Skip to content

Put Organization Config Rule

configservice_put_organization_config_rule R Documentation

Adds or updates an Config rule for your entire organization to evaluate if your Amazon Web Services resources comply with your desired configurations

Description

Adds or updates an Config rule for your entire organization to evaluate if your Amazon Web Services resources comply with your desired configurations. For information on how many organization Config rules you can have per account, see Service Limits in the Config Developer Guide.

Only a management account and a delegated administrator can create or update an organization Config rule. When calling this API with a delegated administrator, you must ensure Organizations ListDelegatedAdministrator permissions are added. An organization can have up to 3 delegated administrators.

This API enables organization service access through the EnableAWSServiceAccess action and creates a service-linked role AWSServiceRoleForConfigMultiAccountSetup in the management or delegated administrator account of your organization. The service-linked role is created only when the role does not exist in the caller account. Config verifies the existence of role with GetRole action.

To use this API with delegated administrator, register a delegated administrator by calling Amazon Web Services Organization register-delegated-administrator for config-multiaccountsetup.amazonaws.com.

There are two types of rules: Config Managed Rules and Config Custom Rules. You can use put_organization_config_rule to create both Config Managed Rules and Config Custom Rules.

Config Managed Rules are predefined, customizable rules created by Config. For a list of managed rules, see List of Config Managed Rules. If you are adding an Config managed rule, you must specify the rule's identifier for the RuleIdentifier key.

Config Custom Rules are rules that you create from scratch. There are two ways to create Config custom rules: with Lambda functions ( Lambda Developer Guide) and with Guard (Guard GitHub Repository), a policy-as-code language. Config custom rules created with Lambda are called Config Custom Lambda Rules and Config custom rules created with Guard are called Config Custom Policy Rules.

If you are adding a new Config Custom Lambda rule, you first need to create an Lambda function in the management account or a delegated administrator that the rule invokes to evaluate your resources. You also need to create an IAM role in the managed account that can be assumed by the Lambda function. When you use put_organization_config_rule to add a Custom Lambda rule to Config, you must specify the Amazon Resource Name (ARN) that Lambda assigns to the function.

Prerequisite: Ensure you call EnableAllFeatures API to enable all features in an organization.

Make sure to specify one of either OrganizationCustomPolicyRuleMetadata for Custom Policy rules, OrganizationCustomRuleMetadata for Custom Lambda rules, or OrganizationManagedRuleMetadata for managed rules.

Usage

configservice_put_organization_config_rule(OrganizationConfigRuleName,
  OrganizationManagedRuleMetadata, OrganizationCustomRuleMetadata,
  ExcludedAccounts, OrganizationCustomPolicyRuleMetadata)

Arguments

OrganizationConfigRuleName

[required] The name that you assign to an organization Config rule.

OrganizationManagedRuleMetadata

An OrganizationManagedRuleMetadata object. This object specifies organization managed rule metadata such as resource type and ID of Amazon Web Services resource along with the rule identifier. It also provides the frequency with which you want Config to run evaluations for the rule if the trigger type is periodic.

OrganizationCustomRuleMetadata

An OrganizationCustomRuleMetadata object. This object specifies organization custom rule metadata such as resource type, resource ID of Amazon Web Services resource, Lambda function ARN, and organization trigger types that trigger Config to evaluate your Amazon Web Services resources against a rule. It also provides the frequency with which you want Config to run evaluations for the rule if the trigger type is periodic.

ExcludedAccounts

A comma-separated list of accounts that you want to exclude from an organization Config rule.

OrganizationCustomPolicyRuleMetadata

An OrganizationCustomPolicyRuleMetadata object. This object specifies metadata for your organization's Config Custom Policy rule. The metadata includes the runtime system in use, which accounts have debug logging enabled, and other custom rule metadata, such as resource type, resource ID of Amazon Web Services resource, and organization trigger types that initiate Config to evaluate Amazon Web Services resources against a rule.

Value

A list with the following syntax:

list(
  OrganizationConfigRuleArn = "string"
)

Request syntax

svc$put_organization_config_rule(
  OrganizationConfigRuleName = "string",
  OrganizationManagedRuleMetadata = list(
    Description = "string",
    RuleIdentifier = "string",
    InputParameters = "string",
    MaximumExecutionFrequency = "One_Hour"|"Three_Hours"|"Six_Hours"|"Twelve_Hours"|"TwentyFour_Hours",
    ResourceTypesScope = list(
      "string"
    ),
    ResourceIdScope = "string",
    TagKeyScope = "string",
    TagValueScope = "string"
  ),
  OrganizationCustomRuleMetadata = list(
    Description = "string",
    LambdaFunctionArn = "string",
    OrganizationConfigRuleTriggerTypes = list(
      "ConfigurationItemChangeNotification"|"OversizedConfigurationItemChangeNotification"|"ScheduledNotification"
    ),
    InputParameters = "string",
    MaximumExecutionFrequency = "One_Hour"|"Three_Hours"|"Six_Hours"|"Twelve_Hours"|"TwentyFour_Hours",
    ResourceTypesScope = list(
      "string"
    ),
    ResourceIdScope = "string",
    TagKeyScope = "string",
    TagValueScope = "string"
  ),
  ExcludedAccounts = list(
    "string"
  ),
  OrganizationCustomPolicyRuleMetadata = list(
    Description = "string",
    OrganizationConfigRuleTriggerTypes = list(
      "ConfigurationItemChangeNotification"|"OversizedConfigurationItemChangeNotification"
    ),
    InputParameters = "string",
    MaximumExecutionFrequency = "One_Hour"|"Three_Hours"|"Six_Hours"|"Twelve_Hours"|"TwentyFour_Hours",
    ResourceTypesScope = list(
      "string"
    ),
    ResourceIdScope = "string",
    TagKeyScope = "string",
    TagValueScope = "string",
    PolicyRuntime = "string",
    PolicyText = "string",
    DebugLogDeliveryAccounts = list(
      "string"
    )
  )
)