The aws-vpc-core mod contains resource, control and policy definitions for AWS VPC service.

Resource Types

Resource types covered by this mod:

Permissions

Taking a look at permissions and associated grant levels for each permission for VPC:

PermissionGrant LevelHelp
acm:ListCertificatesMetadata
ec2:AcceptTransitGatewayMulticastDomainAssociationsAdmin
ec2:AcceptTransitGatewayPeeringAttachmentAdmin
ec2:AcceptTransitGatewayVpcAttachmentAdmin
ec2:AcceptVpcEndpointConnectionsWhitelist
ec2:AcceptVpcPeeringConnectionWhitelist
ec2:AdvertiseByoipCidrAdmin
ec2:AllocateAddressAdminAdmins can allocate new elastic IP addresses; this is considered safe as the proper routing still needs to be configured for public access.
ec2:AllocateIpamPoolCidrAdmin
ec2:ApplySecurityGroupsToClientVpnTargetNetworkAdmin
ec2:AssociateAddressAdminAdmins can associate elastic IP addresses; this is considered safe as the proper routing still needs to be configured for public access.
ec2:AssociateClientVpnTargetNetworkAdmin
ec2:AssociateDhcpOptionsWhitelist
ec2:AssociateRouteTableWhitelist
ec2:AssociateSubnetCidrBlockWhitelist
ec2:AssociateTransitGatewayMulticastDomainAdmin
ec2:AssociateTransitGatewayRouteTableAdmin
ec2:AssociateVpcCidrBlockWhitelist
ec2:AttachClassicLinkVpcAdmin
ec2:AttachInternetGatewayWhitelist
ec2:AttachVpnGatewayWhitelist
ec2:AuthorizeClientVpnIngressAdmin
ec2:AuthorizeSecurityGroupEgressWhitelist
ec2:AuthorizeSecurityGroupIngressWhitelist
ec2:AuthorizeSecurityGroupEgressWhitelist
ec2:AuthorizeSecurityGroupIngressWhitelist
ec2:CreateCarrierGatewayAdmin
ec2:CreateClientVpnEndpointAdmin
ec2:CreateClientVpnRouteAdmin
ec2:CreateCustomerGatewayWhitelist
ec2:CreateDefaultSubnetWhitelist
ec2:CreateDefaultVpcWhitelist
ec2:CreateDhcpOptionsWhitelist
ec2:CreateEgressOnlyInternetGatewayWhitelist
ec2:CreateFlowLogsWhitelist
ec2:CreateInternetGatewayWhitelist
ec2:CreateIpamAdmin
ec2:CreateIpamPoolAdmin
ec2:CreateIpamScopeAdmin
ec2:CreateLocalGatewayRouteAdmin
ec2:CreateLocalGatewayRouteTableVpcAssociationAdmin
ec2:CreateNatGatewayWhitelist
ec2:CreateNetworkAclWhitelist
ec2:CreateNetworkAclEntryWhitelist
ec2:CreateNetworkInsightsPathAdmin
ec2:CreateNetworkInsightsAccessScopeAdmin
ec2:CreatePublicIpv4PoolAdmin
ec2:CreateRouteWhitelist
ec2:CreateRouteWhitelist
ec2:CreateRouteTableWhitelist
ec2:CreateSecurityGroupWhitelist
ec2:CreateSubnetWhitelist
ec2:CreateSubnetCidrReservationAdmin
ec2:CreateTagsOperatorTags are low risk for management in Turbot since accounts are the isolation boundary; not tags.
ec2:CreateTrafficMirrorFilterAdmin
ec2:CreateTrafficMirrorFilterRuleAdmin
ec2:CreateTrafficMirrorSessionAdmin
ec2:CreateTrafficMirrorTargetAdmin
ec2:CreateTransitGatewayAdmin
ec2:CreateTransitGatewayConnectAdmin
ec2:CreateTransitGatewayConnectPeerAdmin
ec2:CreateTransitGatewayMulticastDomainAdmin
ec2:CreateTransitGatewayPeeringAttachmentAdmin
ec2:CreateTransitGatewayPrefixListReferenceAdmin
ec2:CreateTransitGatewayRouteAdmin
ec2:CreateTransitGatewayRouteTableAdmin
ec2:CreateTransitGatewayVpcAttachmentAdmin
ec2:CreateTransitGatewayVpcAttachmentAdmin
ec2:CreateVpcWhitelist
ec2:CreateVpcEndpointWhitelist
ec2:CreateVpcEndpointConnectionNotificationWhitelistUser is required to also have AWS/SNS/Operator role assigned for this action.
ec2:CreateVpcEndpointServiceConfigurationWhitelistAllows cross-account access.
ec2:CreateVpcPeeringConnectionWhitelist
ec2:CreateVpnConnectionWhitelist
