Government Cloud Overview & Support
After InsightCloudSec is successfully installed, you're ready to start harvesting resources from your target cloud accounts. This documentation details configuring your Government Cloud (GovCloud) environments to "talk" with InsightCloudSec securely. Review the sections below to determine the best starting point for your environment.
GovCloud in InsightCloudSec: Frequently Asked Questions (FAQ)
What does InsightCloudSec support from GovCloud?
What does InsightCloudSec support from GovCloud?
Review the full list of GovCloud-specific supported services on the Government Cloud Support Reference page.
How do I start seeing my GovCloud environment(s) in InsightCloudSec?
How do I start seeing my GovCloud environment(s) in InsightCloudSec?
InsightCloudSec relies on a process called "harvesting" to pull data from various CSPs. Currently, InsightCloudSec only offers setup instructions for a single cloud account in AWS GovCloud. Review AWS Cloud - Onboarding for details.
Can customers running InsightCloudSec in GovCloud (self-hosted) harvest commercial account data/resources?
Can customers running InsightCloudSec in GovCloud (self-hosted) harvest commercial account data/resources?
AWS GovCloud
Yes, however, customers must use a STS assume role operation instead of a traditional assume role. API calls cannot be made between AWS partitions (commercial/GovCloud/China) until a cross-partition STS assume role operation has been performed.
Can customers running InsightCloudSec in commercial cloud environments (SaaS and self-hosted) harvest GovCloud account data/resources?
Can customers running InsightCloudSec in commercial cloud environments (SaaS and self-hosted) harvest GovCloud account data/resources?
AWS GovCloud
Yes, however, customers must use a STS assume role operation instead of a traditional assume role. API calls cannot be made between AWS partitions (commercial/GovCloud/China) until a cross-partition STS assume role operation has been performed.
AWS GovCloud Support
AWS GovCloud accounts are onboarded the same way as AWS Commercial accounts. Review Onboard an AWS Cloud Account for more information.
AWS GovCloud Policies
AWS GovCloud Policies
InsightCloudSec offers several different AWS policies for harvesting resource information found in your AWS accounts and enabling InsightCloudSec features. Our universal onboarding experience will implement the appropriate policies automatically, so there's no need for AWS GovCloud-specific policies. Review AWS Policies for details.
AWS GovCloud Supported Deployment Regions
InsightCloudSec can only be deployed in AWS. For self-hosted customers, InsightCloudSec can be exclusively deployed/hosted in AWS GovCloud, if you so choose. For SaaS customers reach out to support for additional details on deployment.
AWS GovCloud Services
AWS GovCloud Supported Services
Listed below are all of the AWS GovCloud services (and their components) supported by InsightCloudSec. In general if a service is supported by InsightCloudSec for GovCloud, we support it in any region in which the CSP provides the service. If you have questions related to AWS or specific services and their support, contact us through the Customer Support Portal.
text
1Amazon API Gateway (Domain, Key, Stage, Usage Plans)2Amazon DocumentDB3Amazon QuickSight4Amazon SageMaker (Notebook, Training job)5Amazon Simple Email Service (Configuration sets, Rules)6Amazon Redshift (Snapshot)7Amazon Transcription8AppStream 2.09Athena (Workgroup)10AWS Auto Scaling (Group)11AWS Backup (gateway, Vault)12AWS Glue (Data Catalog, Database, Security Configuration)13AWS Health Dashboard14AWS Organizations15Batch (Compute Environment)16Certificate Manager (Private Certificate Authority)17CloudFormation (Templates)18CloudFront19CloudHSM20CloudTrail21CloudWatch (Alarm, Log Group)22Database Migration Service (Endpoint, Replication Instance)23DynamoDB24EC2 (Amazon EBS Snapshot, Amazon EBS Volume,Instance, Launch Template, Reserved Instance, Resource/Service Limit/Quota, Savings Plans, SSH Key Pairs)25EFS26Elastic Beanstalk (Application, Environment)27Elastic Container Registry (Container Registry)28Elastic Container Service/Fargate29Elastic Kubernetes Service (Node Group)30Elastic Load Balancer (Application Load Balancer, Gateway Load Balancer, Network Load Balancer)31ElastiCache (Snapshot)32EMR33FSx34Global Accelerator35IAM (Cloud Account, Group, Policy (Customer Managed), Role, User, User Access Key)36Key Management Service37Kinesis38Lambda (Layer)39Neptune40OpenSearch Service41RDS (Aurora, Cluster, Event Subscription, Instance, fSnapshot)42Region43Route 5344S3 (Access Point)45SAML Identity Provider46Secrets Manager (Secret)47Simple Queue Service48Simple Notification Service (Subscription, Topic)49Step Function State Machine50Storage Gateway51Systems Manager (Document)52Trusted Advisor53VPC (Elastic IP, Elastic Network Interface (ENI), Flow Log, Internet Gateway, NACL/Security Group, NACL/Security Group Rules, NAT Gateway, Peer, Route Table, Subnet)54WAF55WorkSpaces (Instances)
Azure GovCloud Support
Azure GovCloud accounts are onboarded the same way as Azure Commercial accounts. Review Onboard an Azure Cloud Account or Onboard an Azure Organization for more information.
