AWS Overview & Support
After InsightCloudSec is successfully installed, you're ready to enable visibility into your target AWS Organization(s) and/or cloud account(s). This documentation details configuring your Amazon Web Services (AWS) environment to "talk" with InsightCloudSec securely.
Frequently Asked Questions (FAQ)
The following frequently asked questions and answers should help you understand AWS in InsightCloudSec.
What does InsightCloudSec support from AWS?
What does InsightCloudSec support from AWS?
As one of the leading public cloud service providers, InsightCloudSec provides broad support for Amazon Web Services (AWS). Review the full list of AWS-specific supported services in the AWS Commercial Support Reference section.
How do I start seeing my AWS environments in InsightCloudSec?
How do I start seeing my AWS environments in InsightCloudSec?
InsightCloudSec relies on a process called "harvesting" to pull data from various CSPs. Review Onboard an AWS Cloud Account or Onboard an AWS Organization for details.
What do I do after my environments is being harvested?
What do I do after my environments is being harvested?
After at least one AWS account is harvested by InsightCloudSec, you're free to configure additional AWS services as necessary to enhance, optimize, or further secure your experience. Review AWS Additional Configuration for more information. The items in this section were written in the AWS Commercial context.
How can I optimize harvesting?
How can I optimize harvesting?
InsightCloudSec harvesting is the term we use to describe the process of data collection from a selected cloud service provider (CSP) within InsightCloudSec. Check out our Harvesting Overview documentation to understand the basics and refer to Harvesting Strategies for details on specific strategies.
In addition, for AWS, InsightCloudSec offers Event-Driven Harvesting, which requires additional configuration but optimizes harvesting by only pulling in new data when certain AWS CloudWatch Events occur. Review our AWS Event-Driven Harvesting documentation for more information.
Manage AWS Cloud Accounts
After initial configuration of the account in AWS, you can add the account to InsightCloudSec. In InsightCloudSec, you onboard a cloud account or organization using the onboarding wizard. Review Onboard an AWS Cloud Account or Onboard an AWS Organization for details.
Once an account is successfully being harvested by InsightCloudSec, it can be modified or deleted as necessary.
- Modify: For general information about managing existing AWS Cloud accounts, check out the Clouds section and subsections on Cloud Account Setup & Management. Information about viewing the details of a single cloud account is available on the Cloud Account Detail Page.
- Delete: Cloud accounts can be deleted through their individual Settings page.
AWS Commercial Support Reference
Supported Services
Supported Services
Included in this section are all of the AWS services (and their components) supported by InsightCloudSec. If you have questions related to AWS or specific services and their support, contact us through the Customer Support Portal. If you're interested in the AWS China or GovCloud support for InsightCloudSec, review the China Cloud Support Reference or Government Cloud Support Reference for details instead.
AWS Supported Services & Regions
In general, AWS services included in this section are supported for all regions in which they are available. In some scenarios, some services may not be available in certain regions (or for AWS GovCloud/China in general). This is typically the result of restrictions related to the region itself or otherwise imposed by AWS to comply with regional policies. We recommend that you refer to the AWS documentation on those specific regions for official details. InsightCloudSec now recognizes the EC2 Serial Console as part of general EC2 service support.