ec2:CreateVpnConnectionRouteWhitelist
ec2:CreateVpnGatewayWhitelist
ec2:DeleteCarrierGatewayAdmin
ec2:DeleteClientVpnEndpointAdmin
ec2:DeleteClientVpnRouteAdmin
ec2:DeleteCustomerGatewayWhitelist
ec2:DeleteDhcpOptionsWhitelist
ec2:DeleteEgressOnlyInternetGatewayWhitelist
ec2:DeleteFlowLogsWhitelist
ec2:DeleteInternetGatewayWhitelist
ec2:DeleteIpamAdmin
ec2:DeleteIpamPoolAdmin
ec2:DeleteIpamScopeAdmin
ec2:DeleteLocalGatewayRouteAdmin
ec2:DeleteLocalGatewayRouteTableVpcAssociationAdmin
ec2:DeleteNatGatewayWhitelist
ec2:DeleteNetworkAclWhitelist
ec2:DeleteNetworkAclEntryWhitelist
ec2:DeleteNetworkInsightsAnalysisAdmin
ec2:DeleteNetworkInsightsAccessScopeAdmin
ec2:DeleteNetworkInsightsAccessScopeAnalysisAdmin
ec2:DeleteNetworkInsightsPathAdmin
ec2:DeletePublicIpv4PoolAdmin
ec2:DeleteRouteWhitelist
ec2:DeleteRouteWhitelist
ec2:DeleteRouteTableWhitelist
ec2:DeleteSecurityGroupWhitelist
ec2:DeleteSubnetWhitelist
ec2:DeleteSubnetCidrReservationAdmin
ec2:DeleteTagsOperatorTags are low risk for management in Turbot since accounts are the isolation boundary; not tags. Most deletions are denied to operator but tags are a low risk management activity even for deletion.
ec2:DeleteTrafficMirrorFilterAdmin
ec2:DeleteTrafficMirrorFilterRuleAdmin
ec2:DeleteTrafficMirrorSessionAdmin
ec2:DeleteTrafficMirrorTargetAdmin
ec2:DeleteTransitGatewayAdmin
ec2:DeleteTransitGatewayConnectAdmin
ec2:DeleteTransitGatewayConnectPeerAdmin
ec2:DeleteTransitGatewayMulticastDomainAdmin
ec2:DeleteTransitGatewayPeeringAttachmentAdmin
ec2:DeleteTransitGatewayPrefixListReferenceAdmin
ec2:DeleteTransitGatewayRouteAdmin
ec2:DeleteTransitGatewayRouteTableAdmin
ec2:DeleteTransitGatewayVpcAttachmentAdmin
ec2:DeleteTransitGatewayVpcAttachmentAdmin
ec2:DeleteVpcWhitelist
ec2:DeleteVpcEndpointConnectionNotificationsWhitelistUser is required to also have AWS/SNS/Operator role assigned for this action.
ec2:DeleteVpcEndpointServiceConfigurationsWhitelistAllows cross-account access.
ec2:DeleteVpcEndpointsWhitelist
ec2:DeleteVpcPeeringConnectionWhitelist
ec2:DeleteVpnConnectionWhitelist
ec2:DeleteVpnConnectionRouteWhitelist
ec2:DeleteVpnGatewayWhitelist
ec2:DeprovisionByoipCidrAdmin
ec2:DeprovisionIpamPoolCidrAdmin
ec2:DeprovisionPublicIpv4PoolCidrAdmin
ec2:DeregisterTransitGatewayMulticastGroupMembersAdmin
ec2:DeregisterTransitGatewayMulticastGroupSourcesAdmin
ec2:DescribeAddressesMetadata
ec2:DescribeAggregateIdFormatMetadata
ec2:DescribeByoipCidrsMetadata
ec2:DescribeClientVpnAuthorizationRulesMetadata
ec2:DescribeClientVpnConnectionsMetadata
ec2:DescribeClientVpnEndpointsMetadata
ec2:DescribeClientVpnRoutesMetadata
ec2:DescribeClientVpnTargetNetworksMetadata
ec2:DescribeCoipPoolsMetadata
ec2:DescribeCustomerGatewaysMetadata
ec2:DescribeDhcpOptionsMetadata
ec2:DescribeEgressOnlyInternetGatewaysMetadata
ec2:DescribeFlowLogsMetadata
ec2:DescribeInternetGatewaysMetadata
ec2:DescribeIpamPoolsMetadata
ec2:DescribeIpamScopesMetadata
ec2:DescribeIpamsMetadata
ec2:DescribeIpv6PoolsMetadata
ec2:DescribeLocalGatewayRouteTableVirtualInterfaceGroupAssociationsMetadata
ec2:DescribeLocalGatewayRouteTableVpcAssociationsMetadata
ec2:DescribeLocalGatewayRouteTablesMetadata
ec2:DescribeLocalGatewayVirtualInterfaceGroupsMetadata
ec2:DescribeLocalGatewayVirtualInterfacesMetadata
ec2:DescribeLocalGatewaysMetadata
ec2:DescribeManagedPrefixListsMetadata
ec2:DescribeMovingAddressesMetadata
ec2:DescribeNatGatewaysMetadata
