AWS Overview (concept)
Multicloud Defense has created a CloudFormation template that you use when connecting an AWS account to the Multicloud Defense Controller.
To prepare a cloud account for integration with Multicloud Defense Controller, there are certain steps that need to be performed in the cloud account. Perform these prerequisite steps before connecting your AWS cloud account to the Multicloud Defense Controller. This provides an overview of the operation but is not intended to be performed manually. In the CloudFormation section, there are details of deployments and parameters information.
Overview of steps
-
Create a cross-account IAM role that the Multicloud Defense Controller uses to manage your cloud account.
-
Create an IAM role that is assigned to the Multicloud Defense Gateway EC2 instances that run in your account.
-
Create a CloudWatch event rule that transfers the management events to the Multicloud Defense Controller.
-
Create an IAM role that is used by the CloudWatch event rule to grant it the permissions to transfer the management events.
-
Optionally, create an S3 bucket in your account to store CloudTrail events, Route53 DNS query logs, and VPC Flow Logs.
-
Enable Route53 DNS Query Logging with the destination as the previously created S3 Bucket, and select the VPCs for which query logging must be enabled.
-
Enable CloudTrail to log all the management events to the S3 Bucket created above.
-
Enable VPC Flow Logs with destination as the S3 Bucket created above.
-
Accept the AWS Marketplace Terms of Service.


Feedback