AWS Permissions
These tables summarize permissions that Axonius requires to fetch various AWS resources. Use this information both to enable required permissions, and to only apply necessary permissions.
All permissions are also listed in JSON format under each table. Note that each JSON lists all permissions and resources, so when copying it, ensure to change it according to your needs.
Adapter Fetch Permissions
AWS Service | Permissions | Axonius Setting |
|---|---|---|
API Gateway |
|
|
API Gateway v2 |
|
|
ACM |
|
|
AppStream |
|
|
AppStream |
|
|
Athena |
|
|
Autoscaling |
|
|
Backup |
|
|
CloudFormation |
|
|
Cloudfront |
|
|
Cloudwatch |
|
|
Direct Connect |
|
|
DynamoDB |
|
|
EC2 |
|
|
ECR |
|
|
ECS |
|
|
EKS |
|
|
ELB |
|
|
ELB v2 |
|
|
Elastic Beanstalk |
|
|
ElastiCache |
|
|
Elasticsearch |
|
|
FSx |
|
|
Globalaccelerator |
|
|
Glue |
|
|
GuardDuty |
|
|
IAM |
|
|
Identity Store |
|
|
Inspector |
|
|
Kinesis |
|
|
Kinesis Data Analytics |
|
|
Lambda |
|
|
Lightsail |
|
|
Macie |
|
|
Organizations - Base |
|
|
Organizations - Account Name |
|
|
Organizations - Complete |
|
|
Outposts |
|
|
RDS |
|
|
Redshift |
|
|
Route53 |
|
|
S3 |
|
|
S3 Outposts |
|
|
SageMaker |
|
|
SecurityHub |
|
|
SNS |
|
|
Step Functions |
|
|
Service Catalog |
|
|
Secrets Manager |
|
|
SQS Queues |
|
|
SSM |
|
|
WAFv1 |
|
|
WAFRegional |
|
|
WAFv2 |
|
|
Workspaces |
|
|
Adapter Fetch Permissions - JSON
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AdapterFetchPermissions",
"Effect": "Allow",
"Action": [
"apigateway:GET",
"acm:DescribeCertificate",
"acm:ListCertificates",
"appstream:DescribeUsers",
"appstream:DescribeUserStackAssociations",
"appstream:DescribeStacks",
"appstream:ListAssociatedFleets",
"appstream:DescribeFleets",
"athena:ListDataCatalogs",
"athena:ListDatabases",
"athena:ListQueryExecutions",
"athena:ListTableMetadata",
"autoscaling:DescribeAutoScalingGroups",
"autoscaling:DescribePolicies",
"autoscaling:DescribeAutoScalingInstances",
"backup:ListBackupPlans",
"backup:ListBackupVaults",
"cloudformation:DescribeStacks",
"cloudformation:ListStackSets",
"cloudformation:ListStacks",
"cloudfront:GetDistribution",
"cloudfront:ListDistributions",
"cloudwatch:GetMetricStatistics",
"cloudwatch:DescribeAlarms",
"directconnect:DescribeConnections",
"directconnect:DescribeLags",
"directconnect:DescribeVirtualGateways",
"directconnect:DescribeVirtualInterfaces",
"dynamodb:DescribeTable",
"dynamodb:DescribeGlobalTable",
"dynamodb:DescribeGlobalTableSettings",
"dynamodb:ListGlobalTables",
"dynamodb:ListTables",
"dynamodb:ListTagsOfResource",
"ec2:CreateSnapshot",
"ec2:DescribeAddresses",
"ec2:DescribeFlowLogs",
"ec2:DescribeImages",
"ec2:DescribeInstances",
"ec2:DescribeInstanceStatus",
"ec2:DescribeInternetGateways",
"ec2:DescribeNatGateways",
"ec2:DescribeRouteTables",
"ec2:DescribeSnapshotAttribute",
"ec2:DescribeSnapshots",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeTags",
"ec2:DescribeVolumes",
"ec2:DescribeVpcPeeringConnections",
"ec2:DescribeVpcs",
"ec2:DescribeVpnConnections",
"ec2:DescribeCustomerGateways",
"ec2:DescribeTransitGatewayAttachments",
"ec2:DescribeTransitGatewayPeeringAttachments",
"ec2:DescribeTransitGatewayRouteTables",
"ec2:DescribeTransitGateways",
"ecr:DescribeImages",
"ecr:DescribeRegistry",
"ecr:DescribeRepositories",
"ecr-public:DescribeImages",
"ecr-public:DescribeRegistries",
"ecr-public:DescribeRepositories",
"ecs:DescribeClusters",
"ecs:DescribeContainerInstances",
"ecs:DescribeServices",
"ecs:DescribeTasks",
"ecs:ListClusters",
"ecs:ListContainerInstances",
"ecs:ListServices",
"ecs:ListTagsForResource",
"ecs:ListTasks",
"eks:DescribeCluster",
"eks:ListClusters",
"elasticloadbalancing:DescribeLoadBalancerPolicies",
"elasticloadbalancing:DescribeLoadBalancers",
"elasticloadbalancing:DescribeListeners",
"elasticloadbalancing:DescribeSSLPolicies",
"elasticloadbalancing:DescribeTargetGroups",
"elasticloadbalancing:DescribeTargetHealth",