ec2:DescribeNetworkAclsMetadata
ec2:DescribeNetworkInsightsAccessScopeAnalysesMetadata
ec2:DescribeNetworkInsightsAccessScopesMetadata
ec2:DescribeNetworkInsightsAnalysesMetadata
ec2:DescribeNetworkInsightsPathsMetadata
ec2:DescribeNetworkInterfacesMetadata
ec2:DescribePrefixListsMetadata
ec2:DescribePrincipalIdFormatMetadata
ec2:DescribePublicIpv4PoolsMetadata
ec2:DescribeRouteTablesMetadata
ec2:DescribeSecurityGroupReferencesMetadata
ec2:DescribeSecurityGroupRulesMetadata
ec2:DescribeSecurityGroupsMetadata
ec2:DescribeStaleSecurityGroupsMetadata
ec2:DescribeSubnetsMetadata
ec2:DescribeTagsMetadata
ec2:DescribeTrafficMirrorFiltersMetadata
ec2:DescribeTrafficMirrorSessionsMetadata
ec2:DescribeTrafficMirrorTargetsMetadata
ec2:DescribeTransitGatewayAttachmentsMetadata
ec2:DescribeTransitGatewayConnectPeersMetadata
ec2:DescribeTransitGatewayConnectsMetadata
ec2:DescribeTransitGatewayMulticastDomainsMetadata
ec2:DescribeTransitGatewayPeeringAttachmentsMetadata
ec2:DescribeTransitGatewayRouteTablesMetadata
ec2:DescribeTransitGatewayVpcAttachmentsMetadata
ec2:DescribeTransitGatewaysMetadata
ec2:DescribeTrunkInterfaceAssociationsMetadata
ec2:DescribeVpcAttributeMetadata
ec2:DescribeVpcClassicLinkMetadata
ec2:DescribeVpcClassicLinkDnsSupportMetadata
ec2:DescribeVpcEndpointConnectionNotificationsMetadata
ec2:DescribeVpcEndpointConnectionsMetadata
ec2:DescribeVpcEndpointServiceConfigurationsMetadata
ec2:DescribeVpcEndpointServicePermissionsMetadata
ec2:DescribeVpcEndpointServicesMetadata
ec2:DescribeVpcEndpointsMetadata
ec2:DescribeVpcPeeringConnectionMetadata
ec2:DescribeVpcPeeringConnectionsMetadata
ec2:DescribeVpcsMetadata
ec2:DescribeVpnConnectionsMetadata
ec2:DescribeVpnGatewaysMetadata
ec2:DetachInternetGatewayWhitelist
ec2:DetachVpnGatewayWhitelist
ec2:DisableIpamOrganizationAdminAccountAdmin
ec2:DisableTransitGatewayRouteTablePropagationAdmin
ec2:DisableVgwRoutePropagationWhitelist
ec2:DisableVpcClassicLinkNoneEC2 classic should not be used
ec2:DisableVpcClassicLinkDnsSupportNoneEC2 classic should not be used
ec2:DisassociateAddressAdminAdmins can disassociate elastic IP addresses.
ec2:DisassociateClientVpnTargetNetworkAdmin
ec2:DisassociateRouteTableWhitelist
ec2:DisassociateSubnetCidrBlockWhitelist
ec2:DisassociateTransitGatewayRouteTableAdmin
ec2:DisassociateVpcCidrBlockWhitelist
ec2:DisassociateTransitGatewayMulticastDomainAdmin
ec2:EnableIpamOrganizationAdminAccountAdmin
ec2:EnableTransitGatewayRouteTablePropagationAdmin
ec2:EnableVgwRoutePropagationWhitelist
ec2:EnableVpcClassicLinkNoneEC2 classic should not be used
ec2:EnableVpcClassicLinkDnsSupportNoneEC2 classic should not be used
ec2:ExportClientVpnClientCertificateRevocationListAdmin
ec2:ExportClientVpnClientConfigurationAdmin
ec2:ExportTransitGatewayRoutesAdmin
ec2:GetAssociatedIpv6PoolCidrsMetadata
ec2:GetCapacityReservationUsageMetadata
ec2:GetCoipPoolUsageMetadata
ec2:GetFlowLogsIntegrationTemplateMetadata
ec2:GetIpamAddressHistoryMetadata
ec2:GetIpamPoolAllocationsMetadata
ec2:GetIpamPoolCidrsMetadata
ec2:GetIpamResourceCidrsMetadata
ec2:GetManagedPrefixListAssociationsMetadata
ec2:GetManagedPrefixListEntriesMetadata
ec2:GetNetworkInsightsAccessScopeAnalysisFindingsMetadata
ec2:GetNetworkInsightsAccessScopeContentMetadata
ec2:GetSubnetCidrReservationsMetadata
ec2:GetTransitGatewayAttachmentPropagationsMetadata
ec2:GetTransitGatewayMulticastDomainAssociationsMetadata
