Government Cloud Overview & Support
After InsightCloudSec is successfully installed, you're ready to start harvesting resources from your target cloud accounts. This documentation details configuring your Government Cloud (GovCloud) environments to "talk" with InsightCloudSec securely. Review the sections below to determine the best starting point for your environment.
GovCloud in InsightCloudSec: Frequently Asked Questions (FAQ)
What does InsightCloudSec support from GovCloud?
What does InsightCloudSec support from GovCloud?
Review the full list of GovCloud-specific supported services below.
How do I start seeing my GovCloud environments in InsightCloudSec?
How do I start seeing my GovCloud environments in InsightCloudSec?
InsightCloudSec relies on a process called "harvesting" to pull data from various CSPs. Currently, InsightCloudSec only offers setup instructions for a single cloud account in AWS GovCloud. Review AWS Cloud - Onboarding for details.
Can customers running InsightCloudSec in GovCloud (self-hosted) harvest commercial account data/resources?
Can customers running InsightCloudSec in GovCloud (self-hosted) harvest commercial account data/resources?
AWS GovCloud:
Yes, however, customers must use a STS assume role operation instead of a traditional assume role. API calls cannot be made between AWS partitions (commercial/GovCloud/China) until a cross-partition STS assume role operation has been performed.
Can customers running InsightCloudSec in commercial cloud environments (SaaS and self-hosted) harvest GovCloud account data/resources?
Can customers running InsightCloudSec in commercial cloud environments (SaaS and self-hosted) harvest GovCloud account data/resources?
AWS GovCloud:
Yes, however, customers must use a STS assume role operation instead of a traditional assume role. API calls cannot be made between AWS partitions (commercial/GovCloud/China) until a cross-partition STS assume role operation has been performed.
AWS GovCloud Support
AWS GovCloud accounts are onboarded the same way as AWS Commercial accounts. Review Onboard an AWS Cloud Account for more information.
AWS GovCloud Policies
AWS GovCloud Policies
InsightCloudSec offers several different AWS policies for harvesting resource information found in your AWS accounts and enabling InsightCloudSec features. Our universal onboarding experience will implement the appropriate policies automatically, so there's no need for AWS GovCloud-specific policies. Review AWS Policies for details.
AWS GovCloud Supported Deployment Regions
InsightCloudSec can only be deployed in AWS. For self-hosted customers, InsightCloudSec can be exclusively deployed/hosted in AWS GovCloud, if you so choose. For SaaS customers reach out to support for additional details on deployment.
AWS GovCloud Services
AWS GovCloud Supported Services
Listed below are all of the AWS GovCloud services (and their components) supported by InsightCloudSec. In general if a service is supported by InsightCloudSec for GovCloud, we support it in any region in which the CSP provides the service. If you have questions related to AWS or specific services and their support, contact us through the Customer Support Portal.
text
1Amazon API Gateway (Domain, Key, Stage, Usage Plans)2Amazon DocumentDB3Amazon QuickSight4Amazon SageMaker (Notebook, Training job)5Amazon Simple Email Service (Configuration sets, Rules)6Amazon Redshift (Snapshot)7Amazon Transcription8AppStream 2.09Athena (Workgroup)10AWS Auto Scaling (Group)11AWS Backup (gateway, Vault)12AWS Control Tower (Control, Landing zone)13AWS Glue (Connection, Crawler, Data Catalog, Database, Job, Security Configuration)14AWS Health Dashboard15AWS Organizations16AWS Systems Manager (Association, Parameter Store (Parameter), Document)17Batch (Compute Environment)18Certificate Manager (Private Certificate Authority)19CloudFormation (Templates)20CloudFront21CloudHSM22CloudTrail23CloudWatch (Alarm, Log Group)24Database Migration Service (Endpoint, Replication Instance)25DynamoDB26EC2 (Amazon EBS Snapshot, Amazon EBS Volume,Instance, Launch Template, Reserved Instance, Resource/Service Limit/Quota, Savings Plans, SSH Key Pairs)27EFS28Elastic Beanstalk (Application, Environment)29Elastic Container Registry (Container Registry)30Elastic Container Service/Fargate31Elastic Kubernetes Service (Node Group)32Elastic Load Balancer (Application Load Balancer, Gateway Load Balancer, Network Load Balancer)33ElastiCache (Snapshot)34EMR35FSx36Global Accelerator37IAM (Cloud Account, Group, Policy (Customer Managed), Role, User, User Access Key)38Key Management Service39Kinesis40Lambda (Layer)41Neptune42OpenSearch Service43RDS (Aurora, Cluster, Event Subscription, Instance, fSnapshot)44Region45Resource Access Manager (Resource shares, Shared resources)46Route 5347S3 (Access Point)48SAML Identity Provider49Secrets Manager (Secret)50Simple Queue Service51Simple Notification Service (Subscription, Topic)52Step Function State Machine53Storage Gateway54Systems Manager (Document)55Trusted Advisor56VPC (Elastic IP, Elastic Network Interface (ENI), Flow Log, Internet Gateway, NACL/Security Group, NACL/Security Group Rules, NAT Gateway, Network Firewall (Rules, Rule Groups), Peer, Route Table, Subnet)57WAF (Rules, Rule Groups)58WorkSpaces (Instances)
Azure GovCloud Support
Azure GovCloud accounts are onboarded the same way as Azure Commercial accounts. Review Onboard an Azure Cloud Account or Onboard an Azure Organization for more information.
