You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-aws-connector.md
+43-49Lines changed: 43 additions & 49 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,37 +12,32 @@ To protect your AWS-based resources, you must [connect your AWS account](quickst
12
12
-[**Cloud Security Posture Management (CSPM)**](overview-page.md) assesses your AWS resources according to AWS-specific security recommendations and reflects your security posture in your secure score. The [asset inventory](asset-inventory.md) gives you one place to see all of your protected AWS resources. The [regulatory compliance dashboard](regulatory-compliance-dashboard.md) shows your compliance with built-in standards specific to AWS, including AWS CIS, AWS PCI DSS, and AWS Foundational Security Best Practices.
13
13
14
14
-[**Microsoft Defender for Servers**](defender-for-servers-introduction.md) brings threat detection and advanced defenses to [supported Windows and Linux EC2 instances](supported-machines-endpoint-solutions-clouds-servers.md?tabs=tab/features-multicloud).
15
-
15
+
16
16
-[**Microsoft Defender for Containers**](defender-for-containers-introduction.md) brings threat detection and advanced defenses to [supported Amazon EKS clusters](supported-machines-endpoint-solutions-clouds-containers.md).
17
17
18
18
-[**Microsoft Defender for SQL**](defender-for-sql-introduction.md) brings threat detection and advanced defenses to your SQL Servers running on AWS EC2, AWS RDS Custom for SQL Server.
19
19
20
-
The retired **Classic cloud connector** - Requires you to configure your AWS account to create a user that Defender for Cloud can use to connect to your AWS environment. The classic connector is only available to customers who have previously connected AWS accounts with it.
21
-
22
-
> [!NOTE]
23
-
> If you are connecting an AWS account that was previously connected with the classic connector, you must [remove them](how-to-use-the-classic-connector.md#remove-classic-aws-connectors) first. Using an AWS account that is connected by both the classic and native connectors can produce duplicate recommendations.
24
-
25
20
## AWS authentication process
26
21
27
22
Federated authentication is used between Microsoft Defender for Cloud and AWS. All of the resources related to the authentication are created as a part of the CloudFormation template deployment, including:
28
23
29
-
- An identity provider (OpenID connect)
24
+
- An identity provider (OpenID connect)
30
25
- Identity and Access Management (IAM) roles with a federated principal (connected to the identity providers).
31
26
32
27
The architecture of the authentication process across clouds is as follows:
33
28
34
29
:::image type="content" source="media/quickstart-onboard-aws/architecture-authentication-across-clouds.png" alt-text="Diagram showing architecture of authentication process across clouds." lightbox="media/quickstart-onboard-aws/architecture-authentication-across-clouds.png":::
35
30
36
-
1. Microsoft Defender for Cloud CSPM service acquires a Microsoft Entra token with a validity life time of 1 hour that is signed by the Microsoft Entra ID using the RS256 algorithm.
31
+
1. Microsoft Defender for Cloud CSPM service acquires a Microsoft Entra token with a validity life time of 1 hour that is signed by the Microsoft Entra ID using the RS256 algorithm.
37
32
38
33
1. The Microsoft Entra token is exchanged with AWS short living credentials and Defender for Cloud's CSPM service assumes the CSPM IAM role (assumed with web identity).
39
34
40
35
1. Since the principal of the role is a federated identity as defined in a trust relationship policy, the AWS identity provider validates the Microsoft Entra token against the Microsoft Entra ID through a process that includes:
41
36
- audience validation
42
-
- token digital signature validation
37
+
- token digital signature validation
43
38
- certificate thumbprint
44
39
45
-
1. The Microsoft Defender for Cloud CSPM role is assumed only after the validation conditions defined at the trust relationship have been met. The conditions defined for the role level are used for validation within AWS and allows only the Microsoft Defender for Cloud CSPM application (validated audience) access to the specific role (and not any other Microsoft token).
40
+
1. The Microsoft Defender for Cloud CSPM role is assumed only after the validation conditions defined at the trust relationship have been met. The conditions defined for the role level are used for validation within AWS and allows only the Microsoft Defender for Cloud CSPM application (validated audience) access to the specific role (and not any other Microsoft token).
46
41
47
42
1. After the Microsoft Entra token is validated by the AWS identity provider, the AWS STS exchanges the token with AWS short-living credentials which the CSPM service uses to scan the AWS account.
48
43
@@ -63,56 +58,56 @@ Each plan has its own requirements for the native connector.
63
58
- An active AWS account, with EC2 instances running SQL server or RDS Custom for SQL Server.
64
59
65
60
- Azure Arc for servers installed on your EC2 instances/RDS Custom for SQL Server.
