Skip to Content
InsightcloudsecGovernment Cloud Overview & Support

Government Cloud Overview & Support

After InsightCloudSec is successfully installed, you’re ready to start harvesting resources from your target cloud accounts. This documentation details configuring your Government Cloud (GovCloud) environments to “talk” with InsightCloudSec securely. Review the sections below to determine the best starting point for your environment.

GovCloud in InsightCloudSec: Frequently Asked Questions (FAQ)

What does InsightCloudSec support from GovCloud?

What does InsightCloudSec support from GovCloud?

Review the full list of GovCloud-specific supported services below.

How do I start seeing my GovCloud environments in InsightCloudSec?

How do I start seeing my GovCloud environments in InsightCloudSec?

InsightCloudSec relies on a process called “harvesting” to pull data from various CSPs. Currently, InsightCloudSec only offers setup instructions for a single cloud account in AWS GovCloud. Review AWS Cloud - Onboarding for details.

Can customers running InsightCloudSec in GovCloud (self-hosted) harvest commercial account data/resources?

Can customers running InsightCloudSec in GovCloud (self-hosted) harvest commercial account data/resources?

AWS GovCloud:

Yes, however, customers must use a STS assume role operation instead of a traditional assume role. API calls cannot be made between AWS partitions (commercial/GovCloud/China) until a cross-partition STS assume role operation has been performed.

Can customers running InsightCloudSec in commercial cloud environments (SaaS and self-hosted) harvest GovCloud account data/resources?

Can customers running InsightCloudSec in commercial cloud environments (SaaS and self-hosted) harvest GovCloud account data/resources?

AWS GovCloud:

Yes, however, customers must use a STS assume role operation instead of a traditional assume role. API calls cannot be made between AWS partitions (commercial/GovCloud/China) until a cross-partition STS assume role operation has been performed.

AWS GovCloud Support

AWS GovCloud accounts are onboarded the same way as AWS Commercial accounts. Review Onboard an AWS Cloud Account for more information.

AWS GovCloud Policies

AWS GovCloud Policies

InsightCloudSec offers several different AWS policies for harvesting resource information found in your AWS accounts and enabling InsightCloudSec features. Our universal onboarding experience will implement the appropriate policies automatically, so there’s no need for AWS GovCloud-specific policies. Review AWS Policies for details.

AWS GovCloud Supported Deployment Regions

InsightCloudSec can only be deployed in AWS. For self-hosted customers, InsightCloudSec can be exclusively deployed/hosted in AWS GovCloud, if you so choose. For SaaS customers reach out to support for additional details on deployment.

AWS GovCloud Services

AWS GovCloud Supported Services

Listed below are all of the AWS GovCloud services (and their components) supported by InsightCloudSec. In general if a service is supported by InsightCloudSec for GovCloud, we support it in any region in which the CSP provides the service. If you have questions related to AWS or specific services and their support, contact us through the Customer Support Portal.

Amazon API Gateway (Domain, Key, Stage, Usage Plans) Amazon DocumentDB Amazon QuickSight Amazon SageMaker (Notebook, Training job) Amazon Simple Email Service (Configuration sets, Rules) Amazon Redshift (Snapshot) Amazon Transcription AppStream 2.0 Athena (Workgroup) AWS Auto Scaling (Group) AWS Backup (gateway, Vault) AWS Control Tower (Control, Landing zone) AWS Glue (Connection, Crawler, Data Catalog, Database, Job, Security Configuration) AWS Health Dashboard AWS Organizations AWS Systems Manager (Association, Parameter Store (Parameter), Document) Batch (Compute Environment) Certificate Manager (Private Certificate Authority) CloudFormation (Templates) CloudFront CloudHSM CloudTrail CloudWatch (Alarm, Log Group) Database Migration Service (Endpoint, Replication Instance) DynamoDB EC2 (Amazon EBS Snapshot, Amazon EBS Volume,Instance, Launch Template, Reserved Instance, Resource/Service Limit/Quota, Savings Plans, SSH Key Pairs) EFS Elastic Beanstalk (Application, Environment) Elastic Container Registry (Container Registry) Elastic Container Service/Fargate Elastic Kubernetes Service (Node Group) Elastic Load Balancer (Application Load Balancer, Gateway Load Balancer, Network Load Balancer) ElastiCache (Snapshot) EMR FSx Global Accelerator IAM (Cloud Account, Group, Policy (Customer Managed), Role, User, User Access Key) Key Management Service Kinesis Lambda (Layer) Neptune OpenSearch Service RDS (Aurora, Cluster, Event Subscription, Instance, fSnapshot) Region Resource Access Manager (Resource shares, Shared resources) Route 53 S3 (Access Point) SAML Identity Provider Secrets Manager (Secret) Simple Queue Service Simple Notification Service (Subscription, Topic) Step Function State Machine Storage Gateway Systems Manager (Document) Trusted Advisor VPC (Elastic IP, Elastic Network Interface (ENI), Flow Log, Internet Gateway, NACL/Security Group, NACL/Security Group Rules, NAT Gateway, Network Firewall (Rules, Rule Groups), Peer, Route Table, Subnet) WAF (Rules, Rule Groups) WorkSpaces (Instances)

