Onboard Your AWS Account
To onboard your AWS public, AWS China, or AWS GovCloud accounts on Prisma Cloud in order to monitor and analyze your resources deployed on AWS, use the following workflow.
If you want Prisma Cloud to ingest VPC flow logs and any other integrations, such as Amazon GuardDuty, Amazon S3, or AWS Inspector, you must enable those services on the AWS management console. The Cloud Formation template (CFT) enables the ingestion of configuration data, Amazon S3 flow logs, AWS CloudTrail logs, and Amazon EventBridge (audit events) only. You can configure VPC flow logs and any other integrations, such as Amazon GuardDuty or AWS Inspector after onboarding the account.
Prisma Cloud does not support shared VPCs.
- Before you begin onboarding your AWS account, decide whether you want to use the automated or manual process to create the roles to authorize permissions for Prisma Cloud.The below onboarding workflow automates the process of creating the Prisma Cloud role and adding the permissions required to secure your AWS account. If you want to create these roles manually instead, see Manually Set Up Prisma Cloud Role for AWS Accounts.
- Log in to your AWS console to create a CloudWatch log group.The CloudWatch log group defines where the log streams are recorded.
- Select.ServicesCloudWatchLogsCreate log group
- Enter a name for the log group and clickCreate.
- Enable flow logs.
- Select.ServicesVPCYour VPCs
- Select the VPC to enable flow logs for and select.ActionsCreate flow log
- Set theFiltertoAcceptorAll.Setting the filter toAllenables Prisma Cloud to retrieve accepted and rejected traffic from the flow logs. Setting the filter toAcceptretrieves Accepted traffic only. If you set the filter toReject, Prisma Cloud will not retrieve any flow log data.
- Verify that theDestinationis configured toSend to CloudWatch Logs.
- Select theDestination log groupyou created above.
- Create a new IAM Role or use an existing one to publish flow logs to the CloudWatch Log group.If you are using an existing IAM role to publish logs to the CloudWatch log group, you must edit the IAM role to include the following permissions.{ "Version": "2012-10-17", "Statement":[ { "Action":[ "logs:CreateLogGroup", "logs:CreateLogStream", "logs:DescribeLogGroups", "logs:DescribeLogStreams", "logs:PutLogEvents" ], "Effect":"Allow", "Resource":"*" } ] }You will also need to Manually Set Up Prisma Cloud Role for AWS Accounts so that the IAM role can access the CloudWatch Log group.ClickCreate flow log.
- Access Prisma Cloud and select.SettingsCloud AccountsAdd Cloud Account
- SelectAmazon Web Servicesas the cloud account you want to onboard andGet Started.
- SelectAccountunderScope.
- Select theSecurity Capabilities and Permissionsthat you want to enable for the AWS account.The capabilities are grouped in toFoundationalandAdvanced. Based on your selection, Prisma Cloud dynamically generates a CFT that includes the associated permissions for the Prisma Cloud role.
- TheFoundational(recommended) capabilities are enabled, by default:
- Misconfigurationsgrants the permissions required to scan cloud resources and ingest metadata.
- Identity Securitygrants the permissions required to calculate net effective permissions for identities and manage access.
- Enable and add permissions for Agentless Workload Scanning (selected by default) to scan hosts and containers for vulnerabilities and compliance risks without having to install a defender. If you do not want the Agentless Workload Scanning capability, you can deselect the checkbox. Scans start automatically once you onboard your organization. You can also update the scanning configuration for agentless scans.
- TheAdvanced(additional) capabilities are:
- Threat Detection(enabled by default) grants the permissions required to detect DNS, Network, and Identity threats.
- Enable and add permissions forServerless Function Scanningto scan cloud provider functions such as, AWS Lambda, Azure, and Google functions for vulnerabilities and compliance. Scans start automatically once you onboard your organization. You can also update the scanning configuration for serverless scans.
- Add permissions forAgent-Based Workload Protectionto allow for automated deployment of defenders to provide protection to secure cloud VMs, containers, and Kubernetes orchestrators. Registry scanning, Kubernetes audits, and other features required by defenders are also enabled.
- EnableData Securityto scan your resources to prevent data leaks. This feature is not enabled by default. After you onboard your account, further steps are required to Configure Data Security scans.
- ClickNext.
- Configure Account.
- Enter anAccount IDandCloud Account Name.A cloud account name uniquely identifies your AWS account on Prisma Cloud. A unique account ID is used to enable the trust relationship in the roles trust policy, which you will require later in the onboarding process.
- EnableRemediation(optional) to grant permissions to remediate misconfigured resources from Infrastructure as Code (IaC) templates. After you enable it, the Prisma Cloud role gets read-write access permissions to your AWS organization to successfully execute remediation commands.
- ClickCreate IAM Roleonly if your role has permissions to log in to your AWS management console in order to create a stack, elseDownload IAM Role CFT. Depending on your selection, clickView Stepsunder each to follow the steps to generateIAM Role ARN.To automate the process of creating the Prisma Cloud role that is trusted and has the permissions required to retrieve data on your AWS deployment, Prisma Cloud uses a CFT. The CFT enables the ingestion of configuration data, Amazon S3 flow logs, and AWS CloudTrail logs (audit events) only, and it does not support the ability to enable VPC flow logs for your AWS account.Make sure that you are already logged in to your AWS management console before you clickCreate IAM Role. Prisma Cloud creates a dynamic link that opens theQuick create stackpage in your AWS management console based on theSecurity Capabilities and Permissionsyou selected. The details are uploaded automatically and you do not need to enter them manually in order to create the stack. Make sure you complete the onboarding process within 1 hour, else the link will expire, in which case you will have to clickCreate IAM Roleagain. If you have installed browser plugins and have pop-ups blocked, first allow pop-up and then clickCreate IAM Roleto continue the process.Once youDownload IAM Role CFT, it is valid for 30 days. Even if you close the dialog before completing the onboarding process, you can onboard again within 30 days again using the same Account ID and Role ARN created with the previously downloaded CFT.
- Paste theIAM Role ARN.
- Select one or more account groups or selectDefault Account Group.You must assign each cloud account to an account group and create an Alert Rule for run-time checks to associate with that account group to generate alerts when a policy violation occurs.
- ClickNext.
- Review Status.Verify theDetailsof the AWS Account and the status checks for theSecurity Capabilitiesyou selected while onboarding the account on Prisma Cloud.
- Ensure that all the security capabilities you selected display a greenSuccessfulorEnabled(
) checkmark.
- For the security capabilities that display a redChecks Failed(
) icon, click the corresponding drop-down to view the cause of failure. To resolve the isssue, see Troubleshoot AWS Onboarding Errors.
- ClickSave and Closeto complete onboarding orSave and Onboard Another Account.After you sucessfully onboard your AWS account on Prisma Cloud, the account is automatically available in Compute and enabled forWorkload DiscoveryandServerless function scans. ForAgentless scans, you have to complete the configuration to trigger the scan.You can view the newly onboarded AWS account on theCloud Accountspage.
- Prisma Cloud checks whether Compute permissions are enabled only if you have one or more compute workloads deployed on the AWS cloud accounts that are onboarded. The cloud status transitions from green to amber only when you have compute workloads deployed and the additional permissions are not enabled for remediation.
- If you have services that are not enabled on your AWS account, the status screen provides you some details.
- Configure Flow Logs if you want to enable monitoring of VPC flow logs data to be published to S3 buckets in a Logging Account that you need to onboard.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.