Skip to main content

Amazon Web Services

Cyscale enables you to keep track and secure your AWS infrastructure natively. You connect your AWS account(s) by creating an IAM role which Cyscale can assume to read your AWS resources.

Connecting Your AWS Account(s)

Once you are ready to connect your AWS account and have the required permissions, press the Create button from the top-right corner, select Add Connector, and choose AWS. You will be greeted with a simple multi-step process.

Step 1

In the first step, you provide a name for your AWS account to be used throughout Cyscale. This is a plain-text identifier that helps you better manage your resources.

You also provide the external ID. The field is pre-populated by default and there is no real reason to change it other than if you want to use an already existing role. This is a native feature of AWS roles that helps the involved parties establish a more secure connection (see the AWS docs for more).

Step 2

In the second step, you create the AWS role. Cyscale gives you multiple ways to achieve this to adhere to your already existing processes.

Tip

If you use Okta to manage your users and groups, consider connecting your Okta account to Cyscale. This will enable Cyscale to link your Okta users with the AWS SSO users, thus providing you with the complete picture of what each Okta user can do in each AWS account.

CloudFormation (Default)

The most straightforward way to create the required AWS role is by using CloudFormation, the native infrastructure as code service from AWS.

Infrastructure as Code Benefits

Besides being simple to use, just like the Terraform option, it provides a great way to manage the lifecycle of the created resources (role, policy). For example, if you decide to remove the connection to your AWS account, you simply delete the CloudFormation stack and all the related resources will be deleted automatically.

Cyscale comes with a ready-to-use CloudFormation template which you can view either inline (see the image below) or you can download the actual template from here (this is the source of the CloudFormation stack).

CloudFormation Template

When you click on Create AWS Stack, a new browser window will open with the CloudFormation stack ready to be created. You might have to authenticate into the AWS console.

AWS CloudFormation Stack

Review the name and the parameters of the stack, check the I acknowledge that AWS CloudFormation might create IAM resources with custom names. checkbox, and press Create stack. Your AWS resources should be ready within a few minutes (state CREATE_COMPLETE). From the outputs tab, copy the ARN and paste it into the Role ARN from Output field in Cyscale, as displayed below.

AWS Role ARN from CloudFormation

Terraform

Another option based on infrastructure as code is to use Terraform. If your current workflow leverages Terraform, you might want to choose this approach.

Cyscale generates a ready-to-use Terraform configuration file which you download and run using the Terraform CLI. Inspect the file and, once you are ready, run terraform init and terraform apply -auto-approve.

Authentication and Authorization

Terraform uses the provider's APIs/SDKs to manage the resources - IAM role and policy in this case. The Terraform AWS provider can be configured in several ways which you can find here.

Perhaps the simplest option is to let the provider use the credentials stored by the AWS CLI. If you have multiple AWS CLI profiles, you can set the environment variable AWS_PROFILE with the profile corresponding to the AWS account you want to connect to Cyscale.

Manual

If you prefer setting up the resources manually from the AWS management console, follow the steps described in the application.

Access Security

While the permissions you grant to Cyscale are limited to reading the configuration of your cloud resources, you might still be concerned about the security of your AWS account. Setting the trust relationship with the Cyscale AWS account means that any entity from the Cyscale AWS account with the privilege to assume the role from your account and that has access to the external ID you provided can read your AWS infrastructure.

The Cyscale AWS account (789815788242) follows all the best practices and is continuously secured by Cyscale itself. Furthermore, the external ID is encrypted and stored in a database accessible only by certain services from within the Cyscale infrastructure. No member of the Cyscale team has access to the external ID.

Step 3

In this step, you can select which AWS regions should be covered by Cyscale. By default, all regions are selected. In most cases, you will want to choose the regions in which you have some resources deployed. You can change this after.

Default Resources

All AWS regions have some resources deployed by default such as the default VPC, default subnets (one for each AZ), and the default security group. These resources count towards the quota of your plan.

Global Resources

Certain resources such as IAM resources (users, groups, roles, policies, etc.) do not belong to a certain region. These are classified by Cyscale as global assets.

Step 4

In this step, Cyscale makes sure the connection to your cloud account can be established and starts the first sync in the background. You can navigate to the cloud account overview page. The page will automatically refresh when the sync and assessment are completed.

Deep Dive on Permissions

Since Cyscale connects to your AWS account(s) by assuming the role you create, all permissions are controlled through the policies that are attached to the role.

To benefit from everything Cyscale has and will have to offer, two policies should be attached:

  • SecurityAudit - This is an AWS-managed policy granting read access to most AWS services. You can read more about it in the AWS documentation and in the AWS console.

  • Custom Policy - An additional custom policy granting permissions for certain actions/services that are not covered by the Security Audit policy such as ListTagsForResource for EFS and List* actions for S3.

