Setting Up and Enabling a Landing Zone
Background
With RGC:
- You will have the necessary permissions to govern all of the organizational units (OUs) and member accounts in your organization.
- You need to set up a landing zone in RGC and determine which OUs and member accounts to govern in the landing zone. RGC does not extend governance to other existing OUs or member accounts in your organization.
- When existing OUs are governed by RGC, they are called registered OUs.
- After your landing zone is set up, you can still register existing OUs in RGC.
Prerequisites
The current account has enabled Enterprise Center. For details, see Enabling Enterprise Center.
Setting Up a Landing Zone
- Log in to Huawei Cloud using an enterprise master account.
- Click
and choose Management & Governance > Resource Governance Center.
- Click Enable.
Figure 2 Enabling RGC
- Select the home region for RGC. The region will be the default region for your landing zone.
Figure 3 Selecting the home region
- Click Next.
- Under OU Settings, configure the core OU. You have two options for Core OU:
- Create: A core OU will be preset in RGC to build a complete OU structure in the landing zone. This OU contains two core accounts: a log archive account and a security audit account (also called an "audit account").
The OU name must be unique. The default name of the core OU is Security. Once your landing zone is set up, the name of the core OU cannot be changed.
- Skip: No core OU will be created in RGC.
Figure 4 Configuring the core OU - Create: A core OU will be preset in RGC to build a complete OU structure in the landing zone. This OU contains two core accounts: a log archive account and a security audit account (also called an "audit account").
- Determine whether to create additional OUs.
To help set up a multi-account system, you are advised to create additional OUs when setting up a landing zone. Each OU functions as a container or grouping unit for service accounts. After your landing zone is set up, you can create more OUs. You have two options for Additional OU:
- Create: You will need to create an additional OU when you are setting up a landing zone. The OU name must be unique. The default name of the additional OU is Sandbox.
- Skip: There will be no other OUs except the preset core OU in your landing zone. You can create more OUs after your landing zone is set up.
Figure 5 Creating an additional OU - Click Next.
- On the Configure Core Accounts page, configure the management account. You have two options for IAM Identity Center:
- Enable: You will need to enter the email address associated with the IAM Identity Center account. The email address of the management account must not be used for other IAM Identity Center users. It is used for creating the RGC administrator in IAM Identity Center. The administrator has the Admin permission.
- Skip: RGC will not create a user as the RGC administrator, any user groups, or permission sets in IAM Identity Center.
Figure 6 Configuring the management account
- Configure a log archive account. It is used to store logs of API activities and resource configurations from all accounts.
- Set Account Type to Create new account.
- Email Address: Enter the email address of the log archive account. This email address cannot be currently used for any Huawei Cloud accounts. It can have a maximum of 64 characters.
- Account Name: Specify a unique name for the log archive account. The name cannot be changed once your landing zone is set up. The account name can only contain digits, letters, underscores (_), and hyphens (-), and it cannot start with a digit. It can have 6 to 32 characters.
- Set Account Type to Use existing account.
The existing account you chose must belong to the organization of the management account, and an agency must have been set for the account. For details, see Setting an Agency. If there are Config resources in the account, you must delete or modify them before enrolling the account in RGC when you are setting up a landing zone.
- Email Address: Enter the email address of the log archive account. This email address cannot be currently used for any Huawei Cloud accounts. It can have a maximum of 64 characters.
- Account Name: Enter the name of the account you have registered with Huawei Cloud.
- Account ID: Enter the ID of the account you have registered with Huawei Cloud. The account ID cannot be the ID of the management account or of a member account in another organization.
Figure 7 Configuring a log archive account - Set Account Type to Create new account.
- Configure an audit account. The audit account has permission to access all member accounts in your organization. You are encouraged to strictly control the identity that uses this account.
- Set Account Type to Create new account.
- Alert Email: Enter an email address for the audit account. It is used to receive alerts preset by RGC. This email address cannot be currently used for any Huawei Cloud accounts. It can have a maximum of 64 characters.