ec2:GetTransitGatewayPrefixListReferencesMetadata
ec2:GetTransitGatewayRouteTableAssociationsMetadata
ec2:GetTransitGatewayRouteTablePropagationsMetadata
ec2:GetVpnConnectionDeviceSampleConfigurationMetadata
ec2:GetVpnConnectionDeviceTypesMetadata
ec2:ImportClientVpnClientCertificateRevocationListAdmin
ec2:ModifyAddressAttributeAdmin
ec2:ModifyCapacityReservationAdmin
ec2:ModifyClientVpnEndpointAdmin
ec2:ModifyIpamAdmin
ec2:ModifyIpamPoolAdmin
ec2:ModifyIpamResourceCidrAdmin
ec2:ModifyIpamScopeAdmin
ec2:ModifyManagedPrefixListAdmin
ec2:ModifySecurityGroupRulesWhitelist
ec2:ModifySubnetAttributeWhitelist
ec2:ModifyTrafficMirrorFilterNetworkServicesAdmin
ec2:ModifyTrafficMirrorFilterRuleAdmin
ec2:ModifyTrafficMirrorSessionAdmin
ec2:ModifyTransitGatewayAdmin
ec2:ModifyTransitGatewayPrefixListReferenceAdmin
ec2:ModifyTransitGatewayVpcAttachmentAdmin
ec2:ModifyVpcAttributeWhitelist
ec2:ModifyVpcEndpointWhitelist
ec2:ModifyVpcEndpointConnectionNotificationWhitelistUser is required to also have AWS/SNS/Operator role assigned for this action.
ec2:ModifyVpcEndpointServiceConfigurationWhitelistAllows cross-account access.
ec2:ModifyVpcEndpointServicePermissionsWhitelistAllows cross-account access.
ec2:ModifyVpcPeeringConnectionOptionsWhitelist
ec2:ModifyVpcTenancyWhitelist
ec2:ModifyVpnConnectionAdminAllows to create the transit gateway attachment via vpn connection.
ec2:ModifyVpnConnectionAdmin
ec2:ModifyVpnConnectionOptionsAdmin
ec2:ModifyVpnTunnelCertificateAdmin
ec2:ModifyVpnTunnelOptionsAdmin
ec2:MoveAddressToVpcNoneEC2 classic should not be used
ec2:MoveByoipCidrToIpamAdmin
ec2:ProvisionByoipCidrAdmin
ec2:ProvisionIpamPoolCidrAdmin
ec2:ProvisionPublicIpv4PoolCidrAdmin
ec2:RegisterTransitGatewayMulticastGroupMembersAdmin
ec2:RegisterTransitGatewayMulticastGroupSourcesAdmin
ec2:RejectTransitGatewayMulticastDomainAssociationsAdmin
ec2:RejectTransitGatewayPeeringAttachmentAdmin
ec2:RejectTransitGatewayVpcAttachmentAdmin
ec2:RejectVpcEndpointConnectionsWhitelist
ec2:RejectVpcPeeringConnectionWhitelist
ec2:ReleaseAddressAdminAdmins can release elastic IP addresses.
ec2:ReleaseIpamPoolAllocationAdmin
ec2:ReplaceNetworkAclAssociationWhitelist
ec2:ReplaceNetworkAclEntryWhitelist
ec2:ReplaceRouteWhitelist
ec2:ReplaceRouteTableAssociationWhitelist
ec2:ReplaceTransitGatewayRouteAdmin
ec2:ResetAddressAttributeAdmin
ec2:RestoreAddressToClassicNoneEC2 classic should not be used
ec2:RestoreManagedPrefixListVersionAdmin
ec2:RevokeClientVpnIngressAdmin
ec2:RevokeSecurityGroupEgressWhitelist
ec2:RevokeSecurityGroupIngressWhitelist
ec2:RevokeSecurityGroupEgressWhitelist
ec2:RevokeSecurityGroupIngressWhitelist
ec2:SearchLocalGatewayRoutesMetadata
ec2:SearchTransitGatewayMulticastGroupsMetadata
ec2:SearchTransitGatewayRoutesMetadata
ec2:StartNetworkInsightsAnalysisAdmin
ec2:StartNetworkInsightsAccessScopeAnalysisAdmin
ec2:StartVpcEndpointServicePrivateDnsVerificationAdmin
ec2:TerminateClientVpnConnectionsAdmin
ec2:UpdateSecurityGroupRuleDescriptionsEgressWhitelistAdmin can update the description field only.
ec2:UpdateSecurityGroupRuleDescriptionsIngressWhitelistAdmin can update the description field only.
ec2:WithdrawByoipCidrAdmin
elasticloadbalancing:DescribeLoadBalancersMetadata
logs:DescribeLogGroupsMetadata
logs:DescribeLogStreamsMetadata
ram:GetResourceShareAssociationsMetadata
tiros:CreateQueryAdmin
tiros:GetQueryAnswerMetadata
tiros:GetQueryExplanationMetadata

