Skip to content

Commit 597747e

Browse files
authored
Merge pull request #202092 from ElazarK/cspm-required-permissions
added requirements
2 parents bc7f613 + 9a86499 commit 597747e

File tree

1 file changed

+50
-5
lines changed

1 file changed

+50
-5
lines changed

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 50 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Connect your AWS account to Microsoft Defender for Cloud
33
description: Defend your AWS resources with Microsoft Defender for Cloud
44
ms.topic: quickstart
5-
ms.date: 06/15/2022
5+
ms.date: 06/19/2022
66
zone_pivot_groups: connect-aws-accounts
77
ms.custom: mode-other
88
---
@@ -87,7 +87,7 @@ You can learn more from the product manager about Microsoft Defender for Cloud's
8787
> [!NOTE]
8888
> To enable the Azure Arc auto-provisioning, you'll need an **Owner** permission on the relevant Azure subscription.
8989
90-
- If you want to manually install Azure Arc on your existing and future EC2 instances, use the [EC2 instances should be connected to Azure Arc](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/231dee23-84db-44d2-bd9d-c32fbcfb42a3) recommendation to identify instances that do not have Azure Arc installed.
90+
- If you want to manually install Azure Arc on your existing and future EC2 instances, use the [EC2 instances should be connected to Azure Arc](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/231dee23-84db-44d2-bd9d-c32fbcfb42a3) recommendation to identify instances that don't have Azure Arc installed.
9191

9292
- Additional extensions should be enabled on the Arc-connected machines.
9393
- Microsoft Defender for Endpoint
@@ -154,7 +154,7 @@ If you have any existing connectors created with the classic cloud connectors ex
154154

155155
- (Optional) Select **Configure**, to edit the configuration as required.
156156

157-
1. By default the **Containers** plan is set to **On**. This is necessary to have Defender for Containers protect your AWS EKS clusters. Ensure you have fulfilled the [network requirements](./defender-for-containers-enable.md?pivots=defender-for-container-eks&source=docs&tabs=aks-deploy-portal%2ck8s-deploy-asc%2ck8s-verify-asc%2ck8s-remove-arc%2caks-removeprofile-api#network-requirements) for the Defender for Containers plan.
157+
1. By default the **Containers** plan is set to **On**. This is necessary to have Defender for Containers protect your AWS EKS clusters. Ensure you've fulfilled the [network requirements](./defender-for-containers-enable.md?pivots=defender-for-container-eks&source=docs&tabs=aks-deploy-portal%2ck8s-deploy-asc%2ck8s-verify-asc%2ck8s-remove-arc%2caks-removeprofile-api#network-requirements) for the Defender for Containers plan.
158158

159159
> [!Note]
160160
> Azure Arc-enabled Kubernetes, the Defender Arc extension, and the Azure Policy Arc extension should be installed. Use the dedicated Defender for Cloud recommendations to deploy the extensions (and Arc, if necessary) as explained in [Protect Amazon Elastic Kubernetes Service clusters](defender-for-containers-enable.md?tabs=defender-for-container-eks).
@@ -170,7 +170,7 @@ If you have any existing connectors created with the classic cloud connectors ex
170170

171171
1. Download the CloudFormation template.
172172

173-
1. Using the downloaded CloudFormation template, create the stack in AWS as instructed on screen. If you are onboarding a management account, you'll need to run the CloudFormation template both as Stack and as StackSet. Connectors will be created for the member accounts up to 24 hours after the onboarding.
173+
1. Using the downloaded CloudFormation template, create the stack in AWS as instructed on screen. If you're onboarding a management account, you'll need to run the CloudFormation template both as Stack and as StackSet. Connectors will be created for the member accounts up to 24 hours after the onboarding.
174174

175175
1. Select **Next: Review and generate**.
176176

@@ -346,6 +346,51 @@ For other operating systems, the SSM Agent should be installed manually using th
346346
- [Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
347347
- [Install SSM Agent for a hybrid environment (Linux)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-linux.html)
348348

