Government Cloud Overview & Support
After InsightCloudSec is successfully installed, you’re ready to start harvesting resources from your target cloud accounts. This documentation details configuring your Government Cloud (GovCloud) environments to “talk” with InsightCloudSec securely. Review the sections below to determine the best starting point for your environment.
GovCloud in InsightCloudSec: Frequently Asked Questions (FAQ)
What does InsightCloudSec support from GovCloud?
How do I start seeing my GovCloud environments in InsightCloudSec?
How do I start seeing my GovCloud environments in InsightCloudSec?
InsightCloudSec relies on a process called “harvesting” to pull data from various CSPs. Currently, InsightCloudSec only offers setup instructions for a single cloud account in AWS GovCloud. Review AWS Cloud - Onboarding for details.
Can customers running InsightCloudSec in GovCloud (self-hosted) harvest commercial account data/resources?
Can customers running InsightCloudSec in GovCloud (self-hosted) harvest commercial account data/resources?
AWS GovCloud:
Yes, however, customers must use a STS assume role operation instead of a traditional assume role. API calls cannot be made between AWS partitions (commercial/GovCloud/China) until a cross-partition STS assume role operation has been performed.
Can customers running InsightCloudSec in commercial cloud environments (SaaS and self-hosted) harvest GovCloud account data/resources?
Can customers running InsightCloudSec in commercial cloud environments (SaaS and self-hosted) harvest GovCloud account data/resources?
AWS GovCloud:
Yes, however, customers must use a STS assume role operation instead of a traditional assume role. API calls cannot be made between AWS partitions (commercial/GovCloud/China) until a cross-partition STS assume role operation has been performed.
AWS GovCloud Support
AWS GovCloud accounts are onboarded the same way as AWS Commercial accounts. Review Onboard an AWS Cloud Account for more information.
AWS GovCloud Policies
AWS GovCloud Policies
InsightCloudSec offers several different AWS policies for harvesting resource information found in your AWS accounts and enabling InsightCloudSec features. Our universal onboarding experience will implement the appropriate policies automatically, so there’s no need for AWS GovCloud-specific policies. Review AWS Policies for details.
AWS GovCloud Supported Deployment Regions
InsightCloudSec can only be deployed in AWS. For self-hosted customers, InsightCloudSec can be exclusively deployed/hosted in AWS GovCloud, if you so choose. For SaaS customers reach out to support for additional details on deployment.
AWS GovCloud Services
AWS GovCloud Supported Services
Listed below are all of the AWS GovCloud services (and their components) supported by InsightCloudSec. In general if a service is supported by InsightCloudSec for GovCloud, we support it in any region in which the CSP provides the service. If you have questions related to AWS or specific services and their support, contact us through the Customer Support Portal .
Amazon API Gateway (Domain, Key, Stage, Usage Plans)
Amazon DocumentDB
Amazon QuickSight
Amazon SageMaker (Notebook, Training job)
Amazon Simple Email Service (Configuration sets, Rules)
Amazon Redshift (Snapshot)
Amazon Transcription
AppStream 2.0
Athena (Workgroup)
AWS Auto Scaling (Group)
AWS Backup (gateway, Vault)
AWS Control Tower (Control, Landing zone)
AWS Glue (Connection, Crawler, Data Catalog, Database, Job, Security Configuration)
AWS Health Dashboard
AWS Organizations
AWS Systems Manager (Association, Parameter Store (Parameter), Document)
Batch (Compute Environment)
Certificate Manager (Private Certificate Authority)
CloudFormation (Templates)
CloudFront
CloudHSM
CloudTrail
CloudWatch (Alarm, Log Group)
Database Migration Service (Endpoint, Replication Instance)
DynamoDB
EC2 (Amazon EBS Snapshot, Amazon EBS Volume,Instance, Launch Template, Reserved Instance, Resource/Service Limit/Quota, Savings Plans, SSH Key Pairs)
EFS
Elastic Beanstalk (Application, Environment)
Elastic Container Registry (Container Registry)
Elastic Container Service/Fargate
Elastic Kubernetes Service (Node Group)
Elastic Load Balancer (Application Load Balancer, Gateway Load Balancer, Network Load Balancer)
ElastiCache (Snapshot)
EMR
FSx
Global Accelerator
IAM (Cloud Account, Group, Policy (Customer Managed), Role, User, User Access Key)
Key Management Service
Kinesis
Lambda (Layer)
Neptune
OpenSearch Service
RDS (Aurora, Cluster, Event Subscription, Instance, fSnapshot)
Region
Resource Access Manager (Resource shares, Shared resources)
Route 53
S3 (Access Point)
SAML Identity Provider
Secrets Manager (Secret)
Simple Queue Service
Simple Notification Service (Subscription, Topic)
Step Function State Machine
Storage Gateway
Systems Manager (Document)
Trusted Advisor
VPC (Elastic IP, Elastic Network Interface (ENI), Flow Log, Internet Gateway, NACL/Security Group, NACL/Security Group Rules, NAT Gateway, Network Firewall (Rules, Rule Groups), Peer, Route Table, Subnet)
WAF (Rules, Rule Groups)
WorkSpaces (Instances)
Azure GovCloud Support
Azure GovCloud accounts are onboarded the same way as Azure Commercial accounts. Review Onboard an Azure Cloud Account or Onboard an Azure Organization for more information.