"elasticloadbalancing:DescribeTags",
"elasticloadbalancing:DescribeRules",
"elasticbeanstalk:DescribeEnvironments",
"elasticache:DescribeCacheClusters",
"elasticache:DescribeReplicationGroups",
"elasticache:ListTagsForResource",
"es:DescribeElasticsearchDomain",
"es:ListDomainNames",
"fsx:DescribeFileSystems",
"globalaccelerator:ListAccelerators",
"globalaccelerator:ListCustomRoutingAccelerators",
"glue:GetDatabases",
"glue:GetTables",
"guardduty:GetFindings",
"guardduty:GetDetector",
"guardduty:GetMembers",
"guardduty:GetFilter",
"guardduty:ListDetectors",
"guardduty:ListFilters",
"guardduty:ListMembers",
"guardduty:ListFindings",
"iam:GenerateCredentialReport",
"iam:GenerateServiceLastAccessedDetails",
"iam:GetAccessKeyLastUsed",
"iam:GetAccountPasswordPolicy",
"iam:GetAccountSummary",
"iam:GetCredentialReport",
"iam:GetLoginProfile",
"iam:GetPolicy",
"iam:GetPolicyVersion",
"iam:GetRole",
"iam:GetRolePolicy",
"iam:GetServiceLastAccessedDetails",
"iam:GetUser",
"iam:GetUserPolicy",
"iam:ListAccessKeys",
"iam:ListAccountAliases",
"iam:ListAttachedGroupPolicies",
"iam:ListAttachedRolePolicies",
"iam:ListAttachedUserPolicies",
"iam:ListEntitiesForPolicy",
"iam:ListGroups",
"iam:ListGroupsForUser",
"iam:ListInstanceProfilesForRole",
"iam:ListMFADevices",
"iam:ListPolicies",
"iam:ListRolePolicies",
"iam:ListRoles",
"iam:ListUserPolicies",
"iam:ListUserTags",
"iam:ListUsers",
"iam:ListVirtualMFADevices",
"identitystore:ListGroups",
"identitystore:ListUsers",
"identitystore:ListGroupMembershipsForMember",
"sso:ListInstances",
"sso:ListPermissionSets",
"sso:ListAccountsForProvisionedPermissionSet",
"sso:ListAccountAssignments",
"inspector:ListFindings",
"inspector:DescribeFindings",
"inspector2:ListFindings",
"inspector2:ListMembers",
"kinesis:ListStreams",
"kinesisanalytics:DescribeApplication",
"kinesisanalytics:ListApplications",
"lambda:GetPolicy",
"lambda:GetFunctionUrlConfig",
"lambda:ListFunctions",
"lambda:ListTags",
"lightsail:GetInstances",
"macie2:GetFindings",
"macie2:ListFindings",
"macie2:ListMembers",
"organizations:DescribeAccount",
"organizations:DescribeOrganization",
"organizations:ListPoliciesForTarget",
"organizations:ListTagsForResource",
"organizations:ListAccounts",
"organizations:DescribeEffectivePolicy",
"organizations:DescribePolicy",
"outposts:ListAssets",
"outposts:ListSites",
"outposts:ListOutposts",
"rds:DescribeDBClusters",
"rds:DescribeDBInstances",
"rds:DescribeOptionGroups",
"rds:DescribePendingMaintenanceActions",
"redshift:DescribeClusters",
"route53:ListHostedZones",
"route53:ListResourceRecordSets",
"route53domains:ListDomains",
"route53domains:GetDomainDetail",
"route53resolver:ListResolverRules",
"route53resolver:ListResolverRuleAssociations",
"s3:GetAccountPublicAccessBlock",
"s3:GetBucketAcl",
"s3:GetBucketLocation",
"s3:GetBucketLogging",
"s3:GetBucketPolicy",
"s3:GetBucketPolicyStatus",
"s3:GetBucketPublicAccessBlock",
"s3:GetBucketTagging",
"s3:GetEncryptionConfiguration",
"s3:ListAllMyBuckets",
"s3:ListBucket",
"sagemaker:ListNotebookInstances",
"sagemaker:DescribeNotebookInstance",
"sagemaker:ListTags",
"securityhub:DescribeHub",
"securityhub:GetFindings",
"securityhub:ListMembers",
"securityhub:ListTagsForResource",
"sns:ListSubscriptionsByTopic",
"states:ListStateMachines",
"states:DescribeStateMachine",
"servicecatalog:ListPortfolios",
"servicecatalog:DescribePortfolio",
"secretsmanager:ListSecrets",
"secretsmanager:GetResourcePolicy",
"sqs:ListQueues",
"sqs:GetQueueAttributes",
"ssm:DescribeAvailablePatches",
"ssm:DescribeInstanceInformation",
"ssm:DescribeInstancePatches",
"ssm:DescribePatchGroups",
"ssm:GetInventorySchema",
"ssm:ListInventoryEntries",
"ssm:ListResourceComplianceSummaries",
"ssm:ListTagsForResource",
"ssm:DescribeParameters",
"ssm:GetParameter",
"waf:GetWebACL",
"waf:ListWebACLs",
"waf-regional:GetWebACL",
"waf-regional:GetWebACLForResource",
"waf-regional:ListWebACLs",
"wafv2:GetWebACL",
"wafv2:GetWebACLForResource",
"wafv2:ListWebACLs",
"workspaces:DescribeTags",
"workspaces:DescribeWorkspaceDirectories",
"workspaces:DescribeWorkspaces",
"workspaces:DescribeWorkspacesConnectionStatus"
],
"Resource": "*"
}
]
}Enforcement Center Permissions
AWS Service | Permissions | Resource Scope | Axonius Setting |
|---|---|---|---|
S3 |
| These permissions should be scoped to a bucket/objects that are specifically created for Axonius to write to. Do not scope these permissions to all resources. | Enforcement Center Actions that involve sending data to S3. For more information, see the Enforcement Center Action Index |
EC2 |
| Enforcement Center Actions that start and stop EC2 instances. Enforcement Center Actions that manage tags on EC2 instances. | |
IAM |
| Enforcement Center Actions that manage IAM users. | |
SSM |
| Enforcement Center Actions that install and patch software using SSM. |
Enforcement Center Permissions - JSON
{
"Version": "2012-10-17",
"Statement":[
{
"Effect":"Allow",
"Action":[
"s3:GetObject",
"s3:ListBucket",
"s3:PutObject",
"s3:ListAllMyBuckets",
"s3:PutObjectTagging",
"s3:DeleteObject",
"ec2:StartInstances",
"ec2:StopInstances",
"tag:GetResources",
"tag:TagResources",
"tag:UntagResources",
"tag:GetTagKeys",
"tag:GetTagValues",
"iam:ListUserTags",
"iam:TagUser",
"iam:UntagUser",
"iam:UpdateLoginProfile",
"iam:DeleteUser",
"iam:ListGroupsForUser",
"iam:RemoveUserFromGroup",
"iam:ListAccessKeys",
"iam:DeleteAccessKey",
"ssm:CreateAssociation",
"ssm:RegisterTaskWithMaintenanceWindow"
],
"Resource":"*"
}
]
}Cloud Asset Compliance Permissions
AWS Service | Permissions | Resource Scope | Axonius Setting |
|---|---|---|---|
CloudTrail |
| Axonius Cloud Asset Compliance | |
Cloudwatch |
| Axonius Cloud Asset Compliance | |
IAM |
| Axonius Cloud Asset Compliance | |
Config |
| Axonius Cloud Asset Compliance | |
Logs |
| Axonius Cloud Asset Compliance | |
KMS |
| Axonius Cloud Asset Compliance | |
EC2 |
| Axonius Cloud Asset Compliance | |
RDS |
| Axonius Cloud Asset Compliance | |
Elastic File System |
| Axonius Cloud Asset Compliance | |
Security Hub |
| Axonius Cloud Asset Compliance | |
SNS |
| Axonius Cloud Asset Compliance |
Cloud Asset Compliance Permissions
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "CloudAssetCompliance",
"Effect": "Allow",
"Action": [
"cloudtrail:DescribeTrails",
"cloudtrail:GetEventSelectors",
"cloudtrail:GetTrailStatus",
"cloudwatch:DescribeAlarmsForMetric",
"iam:GenerateCredentialReport",
"config:DescribeConfigurationRecorderStatus",
"config:DescribeConfigurationRecorders",
"logs:DescribeMetricFilters",
"kms:ListKeys",
"ec2:DescribeInstances",
"ec2:GetEbsEncryptionByDefault",
"ec2:DescribeRouteTables",
"rds:DescribeDbInstances",
"elasticfilesystem:DescribeFileSystems",
"securityhub:DescribeHub",
"sns:ListSubscriptionsByTopic"
],
"Resource": "*"
}
]
}Other Permissions
AWS Service | Permissions | Resource Scope | Axonius Setting |
|---|---|---|---|
S3 – Data Sync (Central Core) |
| Needs to be scoped to a specific key store that has been created for Axonius. | Central Core |
S3 – AssumeRole Fetch |
| Specific bucket and object that contains the roles-to-assume file. | Advanced Configuration File setting: |
Secrets Manager – Vault |
| Can be scoped to all resources; however, Axonius recommends managing access to secrets within Secrets Manager through resource-based policies. | Only needed if using AWS Secrets Manager as a Vault. |
SSM |
| EC Action for Install Software and Patches Instances | |
STS |
| Should be scoped to roles utilized by Axonius as a part of our Roles-to-Assume / Organizations Discovery implementation. | Roles to Assume |
Other Permissions - JSON
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "OtherPermissions",
"Effect": "Allow",
"Action": [
"kms:GenerateDataKey",
"kms:Decrypt",
"s3:GetObject",
"secretsmanager:GetSecretValue",
"ssm:CreateAssociation",
"ssm:RegisterTaskWithMaintenanceWindow",
"sts:AssumeRole"
],
"Resource": "*"
}
]
}Updated 5 days ago
