使用方法
ベータPREREQUISITES Required: AWS Account with administrative access AWS CLI v2.x configured with credentials Terraform v1.0+ installed Email address for security alerts Basic understanding of AWS services Recommended: VS Code or similar IDE jq for JSON parsing (optional) 30 minutes for initial setup and testing SETUP INSTRUCTIONS Step 1: Initial Setup # Clone or create project directory mkdir aws-security-baseline && cd aws-security-baseline # Use Kiro CLI to generate infrastructure kiro-cli chat # Paste the primary prompt above Step 2: Configure Variables cd terraform cp terraform.tfvars.example terraform.tfvars # Edit terraform.tfvars with your values: # - aws_region (default: us-east-1) # - environment (default: production) # - alert_email (REQUIRED: your email) # - break_glass_external_id (REQUIRED: secure random string) Step 3: Deploy Infrastructure # Initialize Terraform terraform init # Review planned changes terraform plan # Deploy (takes 3-5 minutes) terraform apply -auto-approve Step 4: Confirm SNS Subscription # Check your email and confirm the SNS subscription # Subject: "AWS Notification - Subscription Confirmation" Step 5: Migrate to S3 Backend (Optional) # For team collaboration and state locking ./migrate-to-s3.sh CONFIGURATION PARAMETERS Required Variables: alert_email: Email for security notifications break_glass_external_id: Secret for emergency admin access (min 32 chars) Optional Variables: aws_region: AWS region (default: us-east-1) environment: Environment tag (default: production) project_name: Project identifier (default: SecurityBaseline) Outputs: dashboard_url: CloudWatch Dashboard URL guardduty_detector_id: GuardDuty detector ID security_hub_arn: Security Hub ARN sns_topic_arn: Security alerts SNS topic iam_roles: ARNs for 3 IAM roles cloudtrail_arn: CloudTrail trail ARN waf_web_acl_arn: WAF Web ACL ARN
これらのプロンプトを使用することにより、この 免責事項 に同意したものとみなされます。