Create a Microsoft Azure Connection for Cloud Configuration Assessment (CCA)
CCA End-of-Life Notice
As of February 15, 2024, Rapid7 will start the End-of-Life (EOL) process for Cloud Configuration Assessment. On February 15, 2025 support will officially end and the feature will be permanently removed from InsightVM for all customers.
While we will continue to support this feature in the interim with security patches, we will not be updating or enhancing CCA further. See our Cloud Risk Complete offering if you’re still interested in the capabilities of CCA.
You can configure a Microsoft Azure connection that allows the Insight Platform to collect data from your Azure resources for Cloud Configuration Assessment (CCA).
Fields subject to change
Third party UI elements may be subject to change. Updates to the doc will be made accordingly.
Azure connection requirements
In order for the Insight Platform to connect to your Azure resources, you must have the following:
- An Azure account with appropriate permissions to create/modify Active Directory Applications and roles
Note
You must create a new cloud infrastructure connection for each individual Azure subscription you want to assess.
Configure Azure
Log in to the Azure portal.
Add a new application registration
- Select Azure Active Directory > App registrations > New registration.
- Enter the required information:
- We recommend using a Name that denotes that this app is used for InsightVM.
- Select the supported account type. The default value (single tenant) is sufficient.
- The Redirect URI settings are optional and are not used for CCA.
- Click Register.
- On the following page, copy the Application (client) ID and the Directory (tenant) ID values for later.
Create a secret key for your application
- On the overview page for the application you created, select Certificates & secrets and click New client secret.
- Enter a description and set an expiration date for your secret.
- Click Add.
Copy the secret key
Copy and store the client secret value before leaving this page in the Azure portal. This is the only time you can view this information.
Set up your API permissions
- On the overview page for your application, select API permissions > Add a permission.
- Click Microsoft Graph.
- Select Application permissions as the required permissions for your application.
- In the Directory section, select Directory.Read.All.
- Click Add Permissions.
- On the API permissions page, click the Grant admin consent button and then click Yes.
Associate your application with a subscription and assign roles
- From the Azure portal menu, select All services > Subscriptions.
- Select the subscription you want to associate with your application. Copy the Subscription ID for later.
- Select Access control (IAM), and click Add > Add custom role.
- Enter a name for the custom role and click Next.
- We recommend using a name that indicates the purpose of this role, such as
CCA Reader Plus
. You need to search for this role later in the setup process, so make note of the name that you choose.
- We recommend using a name that indicates the purpose of this role, such as
- Click Add permissions.
- Search for the following permissions and add each one:
- Microsoft.Web/sites/config/list/Action
- Microsoft.Web/sites/slots/config/list/Action
- Microsoft.Storage/storageAccounts/listkeys/action
- Click Review + create > Create.
- On the Access control (IAM) page, click Add > Add role assignment.
- In the Role field, search for your custom role, select it, and click Next.
- With User, group, or service principal checked, click Select Members.
- In the Select field, add your application and click Select.
- Click Next and then Review + Assign.
- Repeat the Add role assignment process (steps 8 - 12) to assign the Reader role to your application.
Configure InsightVM
Create an Azure connection
- On the Cloud Configuration page, click Add/Manage Connections.
- In the Cloud Infrastructure section, click Add.
- Enter an Account Nickname.
- This is the name for the connection you are creating in InsightVM. We recommend creating a nickname to help you easily identify the Azure account/subscription that is being assessed.
- Enter the following information from Azure:
- API Key – The value that you copied when creating the Client secret key.
- Directory (tenant) ID – The Azure AD tenant ID for your app registration.
- Application (client) ID – The Azure AD application ID for your app registration.
- Subscription ID – The ID of your Azure subscription that your application is associated with.
- Click Save.