Learn More About Turbot

Version
5.16.0
Released On
Jun 06, 2023

Resource Types

Control Types

Policy Types

Release Notes

5.16.0 (2023-06-06)

What's new?

  • README.md file is now available for users to check details about the resource types and service permissions that the mod covers.
  • Resource's metadata will now also include createdBy details in Turbot CMDB.
  • We've added new Turbot AKAs for AWS > VPC resource types that match their individual unique identifiers. E.g. VpcId will now also be a Turbot AKA for AWS > VPC > VPC, SubnetId for AWS > VPC > Subnet etc.. Querying such resources in Turbot will now be easier than before.

5.15.0 (2022-11-01)

Control Types

Added

  • AWS > VPC > VPC > Stack

Policy Types

Added

  • AWS > VPC > VPC > Stack
  • AWS > VPC > VPC > Stack > Secret Variables
  • AWS > VPC > VPC > Stack > Source
  • AWS > VPC > VPC > Stack > Terraform Version
  • AWS > VPC > VPC > Stack > Variables

Action Types

Added

  • AWS > VPC > DHCP Options > Skip alarm for Approved control
  • AWS > VPC > DHCP Options > Skip alarm for Approved control [90 days]
  • AWS > VPC > Route Table > Skip alarm for Approved control
  • AWS > VPC > Route Table > Skip alarm for Approved control [90 days]
  • AWS > VPC > Subnet > Skip alarm for Approved control
  • AWS > VPC > Subnet > Skip alarm for Approved control [90 days]
  • AWS > VPC > VPC > Skip alarm for approved control
  • AWS > VPC > VPC > Skip alarm for approved control [90 days]

5.14.1 (2022-02-16)

Bug fixes

  • We've improved the process of deleting resources from Turbot if their CMDB policy was set to Enforce: Disabled. The CMDB controls will now not look to resolve credentials via Turbot's IAM role while deleting resources from Turbot. This will allow the CMDB controls to process resource deletions from Turbot more reliably than before.

5.14.0 (2022-02-09)

What's new?