- Account Name: Specify a unique name for the audit account. The name cannot be changed once your landing zone is set up. The account name can only contain digits, letters, underscores (_), and hyphens (-), and it cannot start with a digit. It can have 6 to 32 characters.
- Set Account Type to Use existing account.
The existing account you chose must belong to the organization of the management account, and an agency must have been set for the account. For details, see Setting an Agency. If there are Config resources in the account, you must delete or modify them before enrolling the account in RGC when you are setting up a landing zone.
- Alert Email: Enter an email address for the audit account. It is used to receive alerts preset by RGC. It can have a maximum of 64 characters.
- Account Name: Enter the name of the account you have registered with Huawei Cloud.
- Account ID: Enter the ID of the account you have registered with Huawei Cloud. The account ID cannot be the ID of the management account or of a member account in another organization.
Figure 8 Configuring an audit account - Set Account Type to Create new account.
- Click Next.
- Determine whether to enable CTS.
If you do not enable CTS, RGC will not manage your CTS audit logs. It is strongly recommended that you enable CTS. Preconfigured mandatory governance policies will check whether CTS is enabled for enrolled accounts.
Figure 9 Enabling CTS - Configure an OBS bucket for storing logs. You can create a new OBS bucket or use an existing one. If you chose to create a log archive account, you will also need to create an OBS bucket. Log data is encrypted with SSE-OBS, and the keys are created and managed by OBS.
- Create new bucket: If you choose this option, you need to configure a retention period for logs in the OBS bucket. Logs are automatically stored in the two default OBS buckets, and you cannot rename them.
- OBS Bucket Retention for Log Aggregation: The default period is one year, but you can change this to up to 15 years.
This bucket is used to store operation audit logs recorded by CTS for all accounts in an organization and resource snapshots recorded by Config for managed accounts. It is stored in the bucket named rgcservice-managed-audit-logs-{Management account ID}. {Management account ID} represents the actual ID of the management account.
- OBS Bucket Retention for Access Logs: The default period is 10 years, but you can change this to up to 15 years.
The logs for accessing the log aggregation bucket are stored in the bucket rgcservice-managed-access-logs-{management account ID}.
- OBS Bucket Retention for Log Aggregation: The default period is one year, but you can change this to up to 15 years.
- Use existing bucket: If you choose this option, you need to enter the name of the OBS bucket created by the log archive account. If you use another bucket name, landing zone setup will fail. To ensure data security, you are advised to use a private OBS bucket.
Figure 10 Configuring the OBS bucket retention for logging - Create new bucket: If you choose this option, you need to configure a retention period for logs in the OBS bucket. Logs are automatically stored in the two default OBS buckets, and you cannot rename them.
- Review and confirm the landing zone settings, and then select the checkbox I understand the permissions required by RGC to manage resources and apply policies. I also know the basics of how to use RGC and other Huawei Cloud resources.
You can log in to the IAM console, choose Identity Policies in the navigation pane. On the displayed page, search for RGCServiceAgencyPolicy to view the permissions used by RGC to manage resources and enforce policies.Figure 11 Confirming the landing zone settings
- Click Set Up Landing Zone.
NOTICE:
The email address you configured for audit account alerts will receive a subscription confirmation email from the regions governed in RGC. If you want your audit account to receive such emails, click the confirmation link in each email from each region.
Important Notes
- You also need to deploy and manage existing OUs and member accounts. For details, see Organization Management.
- After your landing zone is set up, all preventive governance policies will be attached to the OU that the core account belongs to.
- After your landing zone is set up, the bucket policies AllowCtsAccessBucket and AllowConfigAccessBucket will be configured for the OBS bucket that stores logs. For details about the bucket policies, go to the OBS console.
- After your landing zone is set up, the object read permission will be configured for the OBS bucket that stores logs so that the core account has permission to view logs in the bucket.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot