@@ -28,28 +28,32 @@ prescribed values. If you wish to retain those resources, do not create the poli
2828Guardrails to complete the removal process for these resources. It is safe to create these policy settings, even if
2929there is no corresponding ` Enforce: Enabled `
3030
31- 1 . ` AWS > Turbot > Permissions ` set to ` Enforce: None ` . This will remove Guardrails-managed
31+ 1 . ` AWS > IAM > User > Boundary ` set to ` Enforce: No Boundary ` . This will remove Guardrails-managed boundary policy (if any) from the IAM users.
32+ 2 . ` AWS > IAM > Role > Boundary ` set to ` Enforce: No Boundary ` . This will remove Guardrails-managed boundary policy (if any) from the IAM roles.
33+ 3 . ` AWS > Turbot > Permissions > Superuser Boundary ` set to ` No Boundary ` . This will disable the Guardrails-managed boundary for superusers.
34+ 4 . ` AWS > Turbot > Permissions > User Boundary ` set to ` No Boundary ` . This will disable the Guardrails-managed boundary for users.
35+ 5 . ` AWS > Turbot > Permissions ` set to ` Enforce: None ` . This will remove Guardrails-managed
3236 IAM policies, groups, roles and users.
33- 2 . ` AWS > Turbot > Audit Trail ` set to ` Enforce: Not configured ` . This will
37+ 6 . ` AWS > Turbot > Audit Trail ` set to ` Enforce: Not configured ` . This will
3438 remove the Guardrails-managed CloudTrail.
35- 3 . ` AWS > Turbot > Event Handlers ` set to ` Enforce: Not configured ` . This will
39+ 7 . ` AWS > Turbot > Event Handlers ` set to ` Enforce: Not configured ` . This will
3640 remove Guardrails-managed Cloudwatch Event Rules and SNS topics. Refer to the
3741 [ Event Handler documentation] ( integrations/aws/event-handlers ) for additional
3842 context.
39- 4 . ` AWS > Turbot > Event Handlers [Global] ` set to ` Enforce: Not configured ` . This will
43+ 8 . ` AWS > Turbot > Event Handlers [Global] ` set to ` Enforce: Not configured ` . This will
4044 remove Guardrails-managed Cloudwatch Event Rules and SNS topics.
41- 5 . ` AWS > Turbot > Service Roles ` set to ` Enforce: Not configured ` . This will
45+ 9 . ` AWS > Turbot > Service Roles ` set to ` Enforce: Not configured ` . This will
4246 remove any Guardrails-managed IAM service roles.
43- 6 . ` AWS > Turbot > Logging > Bucket ` set to ` Enforce: Not configured ` . This will
44- remove Guardrails-managed logging S3 buckets. Note: Logging buckets cannot be deleted
45- if they are not empty. Administrators can empty the bucket using the AWS
46- console.
47- 7 . ` AWS > Turbot > Event Poller ` to ` Disabled ` . When event handlers are set to
48- ` Skip ` or ` Enforce: Not Configured ` , Polling is automatically enabled. It
49- must be explicitly disabled. Note that full cleanup of event handler
50- resources requires event pollers to still be active. Disable Event Pollers
51- _ after_ verifying that all Event Handler infrastructure has been removed from
52- the account.
47+ 10 . ` AWS > Turbot > Logging > Bucket ` set to ` Enforce: Not configured ` . This will
48+ remove Guardrails-managed logging S3 buckets. Note: Logging buckets cannot be deleted
49+ if they are not empty. Administrators can empty the bucket using the AWS
50+ console.
51+ 11 . ` AWS > Turbot > Event Poller ` to ` Disabled ` . When event handlers are set to
52+ ` Skip ` or ` Enforce: Not Configured ` , Polling is automatically enabled. It
53+ must be explicitly disabled. Note that full cleanup of event handler
54+ resources requires event pollers to still be active. Disable Event Pollers
55+ _ after_ verifying that all Event Handler infrastructure has been removed from
56+ the account.
5357
5458Once the controls associated with the above policies have completed, the AWS
5559account can be disconnected from the Guardrails workspace.
@@ -111,4 +115,4 @@ When a user with sufficient permissions attempts to disconnect an AWS account, G
111115account, all child resources, controls, policy settings in a single SQL transactions. This is done for safety. Should
112116the transaction fail, it's trivial for the database to roll back to a known good state. The effect of this rollback is
113117that the account remains visible in Guardrails. AWS accounts with larger numbers of resources, the time required to
114- complete the transaction may exceed the statement timeout limit.
118+ complete the transaction may exceed the statement timeout limit.
0 commit comments