349+
### For the CSPM plan, what IAM permissions are needed to discover AWS resources?
350+
351+
The following IAM permissions are needed to discover AWS resources:
352+
353+
| DataCollector | AWS Permissions |
354+
|--|--|
355+
| API Gateway | apigateway:GET |
356+
| Application Auto Scaling | application-autoscaling:Describe* |
357+
| Auto scaling | autoscaling-plans:Describe* <br> autoscaling:Describe* |
358+
| Certificate manager | acm-pca:Describe* <br> acm-pca:List* <br> acm:Describe* <br>acm:List* |
359+
| CloudFormation | cloudformation:Describe* <br> cloudformation:List* |
360+
| CloudFront | cloudfront:DescribeFunction <br> cloudfront:GetDistribution <br> cloudfront:GetDistributionConfig <br>cloudfront:List* |
361+
| CloudTrail | cloudtrail:Describe* <br> cloudtrail:GetEventSelectors <br> cloudtrail:List* <br> cloudtrail:LookupEvents |
362+
| CloudWatch | cloudwatch:Describe* <br> cloudwatch:List* |
363+
| CloudWatch logs | logs:DescribeLogGroups <br> logs:DescribeMetricFilters |
364+
| CodeBuild | codebuild:DescribeCodeCoverages <br> codebuild:DescribeTestCases <br> codebuild:List* |
365+
| Config Service | config:Describe* <br> config:List* |
366+
| DMS – database migration service | dms:Describe* <br> dms:List* |
367+
| DAX | dax:Describe* |
368+
| DynamoDB | dynamodb:Describe* <br> dynamodb:List* |
369+
| Ec2 | ec2:Describe* <br> ec2:GetEbsEncryptionByDefault |
370+
| ECR | ecr:Describe* <br> ecr:List* |
371+
| ECS | ecs:Describe* <br> ecs:List* |
372+
| EFS | elasticfilesystem:Describe* |
373+
| EKS | eks:Describe* <br> eks:List* |
374+
| Elastic Beanstalk | elasticbeanstalk:Describe* <br> elasticbeanstalk:List* |
375+
| ELB – elastic load balancing (v1/2) | elasticloadbalancing:Describe* |
376+
| Elastic search | es:Describe* <br> es:List* |
377+
| EMR – elastic map reduce | elasticmapreduce:Describe* <br> elasticmapreduce:GetBlockPublicAccessConfiguration <br> elasticmapreduce:List* <br> elasticmapreduce:View* |
378+
| GuardDute | guardduty:DescribeOrganizationConfiguration <br> guardduty:DescribePublishingDestination <br> guardduty:List* |
379+
| IAM | iam:Generate* <br> iam:Get* <br> iam:List*<br> iam:Simulate* |
380+
| KMS | kms:Describe* <br> kms:List* |
381+
| LAMDBA | lambda:GetPolicy <br> lambda:List* |
382+
| Network firewall | network-firewall:DescribeFirewall <br> network-firewall:DescribeFirewallPolicy <br> network-firewall:DescribeLoggingConfiguration <br> network-firewall:DescribeResourcePolicy <br> network-firewall:DescribeRuleGroup <br> network-firewall:DescribeRuleGroupMetadata <br> network-firewall:ListFirewallPolicies <br> network-firewall:ListFirewalls <br> network-firewall:ListRuleGroups <br> network-firewall:ListTagsForResource |
383+
| RDS | rds:Describe* <br> rds:List* |
384+
| RedShift | redshift:Describe* |
385+
| S3 and S3Control | s3:DescribeJob <br> s3:GetEncryptionConfiguration <br> s3:GetBucketPublicAccessBlock <br> s3:GetBucketTagging <br> s3:GetBucketLogging <br> s3:GetBucketAcl <br> s3:GetBucketLocation <br> s3:GetBucketPolicy <br> s3:GetReplicationConfiguration <br> s3:GetAccountPublicAccessBlock <br> s3:GetObjectAcl <br> s3:GetObjectTagging <br> s3:List* |
386+
| SageMaker | sagemaker:Describe* <br> sagemaker:GetSearchSuggestions <br> sagemaker:List* <br> sagemaker:Search |
387+
| Secret manager | secretsmanager:Describe* <br> secretsmanager:List* |
388+
| Simple notification service – SNS | sns:Check* <br> sns:List* |
389+
| SSM | ssm:Describe* <br> ssm:List* |
390+
| SQS | sqs:List* <br> sqs:Receive* |
391+
| STS | sts:GetCallerIdentity |
392+
| WAF | waf-regional:Get* <br> waf-regional:List* <br> waf:List* <br> wafv2:CheckCapacity <br> wafv2:Describe* <br> wafv2:List* |
393+
349394
## Learn more
350395

351396
You can check out the following blogs:
@@ -359,4 +404,4 @@ You can check out the following blogs:
359404
Connecting your AWS account is part of the multicloud experience available in Microsoft Defender for Cloud. For related information, see the following page:
360405

361406
- [Security recommendations for AWS resources - a reference guide](recommendations-reference-aws.md).
362-
- [Connect your GCP projects to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)
407+
- [Connect your GCP projects to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)

0 commit comments

Comments
 (0)