66
-
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
61
+
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
62
+
63
+
Auto provisioning managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent preinstalled. If you already have the SSM agent preinstalled, the AMIs are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you need to install it using either of the following relevant instructions from Amazon:
67
64
68
-
Auto provisioning managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent preinstalled. If you already have the SSM agent preinstalled, the AMIs are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you need to install it using either of the following relevant instructions from Amazon:
69
-
70
-
- [Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
65
+
-[Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
66
+
67
+
> [!NOTE]
68
+
> To enable the Azure Arc auto-provisioning, you'll need **Owner** permission on the relevant Azure subscription.
71
69
72
-
> [!NOTE]
73
-
> To enable the Azure Arc auto-provisioning, you'll need **Owner** permission on the relevant Azure subscription.
74
-
75
70
- Other extensions should be enabled on the Arc-connected machines:
76
-
- Microsoft Defender for Endpoint
77
-
- VA solution (TVM/Qualys)
78
-
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA)
71
+
- Microsoft Defender for Endpoint
72
+
- VA solution (TVM/Qualys)
73
+
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA)
74
+
75
+
Make sure the selected LA workspace has security solution installed. The LA agent and AMA are currently configured in the subscription level. All of your AWS accounts and GCP projects under the same subscription inherit the subscription settings for the LA agent and AMA.
79
76
80
-
Make sure the selected LA workspace has security solution installed. The LA agent and AMA are currently configured in the subscription level. All of your AWS accounts and GCP projects under the same subscription inherit the subscription settings for the LA agent and AMA.
81
-
82
-
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
77
+
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
83
78
84
79
### Defender for Servers plan
85
-
80
+
86
81
- Microsoft Defender for Servers enabled on your subscription. Learn how to [enable plans](enable-all-plans.md).
87
-
82
+
88
83
- An active AWS account, with EC2 instances.
89
-
90
-
- Azure Arc for servers installed on your EC2 instances.
91
-
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
92
-
93
-
Auto provisioning managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent preinstalled. If that is the case, their AMIs are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you need to install it using either of the following relevant instructions from Amazon:
94
-
95
-
- [Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
96
-
97
-
- [Install SSM Agent for a hybrid environment (Linux)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-linux.html)
98
-
99
-
> [!NOTE]
100
-
> To enable the Azure Arc auto-provisioning, you'll need an **Owner** permission on the relevant Azure subscription.
101
-
102
-
- If you want to manually install Azure Arc on your existing and future EC2 instances, use the [EC2 instances should be connected to Azure Arc](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/231dee23-84db-44d2-bd9d-c32fbcfb42a3) recommendation to identify instances that don't have Azure Arc installed.
103
-
84
+
85
+
- Azure Arc for servers installed on your EC2 instances.
86
+
- (Recommended) Use the auto provisioning process to install Azure Arc on all of your existing and future EC2 instances.
87
+
88
+
Auto provisioning managed by AWS Systems Manager (SSM) using the SSM agent. Some Amazon Machine Images (AMIs) already have the SSM agent preinstalled. If that is the case, their AMIs are listed in [AMIs with SSM Agent preinstalled](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent). If your EC2 instances don't have the SSM Agent, you need to install it using either of the following relevant instructions from Amazon:
89
+
90
+
-[Install SSM Agent for a hybrid environment (Windows)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-win.html)
91
+
92
+
-[Install SSM Agent for a hybrid environment (Linux)](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-install-managed-linux.html)
93
+
94
+
> [!NOTE]
95
+
> To enable the Azure Arc auto-provisioning, you'll need an **Owner** permission on the relevant Azure subscription.
96
+
97
+
- If you want to manually install Azure Arc on your existing and future EC2 instances, use the [EC2 instances should be connected to Azure Arc](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/231dee23-84db-44d2-bd9d-c32fbcfb42a3) recommendation to identify instances that don't have Azure Arc installed.
98
+
104
99
- Other extensions should be enabled on the Arc-connected machines:
105
-
- Microsoft Defender for Endpoint
106
-
- VA solution (TVM/Qualys)
107
-
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA)
100
+
- Microsoft Defender for Endpoint
101
+
- VA solution (TVM/Qualys)
102
+
- Log Analytics (LA) agent on Arc machines or Azure Monitor agent (AMA)
108
103
109
-
Make sure the selected LA workspace has security solution installed. The LA agent and AMA are currently configured in the subscription level. All of your AWS accounts and GCP projects under the same subscription inherit the subscription settings for the LA agent and AMA.
104
+
Make sure the selected LA workspace has security solution installed. The LA agent and AMA are currently configured in the subscription level. All of your AWS accounts and GCP projects under the same subscription inherit the subscription settings for the LA agent and AMA.
110
105
111
-
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
106
+
Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
112
107
113
-
> [!NOTE]
114
-
> Defender for Servers assigns tags to your AWS resources to manage the auto-provisioning process. You must have these tags properly assigned to your resources so that Defender for Cloud can manage your resources:
> Defender for Servers assigns tags to your AWS resources to manage the auto-provisioning process. You must have these tags properly assigned to your resources so that Defender for Cloud can manage your resources:
0 commit comments