  • Users can now create their own custom checks against resource attributes in the Approved control using the Approved > Custom policy. These custom checks would be a part of the evaluation of the Approved control. Custom messages can also be added which are then displayed in the control details table. See Custom Checks for more information.

Bug fixes

  • The AWS/VPC/Admin, AWS/VPC/Metadata and AWS/VPC/Operator grants would fail to show up on the Permissions tab while assigning access to users for an account when the AWS > VPC > Permissions policy was set to Enabled. This is now fixed.

Policy Types

Added

  • AWS > VPC > DHCP Options > Approved > Custom
  • AWS > VPC > Route Table > Approved > Custom
  • AWS > VPC > Subnet > Approved > Custom
  • AWS > VPC > VPC > Approved > Custom

5.13.0 (2022-01-10)

What's new?

  • AWS/VPC/Admin and AWS/VPC/Metadata now include permissions for Carrier Gateway, Ipam, Network Insights Access Scope, Subnet Cidr Reservation, TransitGateway Connect, TransitGateway Prefix List Reference and Public Ipv4 Pool Cidr.

5.12.1 (2021-10-01)

Bug fixes

  • The AWS > VPC > Route > Discovery control would go into an error state when there were no routes to upsert. This is now fixed.

5.12.0 (2021-07-20)

What's new?

  • AWS/VPC/Admin now includes traffic mirror filter permissions.

  • We've improved the details tables in the Tags controls to be more helpful, especially when a resource's tags are not set correctly as expected. Previously, to understand why the Tags controls were in an Alarm state, you would need to find and read the control's process logs. This felt like too much work for a simple task, so now these details are visible directly from the control page.

5.11.0 (2021-06-23)

What's new?

  • AWS/VPC/Admin now includes client VPN, network insights, traffic mirror filter, transit gateway, and VPC reachability analyzer permissions.

5.10.1 (2021-05-21)

Bug fixes

  • We’ve made a few improvements in the GraphQL queries for various controls, policies, and actions. You won’t notice any difference, but things should run lighter and quicker than before.

5.10.0 (2021-04-02)

Bug fixes

  • We've improved our event handling configuration and now filter which AWS events Turbot listens for based on resources' CMDB policies. If a resource's CMDB policy is not set to Enforce: Enabled, the EventBridge rules will be configured to not send any events for that resource. This will greatly reduce the number of unnecessary events that Turbot listens for and handles today.
  • Users can now configure the log record format in the AWS > VPC > VPC > Flow Logging control to specify the fields to include in the flow log record. To get started, set the AWS > VPC > VPC > Flow Logging > Log Record Format policy.

Policy Types

Added

  • AWS > Turbot > Event Handlers > Events > Rules > Custom Event Patterns > @turbot/aws-vpc-core
  • AWS > VPC > VPC > Flow Logging > Log Record Format

5.9.0 (2021-02-18)

What's new?

  • We've improved the state reasons and details tables in various Approved and Active controls to be more helpful, especially when a resource is unapproved or inactive. Previously, to understand why one of these controls is in Alarm state, you would need to find and read the control's process logs. This felt like too much work for a simple task, so now these details are visible directly from the control page.

Bug fixes

  • The AWS > VPC > Subnet > CMDB control will now automatically re-run every 24 hours to update the AvailableIpAddressCount property in a subnet because AWS does not currently support real-time events for IP count updates.

5.8.3 (2021-01-13)

Bug fixes

  • The AWS > VPC > VPC > Discovery control would sometimes fail to upsert all VPCs in a region due to lack of paging support. This is now fixed.

5.8.2 (2021-01-08)

Bug fixes

  • We've improved the real-time event handling for tag events that update multiple resources at a time and now all resources in a tag event will be updated in CMDB consistently.
  • Controls run faster now when in the tbd and skipped states thanks to the new Turbot Precheck feature (not to be confused with TSA PreCheck). With Turbot Precheck, controls avoid running GraphQL input queries when in tbd and skipped, resulting in faster and lighter control runs.

5.8.1 (2020-12-08)

Bug fixes

  • We've optimized the GraphQL queries for various controls when they're in the tbd and skipped states. You won't notice any difference but they should run a lot lighter now.

5.8.0 (2020-10-19)

What's new?

