CloudCheckr recommends that customers create AWS credentials using CloudFormation.
This procedure shows you how to use CloudFormation to create an cross-account role that will streamline the credential process and ensure your AWS permissions always stay up-to-date.
- Log into your AWS Management Console.
- In the Billing & Cost Management Dashboard, verify that the Receive Billing Alerts checkbox is selected. (optional)
- Launch the Cloudcheckr application.
- Select an account from the list.
- From the left navigation pane in Cloudcheckr, select Account Settings > AWS Credentials.
- Copy the external ID value from CloudCheckr.
- Click the Launch CloudFormation Stack link.
- Click Next.
- Type a name for your stack and paste the external ID value from CloudCheckr into the corresponding field in CloudFormation.
- For each of the separate policies—Inventory, Billing, Security, and CloudWatch Flow Logs—select True or False if you want to include that policy in your template.
- For Billing, type the name of your AWS Detailed Billing Report bucket.
- For Security, type the name of your AWS CloudTrail bucket.
- Click Next.
- Configure your stack options (optional) and click Next.
- Select the I Acknowledge that AWS CloudFormation might create IAM resources check box and click Create.
- When the stack creation is complete, select your stack name from the list and click the Resources tab.
- Click the Physical ID link for the IAM role.
- From the Summary page, copy the Role ARN value.
- Return to CloudCheckr.
- Select the checkbox if this is an account from India managed by Amazon Internet Services Pvt. Ltd (AISPL).
- In the AWS Role ARN text field, paste the Role ARN value and click Update.
The Use a Role for Cross-Account Access tab displays by default. It contains instructions on how to use CloudFormation to create a cross-account role.
The Select Template screen in the Create stack wizard opens.
Under the Specify an Amazon S3 template URL, a link to the related template is provided.
The Specify Details screen opens.
Note: Keep the stack name as short as possible; it gets appended to the Role ARN value later in this procedure, and that value cannot exceed 64 characters.
The Options screen opens.
Your account will now be populated with proper AWS credentials that Cloudcheckr will continue to update with new permissions whenever new features are released.
Preparing Your AWS Account