This page outlines the steps to enable AWS Integration with Zilla. We will be using the Delegate access across AWS accounts using IAM roles tutorial as a guide to allow you to delegate access of your AWS account to Zilla’s AWS account using AWS IAM Roles.
Table of Contents | ||||
---|---|---|---|---|
|
Bring in IAM Users and Groups into Zilla
...
Login to the AWS Account via the AWS Management Console
Enter your 12-digit account number. Click
Next
and then enter your username and password to login.Once you are logged in, you will land on the home page with a search bar at the top.
In the search bar, search for IAM and click on the search result called IAM.
You will be redirected to the IAM dashboard.
Before creating a role, we will first create a policy that will be assigned to the role. Click
Policies
on the left hand side menu.Search
for Security Audit policyClick
Create policy
and then click on theJSON
tab.IAM Policy Creation: Enter the following
json
snippet and clickNext Tags
. Replace<YOUR_AWS_ACCOUNT_ID>
with your 12 digit AWS Account ID. The following policy allows Zilla to read the IAM Users and Groups information from your AWS accountCode Block { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": "iam:GetGroup", "Resource": "arn:aws:iam::<YOUR_AWS_ACCOUNt_ID>:group/*" }, { "Sid": "VisualEditor1", "Effect": "Allow", "Action": "iam:GetAccountAuthorizationDetails", "Resource": "*" } ] }
Optionally add tags and click
Next: Review
.Review Policy: On the review page, enter the Name (
Zilla-IAM-Reader-Policy
) and optionally a description for the policy. Review the permissions assigned to the policy and then clickCreate policy
The policy will look like this:You will see a success message that the policy has been created.
To confirm that the policy is present, you can search for it in the policy search bar. You will see your newly added policy in the list.
Click on the policy
Zilla-IAM-Reader-Policy
to double check the assigned permissions. The policy will look like this:Click on the
{} JSON
tab to double check the policy json.(Account ID redacted from screenshot)
...