How to Onboard an AWS Master Account

This topic guides you to onboard an AWS Master account into CoreStack.

Pre-onboarding

There are certain prerequisites that need to be set up in your AWS account before it can be onboarded into CoreStack. It primarily involves creating an IAM Role for CoreStack and providing it with necessary access.

Authorize CoreStack to Access Your AWS Account

You can use IAM roles to delegate access to your AWS resources. With IAM roles, you can establish trust relationships between your trusting account and other AWS trusted (CoreStack) accounts. The trusting account owns the resource to be accessed and the trusted account contains the users who need access to the resource.

📘

Note: IAM User (Access Key and Secret Key) based authentication is no longer supported. This is in compliance with the security standards and recommendations prescribed by AWS.

CoreStack would use the AWS Security Token Service (AWS STS) “AssumeRole” API operation. This operation provides temporary security credentials that enable access to AWS resources in your account.

Refer this link for more information: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html

Required Credentials:

  • Role ARN: The Amazon Resource Name (ARN) of IAM Role.
  • External ID: The external ID can be any word or number that is agreed upon between you and the third-party account.

📘

Note: This is a unique ID created for each CoreStack customer. Hence to get the ID for your account, please reach out to [email protected]. The support channel is available 24×7 and you can expect a response within 2 hours.

  • Require MFA: Flag to identify if the role is restricted with multi-factor authentication (MFA).

The IAM role must be created with the following access permissions.

  • For Assessment: Read-Only Access.
  • For Assessment + Governance: Read-Write Access.

CoreStack simplifies this process by providing a CloudFormation Template that will take care of creating an IAM Role and assign the necessary permissions automatically.

You can use the S3 URLs provided based on the type of access you wish to provide for CoreStack.

  • S3 URL with Template for Assessment Only (Read-Only Access): Click here
  • S3 URL with Template for Assessment + Automation (Read-Write Access): Click here

Setting Up the IAM Role

  1. Login to the AWS account.
  2. Navigate to CloudFormation.
  3. Click Create Stack with new resources. The Step 1 screen of Create Stack section appears.
  4. Select Template is ready option in the Prepare template field.
  5. Select Amazon S3 URL option in the Template source field.
  6. Copy the required S3 URL with Template from the above section and paste it in the Amazon S3 URL text field.
  7. Click Next. The Step 2 screen appears.
  8. Provide values for the Stack name and Role name fields. If you have used the Amazon S3 URL with template for Read-Write Access, you can view additional fields that can be left with default values. However, if you do NOT want to configure CFN or GuardDuty or Inspector for your AWS account, you can set them as “false”.
  9. Click Next. The Step 3 screen appears.
  10. You can leave the values for the fields in this screen as default or make changes as necessary including assigning Tags, providing notification options, etc.
  11. Click Next. The Step 4 screen appears.
  12. The information provided in all the steps will be displayed. After reviewing the provided information for correctness, scroll down to the end of the screen and click on the acknowledge checkbox.
  13. Click Create Stack.

The stack creation process will be initiated, and the status can be viewed.

  1. Navigate to Stack Info tab to see the overview of the stack and the final status.
  2. Click Refresh icon to retrieve the updated status. When it is successfully completed, you will see the status as “CREATE_COMPLETE”.
  3. Navigate to Outputs tab to view the access credentials (ARN).

You need to copy this information and keep it ready in a notepad to be able to copy paste into CoreStack while onboarding. This is the information required to onboard the account into CoreStack.

Setting Up Cost Reports

Cost and Usage Report (CUR) must be enabled in your AWS account which enables CoreStack to fetch the Billing data from your account. This is required for providing Cost Visibility and Cost Analytics for your accounts. If you already have this enabled, you can skip the below step and just be ready with the S3 Bucket name where the CUR files are being placed by AWS.

📘

Note: AWS used to provide billing data only at the Management (Payer) Account level. From Dec-2020, AWS provides billing data for Linked Accounts as well. If you have onboarded both your Master and Linked Accounts, CoreStack can directly fetch the billing data from the Management Account for all the linked accounts.

To set up the Cost Usage Report, you should login as “Root User” into your Master (Payer) AWS account and complete the following steps:

  1. Login to the AWS Master account as Root User.
  2. Navigate to Billing Dashboard.
  3. Select Cost & Usage Reports from the Left Navigation Menu.
  4. Click Create report.

📘

Note: If you already have a report configured, you can still review the following steps to ensure that all the settings configured properly. Use the Edit option to make any changes.

  1. Provide necessary details about the report content in the first step. Ensure that the following 2 checkboxes are enabled: “Include Resource IDs” and “Automatically refresh...”.
  2. Click Next. The screen with Delivery Options appears.
  3. Select the following values for the respective fields:
    1. Report Path Prefix: Optional Field. It can be left blank. There will be no impact even if some prefix is provided.
    2. Time Granularity: Hourly.
    3. Report Versioning: Create new report version.
    4. Compression Type: GZIP.
  4. Also, the S3 Bucket Configuration must be performed in this step:
    1. Click Configure.
    2. If you already have a bucket with the appropriate permissions, you can select the same. Or you can select Create a bucket (this is recommended).
    3. AWS will take care of creating this new bucket and attaching the necessary policies.
    4. Click Next to view the policy to be applied.
    5. Enable the checkbox “I have confirmed…” that is available below.
    6. Click Save to complete the process. The S3 Bucket will be successfully configured.
    7. Click Next to proceed to the next step.
  5. The last step is to review the provided values and complete CUR configuration. Ensure that the following values are configured correctly.
    1. Time Granularity: Hourly.
    2. Report Versioning: Create new report version.
    3. Compression Type: GZIP.
  6. Click Review and Complete.

