Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Defender for Cloud Cookbook

You're reading from  Microsoft Defender for Cloud Cookbook

Product type Book
Published in Jul 2022
Publisher Packt
ISBN-13 9781801076135
Pages 314 pages
Edition 1st Edition
Languages
Author (1):
Sasha Kranjac Sasha Kranjac
Profile icon Sasha Kranjac
Toc

Table of Contents (12) Chapters close

Preface 1. Chapter 1: Getting Started with Microsoft Defender for Cloud 2. Chapter 2: Multi-Cloud Connectivity 3. Chapter 3: Workflow Automation and Continuous Export 4. Chapter 4: Secure Score and Recommendations 5. Chapter 5: Security Alerts 6. Chapter 6: Regulatory Compliance and Security Policy 7. Chapter 7: Microsoft Defender for Cloud Workload Protection 8. Chapter 8: Firewall Manager 9. Chapter 9: Information Protection 10. Chapter 10: Workbooks 11. Other Books You May Enjoy

Creating an Identity and Access Management AWS role for Microsoft Defender for Cloud

To enable Microsoft Defender for Cloud to connect to and allow it to authenticate to AWS, you have two options: create an AWS user for Microsoft Defender for Cloud or create an AWS Identity and Access Management (IAM) role for Microsoft Defender for Cloud. The first option is less secure, while the second option is the most secure and preferred way to authenticate Microsoft Defender for Cloud to AWS. In this recipe, you will use the more secure option to connect an AWS account to Microsoft Defender for Cloud, you will create an IAM role.

Getting ready

Open a browser and navigate to https://console.aws.amazon.com/. Open a new tab in a web browser and navigate to https://portal.azure.com.

How to do it…

To create an Identity and Access Management (IAM) role for Microsoft Defender for Cloud, complete the following steps:

  1. In the Azure portal, open Defender for Cloud. From the menu, under the Management section, select Environment settings. Switch back to the classic cloud connectors experience. On the Cloud connectors blade, from the top menu, select Connect AWS account:
Figure 2.22 – Connect AWS account

Figure 2.22 – Connect AWS account

  1. In the Display name field, enter a name to identify the AWS account connection in Microsoft Defender for Cloud. From the Subscription menu, choose an Azure subscription. Take note of the Microsoft account ID and External ID (Subscription ID) values as you will need them in the next steps. Leave the Azure portal browser tab open.
  2. Switch to the AWS Console browser tab. In the AWS Console, open IAM. You can open IAM in two ways. First, you can type IAM in a search bar and select it. Second, you can click on Services in the top-left corner and, under Security, Identity, & Compliance, select IAM.
  3. On the left-hand side menu, select Roles and then Create Role:
Figure 2.23 - Identity and Access Management (IAM) console

Figure 2.23 - Identity and Access Management (IAM) console

  1. On the Create role page, select Another AWS Account. This step requires the values that we specified in Step 2. In the Account ID field, enter 158177204117 as your Microsoft Account ID. Select the Require external ID checkbox. For External ID, enter the Microsoft Azure subscription ID value. Click Next: Permissions:
Figure 2.24 – Create role – Specify accounts that can use this role

Figure 2.24 – Create role – Specify accounts that can use this role

  1. On the Attach permission policies page, select the SecurityAudit, AmazonSSMAutomationRole, and AWSSecurityHubReadOnlyAccess policies. Then, click Next: Tags.
  2. Optionally, you can add Tags. Click Next: Review.
  3. On the Review page, in the Role Name field, enter the name of the role you just created. Optionally, in the Role Description field, enter some text that will describe the newly created role. Click Create role to finish creating the role.
  4. On the Identity and Access Management (IAM) page, click on the role name you created.
  5. On the Summary page, copy the Role ARN value, as you will need it in the following recipe.

How it works…

To be able to connect your AWS account to Microsoft Defender for Cloud, Microsoft Defender for Cloud needs to have permission to access information about AWS resources. For this, you have created an AWS IAM role and attached the appropriate permission policies to it. The policies grant various permissions, including read-only access to AWS Security Hub, and read access to information about AWS services and AWS Systems Manager Agent automation permissions. Later, you will reference this role while connecting your AWS account to Microsoft Defender for Cloud.

You have been reading a chapter from
Microsoft Defender for Cloud Cookbook
Published in: Jul 2022 Publisher: Packt ISBN-13: 9781801076135
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime