Skip to content

Commit f621998

Browse files
authored
Update > Disconnect an AWS account from a Guardrails workspace guide to include Enforce: No Boundary in case permission boundary is used. Closes #354 (#372)
1 parent d2373d0 commit f621998

File tree

1 file changed

+20
-16
lines changed

1 file changed

+20
-16
lines changed

docs/guides/aws/decommission/index.md

Lines changed: 20 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -28,28 +28,32 @@ prescribed values. If you wish to retain those resources, do not create the poli
2828
Guardrails to complete the removal process for these resources. It is safe to create these policy settings, even if
2929
there is no corresponding `Enforce: Enabled`
3030

31-
1. `AWS > Turbot > Permissions` set to `Enforce: None`. This will remove Guardrails-managed
31+
1. `AWS > IAM > User > Boundary` set to `Enforce: No Boundary`. This will remove Guardrails-managed boundary policy (if any) from the IAM users.
32+
2. `AWS > IAM > Role > Boundary` set to `Enforce: No Boundary`. This will remove Guardrails-managed boundary policy (if any) from the IAM roles.
33+
3. `AWS > Turbot > Permissions > Superuser Boundary` set to `No Boundary`. This will disable the Guardrails-managed boundary for superusers.
34+
4. `AWS > Turbot > Permissions > User Boundary` set to `No Boundary`. This will disable the Guardrails-managed boundary for users.
35+
5. `AWS > Turbot > Permissions` set to `Enforce: None`. This will remove Guardrails-managed
3236
IAM policies, groups, roles and users.
33-
2. `AWS > Turbot > Audit Trail` set to `Enforce: Not configured`. This will
37+
6. `AWS > Turbot > Audit Trail` set to `Enforce: Not configured`. This will
3438
remove the Guardrails-managed CloudTrail.
35-
3. `AWS > Turbot > Event Handlers` set to `Enforce: Not configured`. This will
39+
7. `AWS > Turbot > Event Handlers` set to `Enforce: Not configured`. This will
3640
remove Guardrails-managed Cloudwatch Event Rules and SNS topics. Refer to the
3741
[Event Handler documentation](integrations/aws/event-handlers) for additional
3842
context.
39-
4. `AWS > Turbot > Event Handlers [Global]` set to `Enforce: Not configured`. This will
43+
8. `AWS > Turbot > Event Handlers [Global]` set to `Enforce: Not configured`. This will
4044
remove Guardrails-managed Cloudwatch Event Rules and SNS topics.
41-
5. `AWS > Turbot > Service Roles` set to `Enforce: Not configured`. This will
45+
9. `AWS > Turbot > Service Roles` set to `Enforce: Not configured`. This will
4246
remove any Guardrails-managed IAM service roles.
43-
6. `AWS > Turbot > Logging > Bucket` set to `Enforce: Not configured`. This will
44-
remove Guardrails-managed logging S3 buckets. Note: Logging buckets cannot be deleted
45-
if they are not empty. Administrators can empty the bucket using the AWS
46-
console.
47-
7. `AWS > Turbot > Event Poller` to `Disabled`. When event handlers are set to
48-
`Skip` or `Enforce: Not Configured`, Polling is automatically enabled. It
49-
must be explicitly disabled. Note that full cleanup of event handler
50-
resources requires event pollers to still be active. Disable Event Pollers
51-
_after_ verifying that all Event Handler infrastructure has been removed from
52-
the account.
47+
10. `AWS > Turbot > Logging > Bucket` set to `Enforce: Not configured`. This will
48+
remove Guardrails-managed logging S3 buckets. Note: Logging buckets cannot be deleted
49+
if they are not empty. Administrators can empty the bucket using the AWS
50+
console.
51+
11. `AWS > Turbot > Event Poller` to `Disabled`. When event handlers are set to
52+
`Skip` or `Enforce: Not Configured`, Polling is automatically enabled. It
53+
must be explicitly disabled. Note that full cleanup of event handler
54+
resources requires event pollers to still be active. Disable Event Pollers
55+
_after_ verifying that all Event Handler infrastructure has been removed from
56+
the account.
5357

5458
Once the controls associated with the above policies have completed, the AWS
5559
account can be disconnected from the Guardrails workspace.
@@ -111,4 +115,4 @@ When a user with sufficient permissions attempts to disconnect an AWS account, G
111115
account, all child resources, controls, policy settings in a single SQL transactions. This is done for safety. Should
112116
the transaction fail, it's trivial for the database to roll back to a known good state. The effect of this rollback is
113117
that the account remains visible in Guardrails. AWS accounts with larger numbers of resources, the time required to
114-
complete the transaction may exceed the statement timeout limit.
118+
complete the transaction may exceed the statement timeout limit.

0 commit comments

Comments
 (0)