  • Policy Types

    Added

  • AWS > VPC > Trusted Accounts [Default]

  • AWS > VPC > Trusted Organizations [Default]

  • AWS > VPC > Trusted Services [Default]

5.7.2 (2020-10-08)

Bug fixes

  • The AWS > VPC > Default VPC > Approved control would sometimes go into an error state after deleting the default VPC in a region. This is now fixed.

5.7.1 (2020-09-29)

Bug fixes

  • We've made some improvements to our real-time event handling that reduces the risk of creating resources in CMDB with malformed AKAs. There's no noticeable difference, but things should run more reliably now.

5.7.0 (2020-09-07)

What's new?

  • Discovery controls now have their own control category, CMDB > Discovery, to allow for easier filtering separately from other CMDB controls.
  • We've renamed the service's default regions policy from Regions [Default] to Regions to be consistent with our other regions policies.

Bug fixes

  • Whenever a subnet was dissociated from a route table, AWS > VPC > Route Table > CMDB did not get updated automatically. This issue has now been fixed.

5.6.2 (2020-08-17)

Bug fixes

  • In various Active controls, we were outputting log messages that did not properly show how many days were left until we'd delete the inactive resources (we were still deleting them after the correct number of days). These log messages have been fixed and now contain the correct number of days.

5.6.1 (2020-08-07)

Bug fixes

  • In the AWS > VPC > Route > CMDB control, we now get route information directly from the AWS API instead of from the route table's CMDB entry. This prevents a race condition that resulted in routes created by the AWS > VPC > Stack control being immediately deleted if their route table information was outdated.

5.6.0 (2020-07-22)

What's new?

  • The AWS > VPC > Subnet > Auto Assign Public IP policy now includes the policy values Check: Enabled, Check: Disabled, Enforce: Enabled, and Enforce: Disabled. With the addition of these values, it is now possible to also disable a subnet's auto-assign public IP setting. We have also deprecated the policy values Check: Auto Assign Public IP and Enforce: Auto Assign Public IP (replaced by Check: Enabled and Enforce: Enabled respectively). These policy values will be removed in the next major version and any current policy settings using these values should be updated.

5.5.0 (2020-07-07)

What's new?

  • Updated AWS > VPC > Regions policy default value to now include af-south-1, cn-north-1, cn-northwest-1.

5.4.0 (2020-06-30)

Bug fixes

  • Sometimes when updating CMDB for resources with tags that have empty string values, e.g., [{Key: "Empty", Value: ""}, {Key: "Turbot is great", Value: "true"}], we would not store all of the tags correctly. This has been fixed and now all tags are accounted for.

Policy Types

Removed

  • AWS > VPC > Subnet > Auto Assign Public IP > Subnet Auto Assign Public IP Types

5.3.0 (2020-06-25)

What's new?

  • IAM permissions pertaining to local gateways can now be managed by setting AWS > VPC > Enabled policy to Enabled.

5.2.1 (2020-06-01)

Bug fixes

  • The AWS > VPC > Stack control would fail when trying to create Route resources due to incorrect Terraform metadata for Routes. This has been resolved and now the stack control works smoothly.

5.2.0 (2020-05-08)

Resource Types

Added

  • AWS > VPC > Route

Control Types

Added

  • AWS > VPC > Route > CMDB
  • AWS > VPC > Route > Configured
  • AWS > VPC > Route > Discovery

Policy Types

Added

  • AWS > VPC > Route > CMDB
  • AWS > VPC > Route > Configured
  • AWS > VPC > Route > Configured > Claim Precedence
  • AWS > VPC > Route > Configured > Source

5.1.0 (2020-05-06)

Control Types

Added

  • AWS > VPC > Stack

Policy Types

Added

  • AWS > VPC > Stack
  • AWS > VPC > Stack > Source
  • AWS > VPC > Stack > Variables

Renamed

  • AWS > VPC > DHCP Options > Configured > Precedence to AWS > VPC > DHCP Options > Configured > Claim Precedence
  • AWS > VPC > Route Table > Configured > Precedence to AWS > VPC > Route Table > Configured > Claim Precedence
  • AWS > VPC > Subnet > Configured > Precedence to AWS > VPC > Subnet > Configured > Claim Precedence
  • AWS > VPC > VPC > Configured > Precedence to AWS > VPC > VPC > Configured > Claim Precedence

5.0.2 (2020-04-24)

Bug fixes

  • The Default VPC > Approved control was not correctly identifying default VPCs in a region due to an invalid filter query. This has been fixed and the default VPCs are all accounted for.