Monitoring Amazon AWS Cloud Platform

Overview

Add AWS accounts to TOS as devices to monitor and manage them. By adding AWS accounts, TOSmonitors the Amazon AWS cloud platform for policy revision changes and provides ongoing visibility into configuration and compliance.

To see which TOS features are supported for your device, review the SecureTrack Features by Vendor.

Add AWS accounts

There are two ways to add AWS accounts as devices:

  • Manually

    Add every AWS account individually, as described here in Add a Device.

  • Automatically

    Configure a Cloud Organization and import its accounts according to a predefined schedule. Automatic account import settings are included as part of the Cloud Organization configuration. For detailed information, see Cloud Organization Device Groups.

Account authentication

For TOS to authenticate with and monitor the AWS account, you need the account credentials. When adding a device, you can configure credentials in one of the following ways:

  • Associate with a predefined Cloud Organization

    If you have configured Cloud Organizations, you can associate the AWS account with the Cloud Organization to inherit its credentials.

  • Access Key ID and Secret Access Key

    Define the Access Key ID and the Secret Access Key for the specific account.

Additional authentication mechanisms

For devices not associated with Cloud Organizations, TOS also supports service-specific authentication mechanisms, such as integration with HashiCorp Vault. These mechanisms require specific credentials.

See Prerequisites for AWS accounts.

Prerequisites for AWS accounts

Permissions

Before you begin, make sure the AWS user or role used by SecureTrack has a custom IAM policy with the minimum required permissions. These permissions allow SecureTrack to retrieve configuration and flow information needed for monitoring, topology mapping, provisioning, and application discovery.

Cross-account access (AssumeRole): To use the AssumeRole option for cross-account monitoring, you must have an Amazon Resource Name (ARN) identifier for the target role. For more information, see Amazon AWS AssumeRole Support.

To create a custom IAM policy, copy the relevant permissions into the Action block of your policy and set "Resource": "*" unless more restrictive access is required. For more help, see the Amazon AWS documentation.

Use the following permission blocks based on the features you want to enable:

Account Credentials

SecureTrack supports several authentication mechanisms, each of which require specific credentials.

Make sure you have the required credentials for the authentication mechanism before adding the device.

  • Hashicorp Vault server

    Preconfigured with the following key-value pairs, which SecureTrack expects to retrieve:

    Key

    Value

    access_key_id <Access Key ID>
    secret_access_key <Secret Access Key>

VPC Automatic Import

When you add a device, you can enable Automatic Importfor Virtual Private Clouds (VPCs). When enabled, SecureTrack automatically detects changes to the AWS environment (VPCs which were added, deleted, and updated), and reflects them in the device list and revision history. Changes to the VPCs are also reflected in the Map when a scheduled sync occurs or when you Sync the map.
When enabled, VPCs are imported at 10-minute intervals.

With Automatic Import enabled, devices that were deleted from AWS are automatically deleted from the list of devices in SecureTrack, and their history is no longer available. Therefore, if your continuous integration/continuous deployment (CI/CD) pipeline regenerates VPCs, the history of the deleted VPC will not be available in the new replacement VPC. To retain revision data in SecureTrack for devices that have been deleted from your Amazon account, use manual import.

The maximum number of VPCs for Automatic Import depends on your TOS deployment. For more information, contact Tufin Customer Support.

 

Add a Device

Add an AWS account individually, one at a time.
Optionally associate the account with a predefined Cloud Organization for automatic import or by using the username-password mechanism. Associating a Cloud Organization with the device automatically imports the account details.

Only Super Administrators can associate a Cloud Organization with a device.
  1. Select Amazon > AWS Account.

  2. Configure the device settings:

    • General settings

      • Device Type: Amazon AWS Account (filled automatically)

      • Name for Display

      • Domain: Available only if you have configured your system for managing multi-domains and All Domains is currently selected. Select the domain to which to add the device. The Domain can only be entered when adding a device; to change the Domain, you must migrate the device.

      • ST server: In a distributed deployment, the AWS parent device and its VPCs must be monitored by the same cluster(not shown in image).

    • Usage Analysis

      • Collect traffic logs for rule usage analysis: Select to enable SecureTrack to analyze flow log data and identify the last hit date for rules.
        When selected, uses AWS CloudWatch (the default). To use S3 flow logs instead, select Enable S3 storage explicitly for the device and configure the storage credentials.

      • Enable Rule Optimizer Recommendations: Select to to collect and save traffic usage data for Rule Optimizer recommendations.

    • Topology

      • Enable Topology: Select to collect routing information for building the network Map.
        Topology options for Advanced management mode are configured when you import managed devices.

    • VPC Import:

      • Automatic Import: To automatically detect updated, deleted and new VPCs in the AWS account, and reflect the updates in SecureTrack. VPCs are automatically imported at 10-minute intervals.