Azure GovCloud Roles
Azure GovCloud Roles
InsightCloudSec offers a couple Azure roles for harvesting resource information found in your Azure accounts and enabling InsightCloudSec features.
Custom GovCloud Reader Role
If you are interested in operating in read-only mode, which prevents InsightCloudSec from taking actions against your Microsoft Azure GovCloud resources, then we recommend using the Custom GovCloud Reader Role. This role grants InsightCloudSec read-only permissions to supported resources so data is harvested and available for reporting. Using this role means you must manually update the role with each new Azure GovCloud service that InsightCloudSec supports.
The JSON file for this role can be obtained from our public S3 bucket. The JSON file includes a placeholder value for the subscription ID. This placeholder value will need to be replaced before implementing the role.
Custom GovCloud Power User Role
If you would like to use InsightCloudSec to manage your Microsoft Azure GovCloud resources directly or through the use of Bots, then use the Custom GovCloud Power User Role. This role will grant InsightCloudSec all permissions to supported resources so it can act upon cloud resources in addition to monitoring and reporting on them. Using this role means you must manually update the role with each new Azure GovCloud service that InsightCloudSec supports.
The JSON file for this role can be obtained from our public S3 bucket. The JSON file includes a placeholder value for the subscription ID. This placeholder value will need to be replaced before implementing the role.
Azure GovCloud Supported Regions
Azure GovCloud Supported Regions
text
1usgovarizona2usgoviowa3usgovtexas4usgovvirginia
Azure GovCloud Supported Services
Azure GovCloud Supported Services
Listed below are all of the Azure GovCloud services (and their components) supported by InsightCloudSec. For resource support, in general if a resource is supported by InsightCloudSec for GovCloud, we support it in any region in which the CSP provides the resource. If you have questions related to Azure or specific services and their support, contact us through the Customer Support Portal.
text
1Activity log (Alerts)2API Management services3App Registration4App Services5App Service plans6Application credentials7Application gateways8Automation Account9Azure Blob Storage10Azure Cache for Redis11Azure Cosmos DB12Azure Database for PostgreSQL/MySQL/MariaDB13Azure Databricks14Azure Files15Azure role assignments16Azure Synapse Analytics17Batch (Accounts, Pools)18Bot services19CDN profile20Cognitive Services (Azure OpenAI, Computer vision, Content moderator, Language service, Language understanding (classic), Personalizer, Speech service, Translator)21Container instances22Container registries (Container Image)23Compute/Network Usage Limit24Data factories25Dedicated SQL pools26DDoS protection plans27Diagnostic settings28Disks29DNS zones30Event Grid (Topics)31Event Hubs32ExpressRoute circuits33Firewall (Rule, Rule Collection)34Front Doors35Function App36HDInsight clusters37IP Groups38Kubernetes services39Load balancers40Log Analytics workspaces41Logic apps42Management groups43Microsoft Defender for Cloud (Security posture recommendations)44Microsoft Entra ID (Group, Service Principal, User)45NAT gateways46Network interfaces47Network security groups (Flow Logs, Security Rules)48Peerings49Policy (Definitions)50Private Link services51Public IP addresses52Region53Resource groups54Role Definition55Route tables (Route)56Service Bus (Queue)57Service Fabric clusters58Shared Image Gallery (Image Definition, Image Version)59SQL Servers60SSL Certificate61Storage accounts62Storage Sync Services63Subscriptions64Traffic Manager65Virtual machine (Dedicated Host, Image)66Virtual machine scale sets67Virtual network (Private Endpoint, Service Endpoint, Service Endpoint Policy Subnet)68Virtual network gateway69Web Application Firewall policies (WAF)