text
1Amazon API Gateway (Domain, Key, Stage, Usage Plans)2Amazon Bedrock (Agent, Model, Training job)3Amazon Connect4Amazon DocumentDB (Elastic)5Amazon Kendra (Index)6Amazon Keyspaces7Amazon Lookout for Equipment8Amazon Lookout for Metrics9Amazon Lookout for Vision10Amazon Macie11Amazon MemoryDB for Redis12Amazon MQ13Amazon OpenSearch Serverless14Amazon QuickSight15Amazon SageMaker (Notebook, Training job)16Amazon Simple Email Service (Configuration sets, Rules)17Amazon Redshift (Serverless Namespace, Serverless Workgroup, Snapshot)18Amazon Timestream19Amazon Transcription20AppStream 2.021Athena (Workgroup)22AWS App Runner23AWS AppSync24AWS Auto Scaling (Group, Launch Configurations)25AWS Backup (gateway, Vault)26AWS Clean Rooms (Collaborations)27AWS Control Tower (Control, Landing zone)28AWS Glue (Connection, Crawler, Data Catalog, Database, Job, Security Configuration)29AWS Health Dashboard30AWS Organizations (Consolidated Bill, Service Control Policy)31AWS Outposts32AWS Systems Manager (Association, Parameter Store (Parameter), Document)33AWS Transfer Family (SFTP Server)34Batch (Compute Environment)35Certificate Manager (Private Certificate Authority)36CloudFormation (Templates)37CloudFront38CloudHSM39CloudSearch (Cluster)40CloudTrail41CloudWatch (Alarm, Log Group, Logs Destination, Rule, EventBridge event bus, Observability Access Manager)42CodeBuild (Project)43CodeCommit44Cognito (User Pool)45Database Migration Service (Endpoint, Replication Instance)46DataSync (Task)47Direct Connect48Directory Service49DynamoDB (Accelerator (DAX))50EC2 (Amazon EBS Snapshot, Amazon EBS Volume, Dedicated Instance, Instance, Launch Template, Reserved Instance, Resource/Service Limit/Quota, Savings Plans, SSH Key Pairs)51EFS52Elastic Beanstalk (Application, Environment)53Elastic Container Registry (Container Image, Container Registry)54Elastic Container Service/Fargate (Cluster, Container, Container Task, Task Definition)55Elastic Kubernetes Service (Cluster, Container Instance, Node Group)56Elastic Load Balancer (Application Load Balancer, Gateway Load Balancer, Network Load Balancer)57Elastic MapReduce58Elastic Transcoder (Pipeline)59ElastiCache (Snapshot)60FSx (Lustre, NetApp ONTAP)61Global Accelerator62GuardDuty (Detector)63IAM (Access Analyzer, Cloud Account, Group, Policy (Customer Managed), Role, IAM/ACM SSL Certificate, User, User Access Key)64Key Management Service65Kinesis (Data Firehose)66Kinesis Analytics (Streaming applications)67Kinesis Video Stream68Lambda (Layer)69Lightsail70Managed Apache Airflow (Environment)71MSK (Instance)72Neptune73OpenSearch Service74RDS (Aurora, Aurora global database, Cluster, Event Subscription, Instance, Proxy, Snapshot)75Recycle Bin76Region77Resource Access Manager (Resource shares, Shared resources)78Route 53 (DNS Zone, Domain, Resolver Configuration)79S3 (Access Point, Multi-Region Access Point)80S3 Glacier81SAML Identity Provider82Secrets Manager (Secret)83Serverless Application Repository84Simple Queue Service85Simple Notification Service (Subscription, Topic)86Step Function State Machine87Storage Gateway (NFS/SMB File Share)88Trusted Advisor89VPC (Elastic IP, Elastic Network Interface (ENI), Endpoint Service, Endpoint/PrivateLink, Flow Log, Internet Gateway, Managed Prefix List, NACL/Security Group, NACL/Security Group Rules, NAT Gateway, Network Firewall (Rules, Rule Groups), Peer, Route, Route Table, Site-to-Site VPN, Subnet, Traffic Mirror Target, Transit Gateway, Virtual Private Gateway)90WAF & Shield (Rules, Rule Groups)91WorkSpaces (Instances)
Supported API calls
Supported API Calls
Included in this section are all of the API calls supported across AWS services based on the many policies that InsightCloudSec provides. This list is for administrators who may want to fine tune a policy with granular read/write operations.
