Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cloudformation: Investigate if cloudbeat-root is needed in single account #2433

Open
moukoublen opened this issue Aug 14, 2024 · 0 comments
Open
Labels
Team:Cloud Security Cloud Security team related

Comments

@moukoublen
Copy link
Member

moukoublen commented Aug 14, 2024

The role cloudbeat-root seems to be used only in AWSOrg functionality and thus not needed in single account cloudformation script.

Single account cloudformation deploys the role ElasticAgentRole (with a unique name) that contains the necessary policy (SecurityAudit) that is then referenced into ElasticAgentInstanceProfile which is used into the EC2 instance which seems to be enough for the single account.

We should verify that cloudbeat-root is not actually used in single account cspm (aws - cloudformation) deployments and if it's not we should remove it from single account cloudformation yaml.

@moukoublen moukoublen added the Team:Cloud Security Cloud Security team related label Aug 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Team:Cloud Security Cloud Security team related
Projects
None yet
Development

No branches or pull requests

1 participant