The report will be created successfully. You can now continue with onboarding the account to CoreStack. It will take up to 24 hours before AWS places the first report (CSV file in Gzip format) in the S3 bucket. Hence, the cost data will not be available for CoreStack till then.

Select Cost Allocation Tags

It is mandatory to configure cost allocation tags in order to process the cost data.

To set up Cost Allocation Tags, perform the following steps:

  1. Navigate to Billing Dashboard.
  2. Select Cost Allocation Tags from the Left Navigation Menu.
  3. Click Activate button.

The recommended tags to be activated are: Application, Environment, Cost Center, Owner. You can also choose to add additional tags as per your requirement.

Impact on the AWS Account

Read-Only Access (Assessment Only):

Since the access is read-only, there are no resources with configurations done by CoreStack in your AWS account. There is absolutely no resource or billing impact in this case.

📘

Note

  1. If you had enabled Cost & Usage Report specifically for CoreStack, the S3 Bucket will incur some minimal cost based on the size of the usage reports placed by AWS.
  2. If you had enabled AWS Cost Explorer API to be used by CoreStack for a faster cost data retrieval, additional cost will be incurred based on the API requests initiated. Approximately, each request will incur a cost of $0.01. Refer AWS Cost Explorer API pricing page for more details.

Read-Write Permissions (Assessment + Governance):

Following resources will be created based on your selection during onboarding:

  1. Cloud Trail: CoreStack requires a cloud trail to be available in each of your preferred AWS regions. You may select an existing trail to be used or choose the option to create a new trail. Such new trails created may attract additional charges.

📘

Note: If the one created is the first trail, it is free of cost. If it is an additional trail, it may involve charges.

  1. S3 Buckets: As part of the Cloud Trail configurations, S3 buckets are also created in the respective AWS regions to collect the logs.
    1. If you had chosen to use existing trail, there are no new buckets created.
    2. If you had chosen to create a new trail, the corresponding S3 Bucket will be created and there will be a charge associated.
  2. CloudWatch Alarms will be created for selected metrics for various resource types supported by CoreStack. As part of post onboarding, you will see the list of metrics for each resource type for which you can define monitoring thresholds and alerts.

Billing Impact due to CoreStack Onboarding

There could be additional charges based on the configuration done for your accounts after onboarding:

Configuration

Description

Billing Impact

CloudTrail

Case-1: An existing trail is configured for CoreStack.

Case-2: There are other Trails that were created before / after onboarding your account to CoreStack.

Case-1: Charges for the S3-Bucket where the Cloud Trails logs are stored. This is usually very minimal.

Case-2: Charges for the S3-Bucket where the Cloud Trails logs are stored. Management event charges for the second trail at the rate of $2.00 per 100,000 events.

CloudWatch Alarm

Standard Resolution (60 sec)

$0.10 per alarm metric

CloudWatch Metric Data

GetMetricData – CoreStack fetches the metric data from AWS

$0.01 per 1,000 metrics requested

AWS Configuration Recorder,

GuardDuty Notifications,

AWS KMS Keys,

AWS Config Policy

These services will be used only for Assessment + Governance access type and it is optional for the user to enable them. If enabled, relevant charges will be applicable.
AWS Configuration Recorder: Used to identify issues in resource configurations.
GuardDuty Notifications: Used for threat detection.
AWS KMS Keys: Used to execute guardrail policies for KMS auditing and finding violations.
AWS Config Policy: Used to execute configuration policies evaluation.

Refer to pricing pages of relevant AWS resources for more pricing details.

Onboarding

The following steps need to be performed to onboard an AWS account.

  1. Click Add New button in the CoreStack dashboard and select Single Account.
  2. Click Start Now. The onboarding screen appears.
  3. Select AWS option in the Public Cloud field.
  4. Click Get Started button.
  5. Select the required option in the Access Type field. The options are: Assessment and Assessment + Governance.
  6. Select the Master Account option in the Account Type field.
  7. Select the required option in the AWS Environment field. The options are: AWS Standard and AWS Gov Cloud.
  8. Select the required option in the Authentication Protocol field. The options are: Assume Role and Access Key.
  9. Click Next.
  10. Provide the necessary details (Amazon Resource Name ID (ARN), External ID, & MFA Enabled OR Access Key & Secret Key) explained in the Pre-onboarding section based on the option selected in the Authentication Protocol field.

📘

Note: For MFA Enabled field, select True or False based on whether your account is restricted with Multi-Factor Authentication.

  1. Specify the name of the S3 bucket to be used for storing cost reports in the Bucket Name field.
  2. Select the required option in the Cost Report Format field. The options are: Standard and Amazon Athena. Choose Standard or Athena based on how your cost reports are configured. The default option is Standard where your cost reports are placed as a CSV file in an S3 bucket.
  3. Click Validate button.
  4. The Advanced Settings section will be displayed with additional fields (Name, Preferred Regions, and Scope).
  5. Modify the prepopulated name of the account in the Name field, if required.
  6. Select the required regions in the Preferred Regions dropdown list. Multiple regions can be selected.
  7. Select the required option in the Scope field. The options are: Account, Private, and Tenant.
  8. Click I’m Done button.

The AWS Account will be onboarded successfully into CoreStack. Relevant insights and information about the resources available in the account will be populated under each cloud governance pillars in CoreStack.


Did this page help you?