Data Access

It is important to make the distinction between infrastructure/configuration access and data access. Since Cyscale focuses currently on infrastructure, these policies do not grant permissions to your data. For example, Cyscale can read the configuration of your S3 buckets and objects, but not their actual content - i.e. there is no GetObject permission.

One area you might want to pay attention to is logging. Cyscale will have access to your logs from Amazon CloudWatch. While Cyscale does not process the content of the logs in any way, it is still important to not leak any sensitive information in logs.

Managing Your Connected AWS Account(s)

Once connected, your AWS account(s) will show up in the Connectors list. From there, you can either use the inline actions or navigate to the overview page of the cloud account. The available options are:

Configure

You can update the following information for your AWS cloud accounts:

  • Name - this helps you better identify the cloud account throughout the Cyscale platform
  • Role ARN - in case you want Cyscale to use another role
  • External ID - if you change the IAM Role you might also have to provide another external ID
  • Regions - from the dedicated tab, you can update which AWS regions Cyscale should cover. This change will be visible after the next sync, which starts automatically after you save. If you remove a region, all assets from that region will be removed from Cyscale.

Disable/Enable

By default, all connectors are enabled. If you want to prevent Cyscale from syncing and assessing your assets for a certain connector, you can disable it. The state of the connector in Cyscale will be locked until you enable it again. The assets will not be updated based on your actual resources and assessments will not be performed for them.

Sync

You can always trigger a new sync and assessment manually for a given connector (unless the sync is already in progress). This will make Cyscale read all your resources for that particular connector, evaluate the applicable controls, and generate any alerts if necessary.

Vulnerabilities

Cyscale pulls vulnerabilities/findings reported by Amazon Inspector (EC2 instances, Lambda functions, ECR images) and ECR Basic Scanning (ECR images). We recommend using them if possible.

Cyscale will show you all findings alongside the CVE ID (and the reference in MITRE), Severity, Affected Packages, Description of the CVE and the Remediation steps.

The findings will be grouped by CVE ID and ordered by Severity in the Vulnerabilities inventory (accessible from the main menu).

You can also check the vulnerabilities for a specific asset by navigating to the Vulnerabilities tab or in the Overview Cards section of the asset.

Severity

A finding severity rating can be Info, Low, Medium, High, Critical or Untriaged. Untriaged findings are those the vendor hasn't yet assigned a score for.

You can read more about how Amazon Inspector computes severity scores.

Mentions

  • The Vulnerabilities inventory will be empty until the Amazon Inspector is enabled in one of your AWS connectors.
  • Once enabled, you should wait for the next sync or trigger a sync from the Connectors page. Check Getting Started for more details.
  • Cyscale will not show findings related to Network Reachability due to their overlapping with our security controls.
  • Starting on 19 April 2023, Amazon Inspector supports deep inspection of EC2 instances. It allows you to see vulnerabilities in application packages such as Python, Java, and Node.js.

Service Coverage

The AWS resources that Cyscale can handle are listed in the tables below, along with the number of controls that check their configuration:

AI/ML# of Controls
SageMakerNoteBook3
Compute# of Controls
AutoScalingGroup0
ECSCluster1
ECSContainerInstance0
Function2
VM (EC2 instance)7
Containers# of Controls
ContainerRegistry0
ECRImage0
ECRPublicImage0
ECRPublicRepository0
ECRRepository0
ECSScheduledTask0
ECSService2
ECSTask0
ECSTaskContainer0
ECSTaskContainerSpec0
ECSTaskDefinition5
ECSTaskSet0
IAM# of Controls
AccessAnalyzer0
IAMGroup2
IAMPasswordPolicy7
IAMPolicy0
IAMRole3
IAMUser11
IAMVirtualMFADevice0
SSOGroup0
SSOPermissionSet0
SSOUser0
Integration# of Controls
API0
KinesisDataStream1
EventBridgeRule0
EventBridgeSchedule0
MQBroker0
SNSSubscription0
SNSTopic1
SQSQueue1
Management# of Controls
CloudAccount22
ConfigurationRecorder0
EBSSettings1
IAMAccountSummary0
OrgAccount (SSO)0
Trail3
Networking# of Controls
CustomDomain0
FlowLog0
HTTPListener0
LoadBalancer4
NetworkACL1
NetworkInterface0
PrefixList0
SecurityGroup8
Subnetwork0
TargetGroup0
VPC1
VPCLink0
Operations# of Controls
LaunchTemplate0
LaunchTemplateVersion3
MetricAlarm0
MetricFilter0
Snapshot0
Image (AMI)1
Security# of Controls
Certificate1
IAMServerCertificate1
KeyPair0
KMSKey8
Storage# of Controls
Bucket17
Disk1