      • Manual Import: Import VPCs after you add the AWS device.

  3. Click Next.
  4. Configure the SecureTrack connection to the AWS device, according to the parameters required by the device:

    • Cloud Organization

      • Use Cloud Organization: Optional. Select to associate this device with a predefined cloud organization. When associated with a cloud organization, other connection mechanisms and credentials are automatically disabled.
        The Access Key ID and the Secret Access Key are automatically populated from those configured for the Cloud Organization.

      • Account ID: Mandatory when Use Cloud Organization is selected. The ID of the account to associate with the device.

    • Cross-Account Access

      Enabled only when the AWS account is not is not associated with a Cloud Organization.

      • ARN: The Amazon Resource Name (ARN) identifier to use the AssumeRole permissions.

        This allows you to request temporary security credentials to make AWS requests for the account configuration information that is not available by default, and to access VPCs that are not part of your Account configuration.

        For more information, see Amazon AWS AssumeRole Support.

    • Proxy:

      Enabled only when when the AWS account is not associated with a Cloud Organization.

      Select to connect to AWS through a proxy which requires authentication. Enter the proxy details:

      • IP address or Hostname of the proxy

      • Port that you connect to on the proxy

      • Username to use for authentication

      • Password  and Confirm Password to use for authentication

      If SSL decryption is enabled on the Proxy server and applied to the traffic from SecureTrack to AWS, you must configure a white list on the proxy server. The white list allows the traffic from SecureTrack to bypass SSL decryption and authentication.
    • Enable S3 Flow Logs: 

      To use S3 flow logs for usage analysis instead of the default CloudWatch, select this option and enter the S3 details:

      • Region

      • S3 Bucket name

    • S3 Centralized Account: 

      Enabled only when when the AWS account is not associated with a Cloud Organization..

      Select this option for cross-account access, and enter the Centralized Account credentials:

      • Access Key ID

      • Secret Access Key

    • Use Hashicorp Vault: 

      Enabled only when the AWS account is not associated with a Cloud Organization..

      Select this option to store your AWS authentication credentials in Hashicorp Vault.

      When storing AWS authentication credentials in Hashicorp vault, use the KV secret engine version 1.
      • Server host name: Name of the server used to host the Hashicorp Vault.

      • Port: TCP / UDP port that SecureTrack uses to communicate with the Hashicorp Vault.

      • Secret path: Path to the AWS authentication details within the Hashicorp Vault.

      • Select either Vault Token Authentication or App Role:

        • Vault Token Authentication:

          Select this option to add the Vault token. This token is required for SecureTrack to authenticate AWS using the Hashicorp Vault.

          For example:

        • App Role:

          Select this option to add the App Role fields:

          • Role ID: Vault server RoleID that SecureTrack uses to authenticate the Hashicorp Vault server.

          • Secret ID: Hashicorp Vault server SecretID that SecureTrack uses to authenticate the Hashicorp Vault server.

          • Approle Login URL: Path to AppRole login details within the Hashicorp Vault.

            For example:

    Tufin does not support using the Hashicorp Vault with a proxy or Cross-Account Access (ARN).
  5. Click Next. The Monitoring Settings page appears.

  6. In the Monitoring Settings page, select Default or Custom monitoring settings:

    • Default:
    • Custom: Define the polling frequency that how often SecureTrack retrieves the configuration from each device).

      Choose from:

      • Use timing page settings: See Setting Timing for Monitoring.

      • Custom settings: Select the required polling frequency.

        If you select 1 day, you can select the exact time (hour and minute) for the daily polling.

  7. Click Next

  8. Click Save.

After adding a device, you can update its configuration settings, delete the device, or import additional settings such as VPCs, Transit Gateways, and Load Balancers.

Import Virtual Private Clouds

Import AWS Transit Gateways

Import AWS Gateway Load Balancers

Configure a Monitored Device

After you add a device, further configuration options are available.

Options vary depending on your environment.

Example:

  • Edit configuration: Use the wizard to modify selected device settings. See Add a Device in this topic.

  • Delete this device: Type yes to confirm that you want to delete the device.

  • Import Virtual Private Clouds: Select the Virtual Private Clouds to be added.

  • Import Transit Gateways: Select the Transit Gateways to import. In multi-domain deployments, select the domain for each Transit Gateway.

  • Import Gateway Load Balancer: Select the gateway load balancers to import. In multi-domain deployments, select the domain for each load balancer.

  • Migrate (ST servers): Available in distributed deployments. Select the server where the device will be monitored and click Migrate.

  • Migrate (Domains): Available in multi-domain deployments. Select the domain where the device will be monitored and click Migrate.

How Do I Get Here?

SecureTrack > Monitoring > Manage Devices