IAM
Overview (#)
The following IAM users, access keys, roles and policies are deployed:
ID | Platforms | Engines | Fulfillment Options | Purpose |
---|---|---|---|---|
ScanIAMRole | all | all | all | Allow Scan Fleet EC2 instances to scan S3 objects. See ScanIAMRole. |
FlowLogRole | all | all | dedicated-public-vpc, dedicated-private-vpc | Required for VPC Flow Logs. |
DashboardLambdaRole + DashboardLambdaPolicy | all | all | all | Custom widgets in CloudWatch dashboard (S3 buckets list with possibility to enable real-time bucket scanning as well as bucketAV version check). |
GovernanceLambdaRole + GovernanceLambdaPolicy | aws | all | all | Governance checks to detect unprotected S3 buckets. Only deployed if the Governance configuration parameter is set to true. |
CloudflareQueueRole + CloudflareQueuePolicy | cloudflare | all | all | A CloudFormation custom resource is used to create the Cloudflare Queue. |
CloudflareUser + CloudflareAccessKey | cloudflare | all | all | IAM user access key is used inside Cloudflare Worker to publish nely uploaded files to the SQS Scan Queue. |
SecurityHubIntegrationLambdaRole + SecurityHubIntegrationLambdaPolicy | clamav | all | all | Creates findings in Security Hub. Only deployed if the SecurityHubIntegration configuration parameter is set to true. |
OpsCenterIntegrationLambdaRole + OpsCenterIntegrationLambdaPolicy | clamav | all | all | Creates findings in OpsCenter. Only deployed if the OpsCenterIntegration configuration parameter is set to true. |
ScanIAMRole (#)
The Scan Fleet EC2 instances have access to the following AWS APIs:
- S3 access to read, delete (optional), tag (optional), and list objects and versions (can be restricted to S3 buckets/objects via the S3BucketRestriction configuration parameter and S3ObjectRestriction configuration parameter).
- KMS access to decrypt S3 objects (can be restricted to KMS keys via the KMSKeyRestriction configuration parameter).
- SQS access to poll internal Scan Queue.
- SNS access to publish to internal Findings Topic.
- CloudWatch access to publish custom metrics under
bucketav
namespace. - CloudWatch access to publish logs to the internal log group.
- Optional Systems Manager Session Manager access.
You can add additional permissions via the ManagedPolicyArns configuration parameter.