AWS
Step to Generate Credentials for AWS
- Login to AWS Management Console
- Click Users under Access Management on the Left Panel
- Click Create User on the top
- Fill in the User name as you like
- In Set permissions, choose Attach policies directly
- Search SecurityAudit in the Search Bar and tickSecurityAudit below
- Click Next, confirm all the setting, then click Create user to continue
- In the User page, click on the user name of the new user, and enter the user detail page
- Click Security Credentials
- Scroll down. In the Access Key, click Create Access Key
- Tick Third Party Service
- Go to Step 3, click Download .csv File to download the Access Key Id and Secret Access Key
Existing Functionalities
info
Go to API Reference to see the list of APIs.
- List EC2 regions
- List all regions
GET /api/v1/aws/ec2/regions - List all enabled regions
GET /api/v1/aws/ec2/regions/enabled
- List all regions
- List ec2 data for specific region
GET /api/v1/aws/ec2(Note: current handler islistEC2Handler)- Returned information includes
- information about EC2 instances, security groups, and key pairs
- list of subnets using the provided AWS session
- list of VPCs using the provided AWS session
- list of EBS volumes using the provided AWS session.
- Returned information includes
- List common data for all regions
GET /api/v1/aws/ec2/all(Note: current handler islistAllEC2Handler)- Returned information includes
- information about EC2 instances, security groups, and key pairs
- list of subnets using the provided AWS session
- list of VPCs using the provided AWS session
- list of VPCs using the provided AWS session
- Returned information includes
- List S3 buckets for a specific region
GET /api/v1/aws/s3 - List EBS volumes for a specific region
GET /api/v1/aws/ebs - List IAM information
- List all IAM information for a specific region
GET /api/v1/aws/iam - List IAM users for a specific region
GET /api/v1/aws/iam/users - List IAM roles for a specific region
GET /api/v1/aws/iam/roles - List IAM policies for a specific region
GET /api/v1/aws/iam/policies - List IAM groups for a specific region
GET /api/v1/aws/iam/groups
- List all IAM information for a specific region
- List KMS information
- List KMS keys for a specific region
GET /api/v1/aws/kms/keys - List KMS keys for all regions
GET /api/v1/aws/kms/keys/all
- List KMS keys for a specific region
- List all AWS information
- List all AWS information for all regions
GET /api/v1/aws
- List all AWS information for all regions
- List K8s information
- List all K8s information for all regions
GET /api/v1/aws/k8s
- List all K8s information for all regions
AWS Account Required Permissions
Read permission on the following resources:
- Amazon EC2
- AWS Identity and Access Management
- Amazon S3
- Amazon EC2 Instance Connect
- Amazon Elastic Kubernetes Service
- AWS Key Management Service
There are predefined roles on AWS that have these permissions. You can use them directly. The naming convention is usually [ServiceName]ReadOnlyAccess
More Specific Information
warning
Work in Progress
| Service | Required Permissions |
|---|---|
| To create access keys | iam:UpdateAccessKey, iam:CreateAccessKey, iam:ListAccessKeys |
| To collect logs | logs:GetLogEvents |
References
Vulnerability Scan Permission
The following Policies is required:
- EC2InstanceConnect
In addition to InstanceConnect, the following permissions are required:
ec2:CreateSecurityGroupec2:CreateTagsec2:DeleteSecurityGroupec2:ModifyNetworkInterfaceAttributeec2:ModifySecurityGroupRules
The following policy JSON can be used:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"ec2:CreateSecurityGroup",
"ec2:CreateTags",
"ec2:DeleteSecurityGroup",
"ec2:ModifyNetworkInterfaceAttribute",
"ec2:ModifySecurityGroupRules"
],
"Resource": "*"
}
]
}