Azure GovCloud Roles
Azure GovCloud Roles
InsightCloudSec offers a couple Azure roles for harvesting resource information found in your Azure accounts and enabling InsightCloudSec features.
Custom GovCloud Reader Role
If you are interested in operating in read-only mode, which prevents InsightCloudSec from taking actions against your Microsoft Azure GovCloud resources, then we recommend using the Custom GovCloud Reader Role. This role grants InsightCloudSec read-only permissions to supported resources so data is harvested and available for reporting. Using this role means you must manually update the role with each new Azure GovCloud service that InsightCloudSec supports.
The role JSON can be obtained from our public S3 bucket: <https://s3.amazonaws.com/get.divvycloud.com/policies/Azure-GovCloud-Custom-Reader-User-Role.json> . The JSON file includes a placeholder value for the subscription ID. This placeholder value will need to be replaced before implementing the role.
Custom GovCloud Power User Role
If you would like to use InsightCloudSec to manage your Microsoft Azure GovCloud resources directly or through the use of Bots, then use the Custom GovCloud Power User Role. This role will grant InsightCloudSec all permissions to supported resources so it can act upon cloud resources in addition to monitoring and reporting on them. Using this role means you must manually update the role with each new Azure GovCloud service that InsightCloudSec supports.
The role JSON can be obtained from our public S3 bucket: <https://s3.amazonaws.com/get.divvycloud.com/policies/Azure-GovCloud-Power-User-Role.json> . The JSON file includes a placeholder value for the subscription ID. This placeholder value will need to be replaced before implementing the role.
Azure GovCloud Supported Regions
Azure GovCloud Supported Services
Azure GovCloud Supported Services
Listed below are all of the Azure GovCloud services (and their components) supported by InsightCloudSec. For resource support, in general if a resource is supported by InsightCloudSec for GovCloud, we support it in any region in which the CSP provides the resource. If you have questions related to Azure or specific services and their support, contact us through the Customer Support Portal .
Activity log (Alerts)
API Management services
App Registration
App Services
App Service plans
Application credentials
Application gateways
Automation Account
Azure Blob Storage
Azure Cache for Redis
Azure Cosmos DB
Azure Database for PostgreSQL/MySQL/MariaDB
Azure Databricks
Azure Files
Azure role assignments
Azure Synapse Analytics
Batch (Accounts, Pools)
Bot services
CDN profile
Cognitive Services (Azure OpenAI, Computer vision, Content moderator, Language service, Language understanding (classic), Personalizer, Speech service, Translator)
Container instances
Container registries (Container Image)
Compute/Network Usage Limit
Data factories
Dedicated SQL pools
DDoS protection plans
Diagnostic settings
Disks
DNS zones
Event Grid (Topics)
Event Hubs
ExpressRoute circuits
Firewall (Rule, Rule Collection)
Front Doors
Function App
HDInsight clusters
IP Groups
Kubernetes services
Load balancers
Log Analytics workspaces
Logic apps
Management groups
Microsoft Defender for Cloud (Security posture recommendations)
Microsoft Entra ID (Group, Service Principal, User)
NAT gateways
Network interfaces
Network security groups (Flow Logs, Security Rules)
Peerings
Policy (Definitions)
Private Link services
Public IP addresses
Region
Resource groups
Role Definition
Route tables (Route)
Service Bus (Queue)
Service Fabric clusters
Shared Image Gallery (Image Definition, Image Version)
SQL Servers
SSL Certificate
Storage accounts
Storage Sync Services
Subscriptions
Traffic Manager
Virtual machine (Dedicated Host, Image)
Virtual machine scale sets
Virtual network (Private Endpoint, Service Endpoint, Service Endpoint Policy Subnet)
Virtual network gateway
Web Application Firewall policies (WAF)