AWS Cloud Organizations

Configure a Cloud Organization in TOS Classic to automatically discover and onboard member accounts from AWS Organizations.

The Cloud Organizations page in Device Groups lists existing organizations, their settings, and options available to manage them.

IAM requirements for AWS Organizations

To add AWS accounts through AWS Organizations, you need:

  • An IAM user in the management account with permissions for AWS Organizations account discovery/import, and permissions to assume roles in target accounts.

  • An identically named IAM role in each target account with the minimum required permissions for SecureTrack.

Management account IAM user

The IAM user in the management account must have permissions for account discovery and import.

Target account permissions

In each target account you want to monitor, create an IAM role with the minimum required permissions policy for SecureTrack to access AWS resources.

Target account permissions

  • The role name must be identical in all target accounts.

  • In the Cloud Organization settings, enter the role name only, and not the ARN.

AWS opt-in Regions limitation for cloud organizations

SecureTrack cannot discover opt-in Regions when you monitor AWS accounts through a cloud organization.

To monitor resources in these regions, add the AWS account manually and use direct account credentials. Cross-account access (AssumeRole/ARN) is not supported when you use a Cloud Organization.

We plan to resolve this limitation in a later version.

For more information, see Considerations for activating AWS opt-in regions.

AWS cloud organization settings

Cloud organization settings are divided into general and automatic account settings.

AWS-specific cloud organization settings

The table below describes the AWS-specific settings for a cloud organization.

Field Name Description

Name

Required.

The display name for the cloud organization.

Organization ID

Required.

The unique identifier representing the Cloud Organization and its member accounts.

The Organization ID is generated when the organization is created in AWS. After login to the management account, The Organization ID is displayed in the management account in the navigation bar. You can get it from the AWS Management Console or via the AWS CLI.

Organization Unit ID

Optional.

The ID of the Organization Unit (OU) with the accounts to import. The OU name is not a valid value.

  • If not defined, TOS imports all the accounts under the AWS Root Account.

  • When defined, TOS imports the accounts assigned to the specified OU, including any child OUs and their accounts.

To import accounts at a more granular level, define the cloud organization multiple times using different Names, and specify the Management Groups that contain the accounts to import for each Name.

Assume Role

Required.

The IAM role that SecureTrack assumes in each target member account. Enter only the role name only, and not role ARN.

  • The role name must be identical in all member accounts.

  • The role must have the minimum required permissions policy for SecureTrack. See Target account permissions.

Access Key

Required.

The access key ID for the IAM user used to authenticate to AWS Organizations.

Secret Access Key

Required.

The secret access key for the same IAM user.

Automatic account import settings

When configuring a cloud organization, you can enable automatic discovery and import for the organization's member accounts, and also configure the default behavior for usage analysis.

Auto import frequency
When enabled, automatic account imports occur daily at midnight. To change the scheduled time, contact Tufin Customer Support.

Manual account import
Manually import member accounts on demand, even when automatic import is enabled. Manual account import behavior differs depending on whether automatic account import is enabled or disabled. See AWS Cloud Organizations .

Both automatic and manual account import processes only add new entities.
Existing accounts that have been deleted or removed are not automatically removed during import.

 

Automatic import setting

Description

Automatic account import

When selected, imports member accounts at the predefined automated schedule, daily at midnight. Monitoring/usage analysis features when enabled for the cloud organization are inherited by all the devices (member accounts).

Collect traffic logs for rule usage analysis

Collects traffic logs using AWS CloudWatch (the default). To use S3 Buckets, manually configure the same in the device’s settings. For the specific settings to configure, see Adding an AWS device.

Enable Rule Optimizer recommendations

Requires Collect traffic logs for rule usage analysis.

When selected, enables recommendations to tighten the permissiveness rules using traffic usage data. See Rule Optimizer.

Enable topology

When selected, collects routing information to build the network Map.

Automatic VPC import

Determines if SecureTrack automatically detects changes to Virtual Private Clouds (VPCs) in the vendor environment.

When selected, reflects added, deleted, or updated accounts in the device list and revision history. These changes are also displayed in the Map after a scheduled or manual sync.

Add AWS cloud organizations

Add an AWS Organization as a cloud organization directly from Device Groups, or through Manage Devices before adding the device. This procedure describes how to add a cloud organization from Device Groups.

Prerequisites

Steps

  1. Select Cloud Organizations, and then click + ADD CLOUD ORGANIZATION. The Add Cloud Organization page is displayed.

  2. Define the organization settings, as described in AWS-specific cloud organization settings.

  3. Optional. Define the settings for automatic account import, as described in Automatic account import/ settings.

    If automatic account import settings are not configured, you can manually import accounts when needed.

  4. Click Save.