AWS allows you to combine AWS Config log files from multiple AWS accounts into a single S3 bucket. Using CloudCheckr’s Multi-Account View, you can view the details and changes from these config logs. CloudCheckr will also automatically funnel the data down from the Multi-Account View into the general accounts, if they have been added to CloudCheckr.
Note: You must use a multi-account view in CloudCheckr to process aggregated AWS Config logs.
To configure your CloudCheckr Multi-Account View to retrieve the log files from your AWS aggregated S3 bucket, follow these steps:
- Load (or create) the Multi-Account View you would like to configure from your list of Multi-Account Views.
- In the left-hand menu of reports, select Security > AWS Config > Aggregated S3 Buckets > Configure
- Within the Name of the S3 Bucket storing the Aggregate AWS Config data text field, enter the exact name of the S3 bucket where your aggregate AWS Config logs are being stored.
- Enter the access key and secret key from an IAM user that has permissions to access the S3 bucket storing the aggregate AWS Config logs.
Note: The IAM user must exist in the same AWS account as the S3 aggregated bucket.
Note: Review Creating Credentials Using an IAM Access Keys for instructions on how to create an IAM access key and secret key.
These are the IAM permissions needed for CloudCheckr to verify and process the AWS Config data from the aggregate S3 bucket:
"iam:GetUser", "s3:List*", "s3:GetBucketLocation", "s3:GetObject"
- Click the Update button.
CloudCheckr will now begin downloading the Trail data from that AWS Config bucket. Once that’s finished, you can use the AWS Config reports within this Multi-Account View to explore the data.