Configuring AWS Automatically

SailPoint provides CloudFormation templates to automate the creation of IAM roles and policies, a CloudTrail trail, and an S3 Bucket. Depending on your configuration preference and existing infrastructure, different templates are available.

Collecting Data from All AWS Accounts

SailPoint collects resources across all AWS Accounts in an organization in two steps: it first lists all AWS Accounts using the management account role with organization permissions, then assumes a role in each member account with the same role name and external ID.

SailPoint offers CloudFormation templates to create identical roles with minimum permissions in each member account, and creates the primary role in the management account with the minimum organization permissions for listing AWS accounts.

You will first enable inventory collection in all accounts. You can then choose to include activity data in your SailPoint tenant.

Collecting Resources from All AWS Accounts

The following process creates a role and policies with minimum privileges in the management account.

Create an in-line policy on the role for reading resource data from your AWS cloud.

To enable inventory collection in all accounts:

  1. Follow the AWS directions to create a stack in the root management account where logs are captured.

  2. Upload the appropriate cloud formation template:

Use these cloud formation templates if you are using AWS accounts with CEIM and Activity Insights, to collect CEIM data from all AWS accounts.

Important
You must verify your configuration before connecting your source. The following section provides verification steps.

Verifying Your AWS Configuration

When you have finished connecting your AWS accounts, you must verify that the configuration was successful. To verify your configuration:

  1. In the AWS Console IAM service, select Roles.

  2. Search for the IAM role created by CloudFormation. Select the role and save its name and ARN. For example, arn:aws:iam::xxxxxxxxxxxx:role/SailPointAWSRole

  3. Select the Trust Relationships tab and confirm the principal displays:

    874540850173 for Commercial accounts

    229634586956 for GovCloud accounts

  4. Select Policies and search for the IAM role created by CloudFormation. For example, SailPointAWSRole

  5. Select Permissions and verify the bucket name in the JSON.

  6. Ensure the policy allows s3:GetBucketLocation and s3:ListBucket actions on the CloudTrail bucket, and the s3:GetObject action on the S3 bucket contents.

Viewing a Summary of the Details

  1. Go to CloudFormation > Stacks, and select the stack.

  2. Select the Parameters tab to view the key values for your configuration.