How to connect AWS to Vanta
You can connect one or many AWS (Amazon Web Services) accounts to Vanta. To add an account to Vanta, you'll need to navigate to your connections page, click "+ Add" under Cloud Providers, and select Amazon Web Services:
After clicking "Connect Amazon Web Services", you will be prompted with the following message:
If you are adding an additional AWS account, you can instead select the (...) menu, then click "edit." This will give you the option to add an additional account by selecting "Add new account."
Vanta Linking Page 1, Policy Creation:
Clicking "Get Started" will bring you to the following page for instructions on setup:
To set up the policy in AWS
- Navigate to the AWS policy creator and click on the JSON tab:
- Paste the policy from Vanta into the editor:
- Click Review Policy and name the policy VantaAdditionalPermissions
Then, click "Next: Tags" from the screenshot above which will bring you to this page.
There is no need to modify anything on this page, you can select "Next: Review"
On the following page, you will perform the listed steps to name the policy, "VantaAdditionalPermissions"
Entering the name is the only required information on this page:
- Click "Create Policy"
Vanta Linking Page 2, Role Creation:
After the policy is created in AWS, return to Vanta and click "Next" in the bottom right of the page to see to the second linking page instructions for AWS:
To Set the AWS Role Creator
- Navigate to the AWS role creator and make sure Another AWS Account is selected
- Paste the Account ID value from Vanta into the account ID field in AWS
- Select "Require External ID" and enter the value from that field in Vanta
- Confirm that Require MFA is not selected
- Click Next: Permissions
Here's a screenshot of what these steps look like in AWS:
Next,
- Search for
SecurityAudit
and check the box next to theSecurityAudit
Policy. Do the same for theVantaAdditionalPermissions
policy that we just created. - Click Next: Tags
Adding SecurityAudit permissions:
Adding VantaAdditionalPermissions and selecting Next:Tags:
- Click Next: Review and name the role vanta-auditor
There is no need to make any changes on this page:
Next,
- Click "Create Role":
Vanta Linking Page 3, Copying the Role ARN:
After the Role is created in AWS, you will return to Vanta and click "Next" in the bottom right of the page to get to the third linking page for AWS:
To obtain the Role ARN from AWS
- Navigate to the vanta-auditor role that you just created:
- Copy the entire Role ARN from AWS, and paste it into Vanta:
Vanta Linking Page 4, Selecting Regions:
After selecting "Choose Regions" in the screenshot above, you will be brought to the following page where you can select which regions from the specified account that you would like to monitor:
By default, Vanta will select all regions that you are currently using, but you can select the "X" to remove any regions that you don't wish to be monitored. If removed, Vanta will not monitor any resources within that region in the account.
Clicking "Finish" will complete the linking process. If it's successful, you will receive the message "AWS connection created":
If you're not using S3 Bucket policies, you will not need to modify any policy for Vanta to read in S3 Buckets. If your account is using S3 buckets, you may be using S3 Bucket Policies. If so, you'll need to also modify these permissions to let Vanta fetch your buckets, since S3 bucket policies override the default permissions.
To do this, grant further permissions to `vanta-auditor` on the bucket policy itself by following instructions under "Granting cross-account bucket access to a specific IAM role" in AWS's guide. The permissions should be those from the `SecurityAudit` policy. Here is an example of what you would add to the bucket policy:
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::111111111111:role/Vanta-Auditor"
},
"Action": [
"s3:GetAccelerateConfiguration",
"s3:GetAccessPoint",
"s3:GetAccessPointPolicy",
"s3:GetAccessPointPolicyStatus",
"s3:GetAccountPublicAccessBlock",
"s3:GetAnalyticsConfiguration",
"s3:GetBucket*",
"s3:GetEncryptionConfiguration",
"s3:GetInventoryConfiguration",
"s3:GetLifecycleConfiguration",
"s3:GetMetricsConfiguration",
"s3:GetObjectAcl",
"s3:GetObjectVersionAcl",
"s3:GetReplicationConfiguration",
"s3:ListAccessPoints",
"s3:ListAllMyBuckets",
],
"Resource": "arn:aws:s3:::MyExampleBucket/*"
},