AWS
Step to Generate Credentials for AWS
- Login to AWS Management Console
- Click Users under Access Management on the Left Panel
- Click Create User on the top
- Fill in the User name as you like
- In Set permissions, choose Attach policies directly
- Search SecurityAudit in the Search Bar and tickSecurityAudit below
- Click Next, confirm all the setting, then click Create user to continue
- In the User page, click on the user name of the new user, and enter the user detail page
- Click Security Credentials
- Scroll down. In the Access Key, click Create Access Key
- Tick Third Party Service
- Go to Step 3, click Download .csv File to download the Access Key Id and Secret Access Key
Existing Functionalities
info
Go to API Reference to see the list of APIs.
- List EC2 regions
- List all regions
GET /api/v1/aws/ec2/regions
- List all enabled regions
GET /api/v1/aws/ec2/regions/enabled
- List all regions
- List ec2 data for specific region
GET /api/v1/aws/ec2
(Note: current handler islistEC2Handler
)- Returned information includes
- information about EC2 instances, security groups, and key pairs
- list of subnets using the provided AWS session
- list of VPCs using the provided AWS session
- list of EBS volumes using the provided AWS session.
- Returned information includes
- List common data for all regions
GET /api/v1/aws/ec2/all
(Note: current handler islistAllEC2Handler
)- Returned information includes
- information about EC2 instances, security groups, and key pairs
- list of subnets using the provided AWS session
- list of VPCs using the provided AWS session
- list of VPCs using the provided AWS session
- Returned information includes
- List S3 buckets for a specific region
GET /api/v1/aws/s3
- List EBS volumes for a specific region
GET /api/v1/aws/ebs
- List IAM information
- List all IAM information for a specific region
GET /api/v1/aws/iam
- List IAM users for a specific region
GET /api/v1/aws/iam/users
- List IAM roles for a specific region
GET /api/v1/aws/iam/roles
- List IAM policies for a specific region
GET /api/v1/aws/iam/policies
- List IAM groups for a specific region
GET /api/v1/aws/iam/groups
- List all IAM information for a specific region
- List KMS information
- List KMS keys for a specific region
GET /api/v1/aws/kms/keys
- List KMS keys for all regions
GET /api/v1/aws/kms/keys/all
- List KMS keys for a specific region
- List all AWS information
- List all AWS information for all regions
GET /api/v1/aws
- List all AWS information for all regions
- List K8s information
- List all K8s information for all regions
GET /api/v1/aws/k8s
- List all K8s information for all regions
AWS Account Required Permissions
Read permission on the following resources:
- Amazon EC2
- AWS Identity and Access Management
- Amazon S3
- Amazon EC2 Instance Connect
- Amazon Elastic Kubernetes Service
- AWS Key Management Service
There are predefined roles on AWS that have these permissions. You can use them directly. The naming convention is usually [ServiceName]ReadOnlyAccess
More Specific Information
warning
Work in Progress
Service | Required Permissions |
---|---|
To create access keys | iam:UpdateAccessKey , iam:CreateAccessKey , iam:ListAccessKeys |
To collect logs | logs:GetLogEvents |
References
Vulnerability Scan Permission
The following Policies is required:
- EC2InstanceConnect
In addition to InstanceConnect, the following permissions are required:
ec2:CreateSecurityGroup
ec2:CreateTags
ec2:DeleteSecurityGroup
ec2:ModifyNetworkInterfaceAttribute
ec2:ModifySecurityGroupRules
The following policy JSON can be used:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"ec2:CreateSecurityGroup",
"ec2:CreateTags",
"ec2:DeleteSecurityGroup",
"ec2:ModifyNetworkInterfaceAttribute",
"ec2:ModifySecurityGroupRules"
],
"Resource": "*"
}
]
}