AWS

05/2024

Overview

Cisco Identity Intelligence can connect directly to AWS environments that use AWS IAM Identity Center and collect data regarding user accounts, activity, and more.

Known Issues

There is currently an issue with the AWS API where user accounts that are disabled in AWS will have their account status returned as active, even though they show as disabled in the AWS IAM console. Currently, CII shows all AWS accounts as unknown due to this issue.

Requirements

This integration requires the following:

  • AWS IAM Identity Center is the replacement for the former AWS Single Sign-on (SSO) functionality (see article). The use of AWS IAM Identity Center is a hard requirement for this integration. User data will not be collected without it.

  • IAM Identity Center is configured for your AWS enterprise account at a parent level (organization), with child AWS accounts managed by that IAM Identity Center instance (example shown below)

  • If IAM Identity Center is configured separately or discreetly with individual AWS account instances, then you will need to set up a CII AWS integration for each account.

AWS Configuration

Note - there are many methods for creating accounts and granting access with AWS IAM. If you have questions or suggestions, please speak with your Oort technical representative.

  1. Navigate to the AWS IAM service in the parent AWS account, where SSO is configured.

  1. Click Create user and then create an Oort integration user object.

  2. Within the Permissions section, create an inline policy type and insert or paste the following JSON into it:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "sso:List*",
                "sso:Describe*",
                "sso:Get*"
            ],
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": [
                "identitystore:List*",
                "identitystore:Describe*"
            ],
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": "cloudtrail:LookupEvents",
            "Resource": "*"
        }
    ]
}
  1. Within the User object page, click the Security Credentials tab

  2. Click Create access key

  1. Select Command Line Interface (CLI) and click the Confirmation box at the bottom of the page

  1. Leave the Set description tag value blank and click Create access key

  2. Copy the Access key name and the Secret for use in the Oort console

Oort Configuration

  1. Within the Integrations tab, click Add Integration and click AWS

  1. Enter a display name for the integration

  2. Enter the AWS region where the IAM service account was created, in us-east-2 format

  3. Enter the Access Key ID

  4. Enter the Access Key secret

  5. Click Save

Test Connectivity

Once saved, on the Integrations page, you can click the 3-dot menu on the right side for your AWS integration and click Test Connectivity.

If successful with a "Connected" message in the lower left of the screen, you can click the 3-dot menu again and select Collect Now to begin collection.

Last updated