Azure GovCloud Support

Azure GovCloud accounts are onboarded the same way as Azure Commercial accounts. Review Onboard an Azure Cloud Account or Onboard an Azure Organization for more information.

Azure GovCloud Roles

Azure GovCloud Roles

InsightCloudSec offers a couple Azure roles for harvesting resource information found in your Azure accounts and enabling InsightCloudSec features.

Custom GovCloud Reader Role

If you are interested in operating in read-only mode, which prevents InsightCloudSec from taking actions against your Microsoft Azure GovCloud resources, then we recommend using the Custom GovCloud Reader Role. This role grants InsightCloudSec read-only permissions to supported resources so data is harvested and available for reporting. Using this role means you must manually update the role with each new Azure GovCloud service that InsightCloudSec supports.

The role JSON can be obtained from our public S3 bucket: <https://s3.amazonaws.com/get.divvycloud.com/policies/Azure-GovCloud-Custom-Reader-User-Role.json>. The JSON file includes a placeholder value for the subscription ID. This placeholder value will need to be replaced before implementing the role.

Custom GovCloud Power User Role

If you would like to use InsightCloudSec to manage your Microsoft Azure GovCloud resources directly or through the use of Bots, then use the Custom GovCloud Power User Role. This role will grant InsightCloudSec all permissions to supported resources so it can act upon cloud resources in addition to monitoring and reporting on them. Using this role means you must manually update the role with each new Azure GovCloud service that InsightCloudSec supports.

The role JSON can be obtained from our public S3 bucket: <https://s3.amazonaws.com/get.divvycloud.com/policies/Azure-GovCloud-Power-User-Role.json>. The JSON file includes a placeholder value for the subscription ID. This placeholder value will need to be replaced before implementing the role.

Azure GovCloud Supported Regions

Azure GovCloud Supported Regions

usgovarizona usgoviowa usgovtexas usgovvirginia

Azure GovCloud Supported Services

Azure GovCloud Supported Services

Listed below are all of the Azure GovCloud services (and their components) supported by InsightCloudSec. For resource support, in general if a resource is supported by InsightCloudSec for GovCloud, we support it in any region in which the CSP provides the resource. If you have questions related to Azure or specific services and their support, contact us through the Customer Support Portal.

Activity log (Alerts) API Management services App Registration App Services App Service plans Application credentials Application gateways Automation Account Azure Blob Storage Azure Cache for Redis Azure Cosmos DB Azure Database for PostgreSQL/MySQL/MariaDB Azure Databricks Azure Files Azure role assignments Azure Synapse Analytics Batch (Accounts, Pools) Bot services CDN profile Cognitive Services (Azure OpenAI, Computer vision, Content moderator, Language service, Language understanding (classic), Personalizer, Speech service, Translator) Container instances Container registries (Container Image) Compute/Network Usage Limit Data factories Dedicated SQL pools DDoS protection plans Diagnostic settings Disks DNS zones Event Grid (Topics) Event Hubs ExpressRoute circuits Firewall (Rule, Rule Collection) Front Doors Function App HDInsight clusters IP Groups Kubernetes services Load balancers Log Analytics workspaces Logic apps Management groups Microsoft Defender for Cloud (Security posture recommendations) Microsoft Entra ID (Group, Service Principal, User) NAT gateways Network interfaces Network security groups (Flow Logs, Security Rules) Peerings Policy (Definitions) Private Link services Public IP addresses Region Resource groups Role Definition Route tables (Route) Service Bus (Queue) Service Fabric clusters Shared Image Gallery (Image Definition, Image Version) SQL Servers SSL Certificate Storage accounts Storage Sync Services Subscriptions Traffic Manager Virtual machine (Dedicated Host, Image) Virtual machine scale sets Virtual network (Private Endpoint, Service Endpoint, Service Endpoint Policy Subnet) Virtual network gateway Web Application Firewall policies (WAF)