website logo
HomeTwitterLinkedInLogin ➡️
⌘K
Overview
Getting started
The Intelligent IaC Difference
Connect Cloud Accounts
AWS Account
Azure Subscription
GCP Project
Managing Cloud Accounts
What are Accounts
Credentials
Scanning Options
Changelog
Compliance
CI/CD
IaC Explorer
IaC Explorer Overview
Codifier
Generating Terraform
Terraform Remote State File Integration
IaC Catalog
Overview
Getting Started
Configuration
Producer Flow
Consumer Flow
Reference
GraphQL API
Management
Security
Feedback/Contact
Docs powered by
Archbee
Connect Cloud Accounts

AWS Account

9min

To authenticate with your AWS account, you will need to grant AutoCloud read-only access to your resources.

Add an AWS account to AutoCloud

  1. Go to Cloud Accounts
  2. Select "Add New" on top right corner
  3. Choose AWS as a provider.
  4. Name your account and add a description, this will be the "Display Information"
  5. Click Next
Document image


6. For AutoCloud to access you will need to generate a cross-account read-only role. It's the simplest and most secure way of authenticating with your AWS account. This role will need the AWS owned "ReadOnlyAccess" permissions only. You may use Terraform (Option 1) or Cloudformation (Option 2) to generate the Role ARN.

Document image


Option 1: Use Terraform to generate Role ARN

Follow the next steps to to generate a Role ARN using Terraform:

  1. Get your AutoCloud organization ID from the modal.
  2. Head over to AutoCloud's AWS Terraform Module.
  3. Get the Provision Instructions, copy and paste into your Terraform configuration.
  4. The following assets will be created:
    1. aws_iam_role - The AWS IAM cross-account role
    2. aws_iam_role_policy_attachment - Several AWS IAM policy role attachments linking the cross-account role to the specific permissions allotted
  5. Copy the role ARN.
Document image


Option 2: Use Cloudformation to create a Role ARN

  1. Click Cloudformation
  2. In AWS Console you must confirm the creation of the Cloudformation stack. This will create a read-only access role, named "AutocloudReadOnly".
Document image


3. Wait for the CloudFormation stack to finish. This should take no more than a couple of minutes.

Document image


4. Copy the new role ARN from CloudFormation stack outputs.

Document image


5. Copy the role ARN.

Connect an AWS account to AutoCloud

  1. Enter the Role ARN to give AutoCloud read-only access. The credentials will be saved and you will be authenticated.
Document image


2. You may select a few Scanning Options like the regions you would like to crawl and the time of the snapshots (this will be daily).

Document image


3. Your account was onboarded and it's now being scanned!

Document image




Updated 26 Jul 2023
Did this page help you?
PREVIOUS
The Intelligent IaC Difference
NEXT
Azure Subscription
Docs powered by
Archbee
TABLE OF CONTENTS
Add an AWS account to AutoCloud
Option 1: Use Terraform to generate Role ARN
Option 2: Use Cloudformation to create a Role ARN
Connect an AWS account to AutoCloud
Docs powered by
Archbee