AWS account management

This topic describes the process of onboarding AWS accounts to CloudFlow.

For list of required permissions see Permissions required for AWS roles.

You can choose from the following three onboarding methods to add new AWS accounts:

  • With script - Uses scripts to onboard AWS resources. Changes to accounts after onboarding are automatically synced from AWS to CloudFlow.

  • API (single account) - Onboard a single account. Changes to the account after onboarding are not synced.

  • Terraform - Leverage Terraform, the infrastructure-as-code solution, to onboard your AWS accounts into CloudFlow. Changes to accounts after onboarding are automatically synced from AWS to CloudFlow.

Note: Any changes in an onboarded accounts will automatically sync with CloudFlow once every hour.

Access the Onboarding wizard

Do the following:

  1. In the CloudFlow Settings area, click ONBOARDING.

    On the Onboarding Managment page that opens, click +Onboard.

  2. If you are onboarding your first account, click the New Cloud Account button on the welcome page.

  3. Otherwise, click the button and click Next.

    The AWS Onboarding wizard appears.

  4. Select your preferred method to onboard using the Select Onboarding Method dropdown.

    *Automatically syncs changes to accounts from AWS to CloudFlow after onboarding.
    Onboarding Method Description Automatic sync*
    With script Uses scripts to onboard AWS resources Yes
    API (single account) Onboard a single subscription via API No
    Terraform Onboard AWS resources using Terraform Yes
  5. Onboard AWS accounts using your preferred method:

Permissions required for AWS roles

The following permissions are required for CloudFlow for the selected role and are included in the downloaded CloudFormation Template.

Important: Missing permissions can cause CloudFlow to malfunction and lead to data inconsistencies. AlgoSec is not responsible for any issues arising from missing permissions.

#

Required IAM permissions

 

*Click for link to Amazon API Docs

  Access level:   READ  

1

ec2:DescribeRegions

2

ec2:DescribeInstances

3

ec2:DescribeVpcs

4

ec2:DescribeSubnets

5

ec2:DescribeNetworkInterfaces

6

ec2:DescribeSecurityGroups

7

ec2:DescribeInternetGateways

8

ec2:DescribeVpnGateways

9

ec2:DescribeVpnConnections

10

ec2:DescribeVpcPeeringConnections

11

ec2:DescribeRouteTables

12

ec2:DescribeTransitGateways

13

ec2:DescribeTransitGatewayAttachments

14

ec2:DescribeTransitGatewayRouteTables

15

directconnect:DescribeDirectConnect*

16

ec2:SearchTransitGatewayRoutes

17

ec2:DescribeNetworkAcls

18

elasticloadbalancing:DescribeLoadBalancers

19

ec2:DescribeFlowLogs

20

s3:List*

21

s3:GetObject*

22

s3:GetBucketLocation

23

logs:GetLogEvents
 

Optional IAM permissions

  Access level:   WRITE  
Note: Access level WRITE is needed if you want to change policy details.

24

ec2:AuthorizeSecurityGroupIngress

25

ec2:AuthorizeSecurityGroupEgress

26

ec2:RevokeSecurityGroupEgress

27

ec2:RevokeSecurityGroupIngress

VPC Flow Logs

Tip: For background about VPC Flow Logs, see these: AWS Article: VPC Flow Logs, AWS Blog: VPC Flow Logs.

By enabling VPC flow logs, CloudFlow can retrieve and analyze flow logs. This provides you with data, shown on the CloudFlow Risk Trigger and Network Policy pages, about the date when SG rules were last used. On the network policy pages, you can use this data to clean out old or unused rules from your policies.

For more details on the benefits of enabling VPC flow logging, see Last used and Clean up policies

Once flow logs are enabled, CloudFlow will start displaying details about the last used date for each triggered rule. Follow the steps in Enable VPC flow logging to get started.

Notes:
(1) Allow up to 24 hours for relevant rule usage information to be displayed when enabling flow logs for the first time and when adding accounts that already had flow logs enabled.

(2) VPC flow logs can be stored on either S3 or CloudWatch.CloudFlow supports collecting flow logs from either option.

(3)CloudFlow supports processing flow logs only when they are stored in the default log format. More details in this AWS article.

(4) If you configure both S3 and CloudWatch as your VPC Flow Logs targets,CloudFlow will collect only from the S3 buckets.

(5)CloudFlow collects only VPC Flow Logs of traffic type “accept”. Make sure that you configure the VPC Flow Logs traffic type to either “Accepted traffic” or “All traffic” (more details in this AWS article)

Enable VPC flow logging