Skip to main content

How to connect AWS to Secfix

Jakub Wanat avatar
Written by Jakub Wanat
Updated this week

You can connect one, or many AWS (Amazon Web Services) accounts to Secfix.

πŸ”’ Note: Secfix needs read-only AWS credentials with limited permissions in order to monitor your AWS configurations. An AWS administrator for your organization can create the necessary IAM role through the AWS Management Console.

Add an account to Secfix

Create policy

  • Paste the policy below into the editor

  • Click Review policy and name the policy SecfixAdditionalPermissions

  • Click Create policy

    Create role

  • Navigate to the AWS role creator and make sure Another AWS Account is selected

  • Paste the Account ID field from Secfix into the account ID field in AWS

  • Select Require external ID

  • Paste the external ID field from Secfix into the external ID field in AWS

  • Confirm that Require MFA is not selected

  • Click Next: Permissions

  • Search for SecurityAudit policy and check the box next to the SecurityAudit.

  • Search for SecfixAdditionalPermissions and check the box next to SecfixAdditionalPermissions

  • Click Next

  • Click Next: Review and name the role secfix-auditor

  • Click Create role

    πŸ”’ Note: If you use S3 bucket policies, be sure to add access for this role.

    Add role ARN

  • After the Role is created in AWS, you will return to Secfix and click Next

  • Navigate to the secfix-auditor role in AWS that you just created

  • Copy the Role ARN from AWS, and paste it into Secfix

  • Click Finish

Did this answer your question?