text
1EC2 Commands2============34AllocateAddress5AssociateAddress6AssociateRouteTable7AttachInternetGateway8AttachNetworkInterface9AttachVolume10AuthorizeSecurityGroupIngress11CopyImage12CopySnapshot13CreateDefaultVpc14CreateImage15CreateInstanceExportTask16CreateInternetGateway17CreateKeyPair18CreateNetworkAcl19CreateNetworkInterface20CreateRole21CreateRoute22CreateRouteTable23CreateSecurityGroup24CreateSnapshot25CreateSubnet26CreateTags27CreateVolume28CreateVpc29DeleteInternetGateway30DeleteKeyPair31DeleteNetworkAcl32DeleteNetworkAclEntry33DeleteNetworkInterface34DeleteRoute35DeleteRouteTable36DeleteSecurityGroup37DeleteSnapshot38DeleteSubnet SubnetId39DeleteTags40DeleteVolume41DeleteVpc VpcId42DeleteVpcPeeringConnection43DeregisterImage44DescribeAddresses45DescribeAddresses46DescribeAvailabilityZones47DescribeAvailabilityZones48DescribeFlowLogs49DescribeHosts50DescribeImageAttribute51DescribeImages52DescribeImportImageTasks53DescribeInstanceAttribute54DescribeInstanceStatus55DescribeInstanceTypes56DescribeInstances57DescribeInternetGateways58DescribeKeyPairs59DescribeKeyPairs60DescribeKeyPairs61DescribeNetworkAcls62DescribeNetworkInterfaceAttribute63DescribeNetworkInterfaces64DescribePlacementGroups65DescribeRegions66DescribeReservedInstances67DescribeRouteTables68DescribeSecurityGroups69DescribeSnapshots70DescribeSubnets71DescribeTags72DescribeVolumeStatus73DescribeVolumes74DescribeVpcAttribute75DescribeVpcPeeringConnections76DescribeVpcs77DetachInternetGateway78DetachNetworkInterface79DetachVolume80DisassociateAddress81DisassociateRouteTable82GetConsoleOutput83GetPasswordData84ImportImage85ImportInstance86ImportKeyPair87ModifyImageAttribute88ModifyImageAttribute89ModifyInstanceAttribute90ModifyNetworkInterfaceAttribute91ModifyVolume92ModifyVpcAttribute93RegisterImage94ReleaseAddress95ReplaceRouteTableAssociation96RunInstances97TerminateInstances9899Redshift Commands100=================101CreateClusterSnapshot102CreateTags103DeleteClusterSnapshot104DeleteTags105DescribeClusterSnapshots106DescribeClusters107DescribeTags108109IAM Commands110============111DeleteUser112DeletePolicy113GetAccessKeyLastUsed114GetAccountPasswordPolicy115GetAccountSummary116GetLoginProfile117GetUser118ListAccessKeys119ListAttachedRolePolicies120ListAttachedUserPolicies121ListMFADevices122ListPolicies123ListRolePolicies124ListRoles125ListServerCertificates126ListUsers127UpdateAccessKey128UpdateAssumeRolePolicy129130Autoscale Commands131==================132AttachInstances133CreateAutoScalingGroup134CreateLaunchConfiguration135DeleteAutoScalingGroup136DeleteLaunchConfiguration137DetachInstances138PutScalingPolicy139PutScalingPolicy140SetDesiredCapacity141142RDS Commands143============144AddTagsToResource145CreateDBSnapshot146DeleteDBInstance147DeleteDBSnapshot148DescribeDBEngineVersions149DescribeDBInstances150DescribeDBSnapshots151DescribeReservedDBInstances152ListTagsForResource153RebootDBInstance154RemoveTagsFromResource155StartDBInstance156StopDBInstance157158Elasticache Commands159====================160AddTagsToResource161CreateSnapshot162DeleteCacheCluster163DeleteSnapshot164DescribeCacheClusters165DescribeSnapshots166ListTagsForResource167RebootCacheCluster168RemoveTagsFromResource169170LoadBalancer