUCKET-PUBLIC-READ-PROHIBITED-

StackSet-AWSControlTowerGuardrailAWS-GR-AUDIT-BUCKET-PUBLIC-WRITE-PROHIBITED

StackSet-AWSControlTowerBP-BASELINE-CLOUDWATCH-

StackSet-AWSControlTowerBP-BASELINE-CONFIG-

StackSet-AWSControlTowerBP-BASELINE-CLOUDTRAIL-

StackSet-AWSControlTowerBP-BASELINE-SERVICE-ROLES-

StackSet-AWSControlTowerBP-BASELINE-SERVICE-LINKED-ROLE-(In 3.2 and later)

StackSet-AWSControlTowerBP-BASELINE-ROLES-

StackSet-AWSControlTowerLoggingResources-

AWS Config AWS Config 규칙

AWSControlTower_AWS-GR_AUDIT_BUCKET_PUBLIC_READ_PROHIBITED

AWSControlTower_AWS-GR_AUDIT_BUCKET_PUBLIC_WRITE_PROHIBIT

AWS CloudTrail 추적 aws-controltower-BaselineCloudTrail
Amazon CloudWatch CloudWatch 이벤트 규칙 aws-controltower-ConfigComplianceChangeEventRule
Amazon CloudWatch CloudWatch 로그

/aws/lambda/aws-controltower-NotificationForwarder

AWS Identity and Access Management 역할

aws-controltower-AdministratorExecutionRole

aws-controltower-CloudWatchLogsRole

aws-controltower-ConfigRecorderRole

aws-controltower-ForwardSnsNotificationRole

aws-controltower-ReadOnlyExecutionRole

AWSControlTowerExecution

AWS Identity and Access Management 정책 AWSControlTowerServiceRolePolicy
Amazon Simple Notification Service 주제 aws-controltower-SecurityNotifications
AWS Lambda 애플리케이션 StackSet-AWSControlTowerBP-BASELINE-CLOUDWATCH-*
AWS Lambda 함수 aws-controltower-NotificationForwarder
Amazon Simple Storage Service(S3) 버킷

aws-controltower-logs-*

aws-controltower-s3-access-logs-*

계정 리소스 감사

랜딩 영역을 설정하면 감사 계정 내에 다음 AWS 리소스가 생성됩니다.

AWS 서비스 리소스 유형 리소스 이름
AWS CloudFormation 스택

StackSet-AWSControlTowerGuardrailAWS-GR-AUDIT-BUCKET-PUBLIC-READ-PROHIBITED-

StackSet-AWSControlTowerGuardrailAWS-GR-AUDIT-BUCKET-PUBLIC-WRITE-PROHIBITED-

StackSet-AWSControlTowerBP-BASELINE-CLOUDWATCH-

StackSet-AWSControlTowerBP-BASELINE-CONFIG-

StackSet-AWSControlTowerBP-BASELINE-CLOUDTRAIL-

StackSet-AWSControlTowerBP-BASELINE-SERVICE-ROLES-

StackSet-AWSControlTowerBP-BASELINE-SERVICE-LINKED-ROLE-(In 3.2 and later)

StackSet-AWSControlTowerBP-SECURITY-TOPICS-

StackSet-AWSControlTowerBP-BASELINE-ROLES-

StackSet-AWSControlTowerSecurityResources-*

AWS Config 집계자 aws-controltower-GuardrailsComplianceAggregator
AWS Config AWS Config 규칙

AWSControlTower_AWS-GR_AUDIT_BUCKET_PUBLIC_READ_PROHIBITED

AWSControlTower_AWS-GR_AUDIT_BUCKET_PUBLIC_WRITE_PROHIBITED

AWS CloudTrail 추적 aws-controltower-BaselineCloudTrail
Amazon CloudWatch CloudWatch 이벤트 규칙 aws-controltower-ConfigComplianceChangeEventRule
Amazon CloudWatch CloudWatch 로그

/aws/lambda/aws-controltower-NotificationForwarder

AWS Identity and Access Management 역할

aws-controltower-AdministratorExecutionRole

aws-controltower-CloudWatchLogsRole

aws-controltower-ConfigRecorderRole

aws-controltower-ForwardSnsNotificationRole

aws-controltower-ReadOnlyExecutionRole

aws-controltower-AuditAdministratorRole

aws-controltower-AuditReadOnlyRole

AWSControlTowerExecution

AWS Identity and Access Management 정책 AWSControlTowerServiceRolePolicy
Amazon Simple Notification Service 주제

aws-controltower-AggregateSecurityNotifications

aws-controltower-AllConfigNotifications

aws-controltower-SecurityNotifications

AWS Lambda 함수 aws-controltower-NotificationForwarder