Now that you've installed and deployed InsightCloudSec, you're ready to start pulling in resources and detailed usage information from the various cloud service providers (CSPs) that InsightCloudSec supports. This category of the documentation details configuring your Amazon Web Services (AWS) environment to "talk" with InsightCloudSec securely. Review the sections below to determine the best starting point for you and your environment.
As one of the leading public cloud service providers, Amazon Web Services (AWS) is extensively supported by InsightCloudSec. Review the full list of supported services on the AWS Support Reference page.
InsightCloudSec relies on a process called "harvesting" to pull data from various CSPs. You can harvest individual accounts or AWS Organizations using two different assume role authentication methods. Review the prerequisites in the "What do I need before getting started" section below to get started with harvesting your AWS data.
After at least one AWS account is being harvested by InsightCloudSec, you're free to configure additional AWS services as necessary to enhance, optimize, or further secure your experience. Review AWS Additional Configuration for more information.
InsightCloudSec offers Event-Driven Harvesting for AWS, which requires additional configuration but optimizes harvesting by only pulling in new data when certain AWS CloudWatch Events occur. Review AWS Event-Driven Harvesting for more information.
You'll need to review and decide on the following before getting started with your first AWS Cloud setup:
1. The type of policy you'll be using to give InsightCloudSec access to your AWS services
2. Whether you have any applicable additional configuration that must be completed, e.g., allowing InsightCloudSec through GuardDuty, enabling opt-in regions, etc.
Updated 13 days ago