Commands171============172AddTags173ApplySecurityGroupsToLoadBalancer174AttachLoadBalancerToSubnets175CreateLoadBalancer176CreateLoadBalancerListeners177CreateLoadBalancerPolicy178DeleteLoadBalancer179DeleteLoadBalancerListeners180DeleteLoadBalancerPolicy181DeregisterInstancesFromLoadBalancer182DeregisterInstancesFromLoadBalancer183DescribeLoadBalancerAttributes184DescribeLoadBalancerPolicies185DescribeLoadBalancerPolicyTypes186DescribeLoadBalancers187DescribeLoadBalancers188DescribeTags189DetachLoadBalancerFromSubnets190RegisterInstancesWithLoadBalancer191RegisterInstancesWithLoadBalancer192RemoveTags193SetLoadBalancerPoliciesForBackendServer194SetLoadBalancerPoliciesOfListener195196CloudTrail Commands197===================198DeleteTrail199DescribeTrails200GetTrailStatus201StartLogging202StopLogging203204Route53 Commands205================206ChangeResourceRecordSets207ChangeTagsForResource208CreateHostedZone209DeleteHostedZone210ListHostedZones211ListHostedZonesByName212ListGeoLocations213ListHealthChecks214ListResourceRecordSets215ListTagsForResource216ListTagsForResources217ListVPCAssociationAuthorizations218219S3 Commands220===========221DELETE Bucket222DELETE Bucket CORS223DELETE Bucket Policy224DELETE Bucket Tagging225GET Bucket226GET Bucket ACL227GET Bucket CORS228GET Bucket Logging229GET Bucket Policy230GET Bucket Tagging231GET Bucket Versioning232GET Bucket Website233PUT Bucket ACL234PUT Bucket CORS235PUT Bucket Policy236PUT Bucket Tagging237PUT Bucket Logging238239Cloudwatch Commands240===================241DescribeAlarms242GetMetricStatistics243ListMetrics244245Organizations Commands246======================247ListAccounts248DescribeOrganization249250Certificate Manager (ACM) Commands251==================================252ListCertificates253DescribeCertificate254255Elastic File System (EFS) Commands256==================================257DescribeFileSystems258DescribeTags259CreateTags260DeleteTags261CreateFileSystem262DescribeMountTargetSecurityGroups263DescribeMountTargets264DeleteMountTarget265CreateMountTarget266ModifyMountTargetSecurityGroups267268Lambda Commands269===============270ListFunctions271ListTags272273Elasticsearch Commands274======================275ListDomainNames276ListTags277DescribeElasticsearchDomains278279Config Commands280===============281DescribeConfigurationRecorders282DescribeConfigurationRecorderStatus283DescribeDeliveryChannels284DescribeDeliveryChannelStatus285286STS Commands287============288AssumeRole289GetCallerIdentity290291Stack Template Commands292=======================293DescribeStacks294ListStackResources295ListStacks296DescribeStackResource297DescribeStackResources298GetTemplate299DeleteStack300301DynamoDB302========303DescribeTable304DescribeGlobalTable305ListBackups306ListTables307ListGlobalTables308ListTagsOfResource309310DynamoDB DAX311============312DescribeClusters313DescribeTable314ListTables315ListTags316317SQS318===319GetQueueAttributes320ListQueues321ListQueueTags322323Workspaces324==========325DescribeTags326DescribeWorkspaces327DescribeWorkspaceBundles328DescribeWorkspacesConnectionStatus329DescribeWorkspaceDirectories330331Kinesis332=======333ListStreams334DescribeStream335DeleteStream336ListShards337AddTagsToStream338ListTagsForStream339RemoveTagsFromStream340341Firehose342========343ListDeliveryStreams344DescribeDeliveryStream345DeleteDeliveryStream346TagDeliveryStream347ListTagsForDeliveryStream348UntagDeliveryStream
AWS policies
InsightCloudSec offers several different AWS policies for harvesting resource information found in your AWS accounts and enabling features such as Event-driven Harvesting (EDH), Least Privileged Access (LPA), and Cloud Vulnerability Management.
If you're interested in setting up an AWS China or GovCloud account, review the China Cloud Support Reference or Government Cloud Support Reference for details instead.
