Adding an AWS account to the Cloud Accounts app allows Trend Vision One to access your cloud service to provide security and visibility into your cloud assets. Some Cloud Account features have limited support for AWS regions. For more information, see AWS supported regions and limitations.
ImportantThe steps are valid for the AWS console as of November 2023. |
Procedure
- Sign in to the Trend Vision One console.
- In the Trend Vision One console, go to Service Management → Cloud Accounts → AWS.
- Click Add Account.
The Add Cloud Account window appears. - Select Single AWS Account.
- Specify the general information for the account.
- Specify the Account name to display in the Cloud Accounts app.
- Specify a Description to display in the Cloud Accounts app.
- Select the AWS region for CloudFormation template deployment.
Note
The default region is based on your Trend Vision One region.
Some features and permissions have limited support for some AWS regions. For more information, see AWS supported regions and limitations. - Click Next.
- Choose which Features and Permissions to enable on the account.
- Core Features: Connect your AWS account to Trend Vision One to discover your cloud assets and rapidly identify risks such as compliance and security best practice violations on your cloud infrastructure.
- Container Protection for Amazon ECS: Deploy Trend Vision One Container Security in your AWS account to protect your containers and container images in Elastic Container Service (ECS) environments. Trend Vision One Container Security uncovers threats and vulnerabilities, protects your runtime environment, and enforces deployment policies.
Important
As of November 2023, AWS private and freemium accounts only allow a maximum of 10 Lambda executions. Container Protection deployment requires at least 20 concurrent Lambda executions. Please verify your AWS account status before enabling this feature. - Cloud Detections for AWS CloudTrail: Enable Cloud Detections for AWS CloudTrail in your AWS account to get actionable insight into user, service, and resource activity with detection models identifying activity such as privilege escalation, password modification, attempted data exfiltration, and potentially unsanctioned MFA changes.
Note
This feature requires additional configuration of your CloudTrail settings. For more information, see CloudTrail configuration. - Agentless Vulnerability & Threat Detection: Deploy Agentless Vulnerability & Threat Detection in your AWS account to discover vulnerabilities in your Amazon EC2 instances with zero impact to your applications.
- Cloud Response for AWS: Allow Trend Vision One permission to take response actions to contain incidents within your cloud account, such as revoking access for suspicious IAM users. Additional response actions leverage integration with third party ticketing systems.
This feature requires Cloud Detections for AWS CloudTrail to be enabled for your account.
Note
Agentless Vulnerability & Threat Detection is a pre-release sub-feature and is not part of the existing features of an official commercial or general release. Please review the Pre-release Sub-Feature Disclaimer before using the sub-features. - Click Next.
- If you have more than one Server & Workload Protection Manager instance, select the instance to associate with the connected account.
Note
- If you only have one Server & Workload Protection Manager instance, the account is automatically associated with that instance.
- Launch the CloudFormation template in the AWS console.
- If you want to review the stack template before launching, click Download and Review Template.
- Click Launch Stack.
The AWS management console opens in a new tab and displays the Quick Create Stack screen.
- In the AWS management console, complete the steps in the Quick Create Stack screen.
- If you want to use a name other than the default, specify a new Stack name.
- In the Parameters section, configure the following parameters only if you have enabled Cloud Detections for AWS CloudTrail.
- For CloudAuditLogMonitoringCloudTrailArn, provide the ARN for the CloudTrail you want to monitor.
- For CloudAuditLogMonitoringCloudTrailSNSTopicArn, provide the ARN of the CloudTrail SNS topic.
Important
- The monitored CloudTrail and CloudTrail SNS must be on the same account and located in the same region you selected for the template deployment.
- Do not change any other settings in the Parameters section. CloudFormation automatically provides the settings for the parameters. Changing parameters might cause stack creation to fail.
- In the Capabilities section, select the following acknowledgments:
- I acknowledge that AWS CloudFormation might create IAM resources with custom names.
- I acknowledge that AWS CloudFormation might require the following capability: CAPABILITY_AUTO_EXPAND.
- Click Create Stack.
The Stack details screen for the new stack appears with the Events tab displayed. Creation might take a few minutes. Click Refresh to check the progress.
- In the Trend Vision One console, click Done.
The account appears in Cloud Accounts once the CloudFormation template deployment is completed. Refresh the screen to update the table.