Azure GovCloud Roles
Azure GovCloud Roles
InsightCloudSec offers a couple Azure roles for harvesting resource information found in your Azure accounts and enabling InsightCloudSec features.
Custom GovCloud Reader Role
If you are interested in operating in read-only mode, which prevents InsightCloudSec from taking actions against your Microsoft Azure GovCloud resources, then we recommend using the Custom GovCloud Reader Role. This role grants InsightCloudSec read-only permissions to supported resources so data is harvested and available for reporting. Using this role means you must manually update the role with each new Azure GovCloud service that InsightCloudSec supports.
The JSON file for this role can be obtained from our public S3 bucket. The JSON file includes a placeholder value for the subscription ID. This placeholder value will need to be replaced before implementing the role.
Custom GovCloud Power User Role
If you would like to use InsightCloudSec to manage your Microsoft Azure GovCloud resources directly or through the use of Bots, then use the Custom GovCloud Power User Role. This role will grant InsightCloudSec all permissions to supported resources so it can act upon cloud resources in addition to monitoring and reporting on them. Using this role means you must manually update the role with each new Azure GovCloud service that InsightCloudSec supports.
The JSON file for this role can be obtained from our public S3 bucket. The JSON file includes a placeholder value for the subscription ID. This placeholder value will need to be replaced before implementing the role.
Azure GovCloud Supported Regions
Azure GovCloud Supported Regions
text
1usgovarizona2usgoviowa3usgovtexas4usgovvirginia
Azure GovCloud Supported Services
Azure GovCloud Supported Services
Listed below are all of the Azure GovCloud services (and their components) supported by InsightCloudSec. For resource support, in general if a resource is supported by InsightCloudSec for GovCloud, we support it in any region in which the CSP provides the resource. If you have questions related to Azure or specific services and their support, contact us through the Customer Support Portal.
text
1Activity log (Alerts)2API Management services3App Registration4App Services5App Service plans6Application credentials7Application gateways8Automation Account9Azure Active Directory (Group, Service Principal, User)10Azure Blob Storage11Azure Cache for Redis12Azure Cosmos DB13Azure Database for PostgreSQL/MySQL/MariaDB14Azure Databricks15Azure Files16Azure role assignments17Azure Synapse Analytics18Batch (Accounts, Pools)19Bot services20CDN profile21Cognitive Services (Azure OpenAI, Computer vision, Content moderator, Language service, Language understanding (classic), Personalizer, Speech service, Translator)22Container instances23Container registries (Container Image)24Compute/Network Usage Limit25Data factories26Dedicated SQL pools27DDoS protection plans28Diagnostic settings29Disks30DNS zones31Event Grid (Topics)32Event Hubs33ExpressRoute circuits34Firewall (Rule, Rule Collection)35Front Doors36Function App37HDInsight clusters38IP Groups39Kubernetes services40Load balancers41Log Analytics workspaces42Logic apps43Management groups44Microsoft Defender for Cloud (Security posture recommendations)45NAT gateways46Network interfaces47Network security groups (Flow Logs, Security Rules)48Peerings49Policy (Definitions)50Private Link services51Public IP addresses52Region53Resource groups54Role Definition55Route tables (Route)56Service Bus (Queue)57Service Fabric clusters58Shared Image Gallery (Image Definition, Image Version)59SQL Servers60SSL Certificate61Storage accounts62Storage Sync Services63Subscriptions64Traffic Manager65Virtual machine (Dedicated Host, Image)66Virtual machine scale sets67Virtual network (Private Endpoint, Service Endpoint, Service Endpoint Policy Subnet)68Virtual network gateway