Skip to content

Commit 7a7ca2f

Browse files
authored
Merge pull request #215539 from AlizaBernstein/Understanding-cloudformation
Understanding cloudformation
2 parents 073bcf1 + a41e554 commit 7a7ca2f

File tree

2 files changed

+40
-1
lines changed

2 files changed

+40
-1
lines changed
46.7 KB
Loading

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 40 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Connect your AWS account to Microsoft Defender for Cloud
33
description: Defend your AWS resources with Microsoft Defender for Cloud
44
ms.topic: quickstart
5-
ms.date: 09/20/2022
5+
6+
ms.date: 10/23/2022
67
author: bmansheim
78
ms.author: benmansheim
89
zone_pivot_groups: connect-aws-accounts
@@ -163,6 +164,44 @@ The native cloud connector requires:
163164

164165
Defender for Cloud will immediately start scanning your AWS resources and you'll see security recommendations within a few hours. For a reference list of all the recommendations Defender for Cloud can provide for AWS resources, see [Security recommendations for AWS resources - a reference guide](recommendations-reference-aws.md).
165166

167+
## CloudFormation deployment source
168+
169+
As part of connecting an AWS account to Microsoft Defender for Cloud, a CloudFormation template should be deployed to the AWS account. This CloudFormation template creates all the required resources so Microsoft Defender for Cloud can connect to the AWS account.
170+
171+
The CloudFormation template should be deployed using Stack (or StackSet if you have a management account).
172+
173+
When deploying the CloudFormation template, the Stack creation wizard offers the following options:
174+
175+
:::image type="content" source="media/quickstart-onboard-aws/cloudformation-template.png" alt-text="Screenshot showing stack creation wizard." lightbox="media/quickstart-onboard-aws/cloudformation-template.png":::
176+
177+
1. **Amazon S3 URL** – upload the downloaded CloudFormation template to your own S3 bucket with your own security configurations. Enter the URL to the S3 bucket in the AWS deployment wizard.
178+
179+
1. **Upload a template file** – AWS will automatically create an S3 bucket in which the CloudFormation template will be saved. With this automation, the S3 bucket is created with a security misconfiguration that will result in the security recommendation “S3 buckets should require requests to use Secure Socket Layer”. Apply the following policy to fix this recommendation:
180+
181+
```bash
182+
{
183+
"Id": "ExamplePolicy",
184+
"Version": "2012-10-17",
185+
"Statement": [
186+
{
187+
"Sid": "AllowSSLRequestsOnly",
188+
"Action": "s3:*",
189+
"Effect": "Deny",
190+
"Resource": [
191+
"<S3_Bucket ARN>",
192+
"<S3_Bucket ARN>/*"
193+
],
194+
"Condition": {
195+
"Bool": {
196+
"aws:SecureTransport": "false"
197+
}
198+
},
199+
"Principal": "*"
200+
}
201+
]
202+
}
203+
```
204+
166205
### Remove 'classic' connectors
167206

168207
If you have any existing connectors created with the classic cloud connectors experience, remove them first:

0 commit comments

Comments
 (0)