Policy URLs during onboarding
As of InsightCloudSec v. 23.4.11, the new universal onboarding experience for AWS accounts uses CloudFormation Templates (CFTs) to automatically provision relevant accounts with the necessary policies and roles that contain your specific, unique InsightCloudSec account information.
We highly recommend using the new AWS onboarding experience to add your AWS accounts and only use the policies in this section for reference as some of the URLs provided on this page represent the generic versions of the policies, i.e., there are placeholder values for account-specific information.
Useful Terminology
Some concepts and terminology you should be aware of while reviewing the policies:
Term | Description |
---|---|
Consolidated | All IAM Resources deployed by the onboarding CFT include a path prefix of /rapid7/ , which helps organize all Rapid7 IAM resources together. Additionally, Roles and Policies both use the naming convention rapid7-<access type>-<feature/usecase> for easy identification. You'll note the IAM Role name, rapid7-consolidated , which denotes that policies for all three access types of readonly , egress (a.k.a. data access), and automation are attached to the same role. We reserve this naming convention if we decide to support multiple Roles for each access type use case. |
Access Types | The onboarding CFT creates different roles to collect various types of information from your AWS accounts:
|
New required permissions are announced in our release notes. The API calls that are supported with any of the policies can be found in the Supported API Calls section.
Onboarding and Harvesting Policies
Consolidated Assume Role Policy
Consolidated Assume Role Policy
The Consolidated Assume Role Policy is used to establish the trust relationship to the Authenticating Principal (your InsightCloudSec installation role). Note: This link contains placeholder values for InsightCloudSec-specific account information.
Standard Self Referential Policy
Standard Self Referential Policy
The Standard Self Referential Policy allows for the role to refer to itself, the account, and organization it exists within.
Read-Only Policy
Read-Only Policy
The Read-Only policy consists of three parts (the permissions have exceeded AWS's limitation on policy size). These policies only contain read only-type permissions, e.g., List
, Describe
, Get
, etc., and will need to be updated any time InsightCloudSec supports a new AWS Service.
Feature Enablement Policies
Egress EventBridge Auto Provisioning Policy
Egress EventBridge Auto Provisioning Policy
The Egress EventBridge Auto Provisioning Policy grants the Rapid7 IAM Role permission to create/manage EventBridge Rules/Targets and create/manage an SQS queue from consuming the Events. Review AWS Event-Driven Harvesting for more information.
Egress LPA Auto Provisioning Policy
Egress LPA Auto Provisioning Policy
The Egress LPA Auto Provisioning Policy grants the Rapid7 IAM Role permission to access CloudTrail, to create the necessary AWS Glue tables and to create/execute Athena queries with a S3 bucket for results. Review AWS Least-Privileged Access (LPA) for more information.
Egress Host Vulnerability Assessment Via Role Policy
Egress Host Vulnerability Assessment Via Role Policy
The Egress Host Vulnerability Assessment Via Role Policy grants the Rapid7 IAM Role permissions to create and download EBS snapshots for vulnerability scanning. Review Vulnerability Management Overview for more information.
Egress Container Vulnerability Assessment Via Role Policy
Egress Container Vulnerability Assessment Via Role Policy
The Egress Container Vulnerability Assessment Via Role Policy grants the Rapid7 IAM Role ECR read permission to all ECR repositories in the AWS Account. This allows for pulling images and scanning for vulnerabilities. Some read permissions overlap with the Rapid7 Read-Only Policies, which are used for general visibility and discovery. This Policy duplicates those permissions because the Rapid7 IAM Role may need to access additional metadata before or after pulling an image to capture the most recent context when producing a finding. Review Vulnerability Management Overview for more information.
Example Deployment Policies
These IAM Policies can be used as a reference example for a dedicated IAM Role to be used via automation or CI/CD pipeline. These policies allow for programmatically deploying the onboarding CFT, but you'll need to periodically update the CFT for new permissions.
The statements scope the permissions to only IAM Roles and Policies related to Rapid7 using our naming conventions but could be expanded upon with more fine grain conditionals.