/
IAM Configuration for vDiscovery

IAM Configuration for vDiscovery

In order to use the Infoblox vDiscovery for AWS feature described in the Configuration section of this guide, you will need an IAM user or role with some minimum permissions to view resources in AWS. Minimum permissions required in AWS to conduct vDiscovery are:

  • iam:GetUser

  • ec2:DescribeVpcs

  • ec2:DescribeSubnets

  • ec2:DescribeRouteTables

  • ec2:DescribeAddresses

  • ec2:DescribeNetworkInterfaces

  • ec2:DescribeInstances

 

The following topics are covered in this section:

IAM Policy

First, we will create a custom policy with the permissions listed above to assign to users or roles.

  1. In the AWS Management Console, Use the Services menu to navigate to IAM under Security, Identity, & Compliance.

  2. Select Policies from the IAM menu.

  3. Click on Create policy.

Graphical user interface, application

Description automatically generated
  1. Policies can be selected through the visual editor or defined using JSON. For this guide, we will use JSON. Click the JSON tab.

Graphical user interface, application

Description automatically generated
  1. In the JSON editor view, you will see the base outline for a policy definition:

  1. Between the square brackets next to Statement, paste the following to define your policy:

        {

            "Effect": "Allow",

            "Action": [

                "ec2:DescribeAddresses",

                "ec2:DescribeInstances",

                "ec2:DescribeNetworkInterfaces",

                "ec2:DescribeVpcs",

                "ec2:DescribeSubnets",

                "ec2:DescribeRouteTables"

            ],

            "Resource": "*"

        },

        {

            "Effect": "Allow",

            "Action": "iam:GetUser",

            "Resource": "arn:aws:iam::*:user/*"

        }

  1. Your JSON policy definition should look like this:

Text

Description automatically generated
  1. Click Next: Tags. Add tags if desired.

  2. Click Next: Review.

  3. Name your policy. 

  4. Optionally, add a description.

  5. Review the Summary.

  6. Click Create Policy.

Graphical user interface, text, application, email

Description automatically generated

IAM User

Next, we will create a user with an access key that can be used to authenticate for vDiscovery jobs.

  1. Select Users from the IAM menu.

  2. Click Add users

Graphical user interface, application

Description automatically generated
  1. Name the user.

  2. Click Next.

Graphical user interface, text, application, email

Description automatically generated
  1. Under Permissions options, select Attach policies directly.

  2. Use the Permissions policies search to locate and select your vDiscovery policy.

  3. Click Next.

Graphical user interface, application, table

Description automatically generated
  1. On the Review and create step, review details and click Create user.

  2. After the user is created, search for and click on the new user.

Graphical user interface, application

Description automatically generated
  1. Select the Security credentials tab.

Graphical user interface, application, table

Description automatically generated
  1. Scroll down to the Access Keys section and click Create access key.

Graphical user interface, text, application, email

Description automatically generated
  1. Select Other and click Next.

Graphical user interface, text, application, email

Description automatically generated
  1. Add a description for the key and click Create access key.

Graphical user interface, text, application

Description automatically generated
  1. Click Download .csv file to retrieve the new keys.

Graphical user interface, text, application, email

Description automatically generated

Warning: This is the only opportunity to download or view these credentials. If you do not save them, or lose them later, you will have to create new access keys for this user.

  1. Click Done.

Rotating Credentials

When using user access keys as described in the previous section, keys should be rotated on a regular basis, at a minimum every 90 days. To rotate access keys for an IAM user, follow the guidance in AWS documentation: Manage access keys for IAM users - AWS Identity and Access Management , specifically the section titled Rotating access keys.

IAM Role

Creating a role to use for vDiscovery is optional and if desired should be completed prior to deploying your vNIOS for AWS instance. The role can be assigned to your instance during deployment, as described in the Deploy vNIOS Instance in AWS → Configure Instance Details section of this guide. It is also possible to add roles to a running instance using the AWS CLI command: aws ec2 associate-iam-instance-profile. See AWS CLI documentation for details on working with this and other commands related to IAM roles: https://docs.aws.amazon.com.

  1. In the AWS Management Console, Use the Services menu to navigate to IAM under Security, Identity, & Compliance.

  2. Select Roles from the IAM menu.

  3. Click on Create role.

Graphical user interface, application

Description automatically generated
  1. For Trusted entity type, select AWS service.

  2. For Use case, select EC2.

  3. Click Next.

Table

Description automatically generated with low confidence
  1. Enter the name of your policy in the search bar or scroll down to locate your policy.

  2. Check the box next to your vDiscovery policy.

  3. Click Next.

Graphical user interface, text, application, email

Description automatically generated
  1. Enter a name under Role name.

  2. Optionally, add a description.

  3. Review the role properties.

  4. Scroll down and click Create role.

Graphical user interface, text, application, email

Description automatically generated

Related content