|
2 | 2 | title: Connect your AWS account to Microsoft Defender for Cloud
|
3 | 3 | description: Defend your AWS resources with Microsoft Defender for Cloud
|
4 | 4 | ms.topic: quickstart
|
5 |
| -ms.date: 09/20/2022 |
| 5 | + |
| 6 | +ms.date: 10/23/2022 |
6 | 7 | author: bmansheim
|
7 | 8 | ms.author: benmansheim
|
8 | 9 | zone_pivot_groups: connect-aws-accounts
|
@@ -163,6 +164,44 @@ The native cloud connector requires:
|
163 | 164 |
|
164 | 165 | Defender for Cloud will immediately start scanning your AWS resources and you'll see security recommendations within a few hours. For a reference list of all the recommendations Defender for Cloud can provide for AWS resources, see [Security recommendations for AWS resources - a reference guide](recommendations-reference-aws.md).
|
165 | 166 |
|
| 167 | +## CloudFormation deployment source |
| 168 | + |
| 169 | +As part of connecting an AWS account to Microsoft Defender for Cloud, a CloudFormation template should be deployed to the AWS account. This CloudFormation template creates all the required resources so Microsoft Defender for Cloud can connect to the AWS account. |
| 170 | + |
| 171 | +The CloudFormation template should be deployed using Stack (or StackSet if you have a management account). |
| 172 | + |
| 173 | +When deploying the CloudFormation template, the Stack creation wizard offers the following options: |
| 174 | + |
| 175 | +:::image type="content" source="media/quickstart-onboard-aws/cloudformation-template.png" alt-text="Screenshot showing stack creation wizard." lightbox="media/quickstart-onboard-aws/cloudformation-template.png"::: |
| 176 | + |
| 177 | +1. **Amazon S3 URL** – upload the downloaded CloudFormation template to your own S3 bucket with your own security configurations. Enter the URL to the S3 bucket in the AWS deployment wizard. |
| 178 | + |
| 179 | +1. **Upload a template file** – AWS will automatically create an S3 bucket in which the CloudFormation template will be saved. With this automation, the S3 bucket is created with a security misconfiguration that will result in the security recommendation “S3 buckets should require requests to use Secure Socket Layer”. Apply the following policy to fix this recommendation: |
| 180 | + |
| 181 | +```bash |
| 182 | +{ |
| 183 | + "Id": "ExamplePolicy", |
| 184 | + "Version": "2012-10-17", |
| 185 | + "Statement": [ |
| 186 | + { |
| 187 | + "Sid": "AllowSSLRequestsOnly", |
| 188 | + "Action": "s3:*", |
| 189 | + "Effect": "Deny", |
| 190 | + "Resource": [ |
| 191 | + "<S3_Bucket ARN>", |
| 192 | + "<S3_Bucket ARN>/*" |
| 193 | + ], |
| 194 | + "Condition": { |
| 195 | + "Bool": { |
| 196 | + "aws:SecureTransport": "false" |
| 197 | + } |
| 198 | + }, |
| 199 | + "Principal": "*" |
| 200 | + } |
| 201 | + ] |
| 202 | +} |
| 203 | +``` |
| 204 | + |
166 | 205 | ### Remove 'classic' connectors
|
167 | 206 |
|
168 | 207 | If you have any existing connectors created with the classic cloud connectors experience, remove them first:
|
|
0 commit comments