Connect Cloud Account
Onboard one or more cloud accounts into Multicloud Defense as the first step. This enables the Multicloud Defense Controller to interact with each account by discovering inventory, enabling traffic and logs, orchestrating security deployment, and managing policy.
Use these procedures to connect your cloud service provider account to the Multicloud Defense Controller.
Connect An AWS Account
Use this procedure to connect to an AWS subscription through Multicloud Defense's easy setup wizard.
Before you begin
-
An active Amazon Web Services (AWS) account is required.
-
An Admin or Super Admin user role is required in your Security Cloud Control tenant.
-
Multicloud Defense must be enabled for your Security Cloud Control tenant.
![]() Note |
Multicloud Defense Controller version 23.10 defaults to IMDSv2 in the AWS EC2 instance when using Multicloud Defense Gateway version 23.04 or newer. For more information about the difference beween IMDSv1 and IMDSv2, refer to the AWS documentation. |
Procedure
|
Step 1 |
From the Multicloud Defense Controller dashboard, click Setup located to the left of the window. |
|
Step 2 |
Select Connect Account. |
|
Step 3 |
Select the AWS icon. |
|
Step 4 |
Enter the information in the modal:
|
|
Step 5 |
Click Next to onboard your account to the Multicloud Defense Controller. |
What to do next
Before continuing, manually accept the AWS Marketplace Terms of Service in the AWS dashboard. Without the acceptance, the Multicloud Defense Controller cannot wholly communicate with the cloud service provider.
Once you connect the account, Multicloud Defense Controller automatically starts to discover assets and inventory associated with the cloud service provider account. Note that this is different from discovering traffic. Because Multicloud Defense Controller discovers account assets and inventory by default, the next step in this wizard is to Enable traffic visibility.
Connect Azure Account
Use this procedure to connect to an Azure subscription through Multicloud Defense Controller's easy setup wizard:
Before you begin
-
You must have an active Azure subscription.
-
You must have an Admin or Super Admin role in your Security Cloud Control tenant.
-
You must enable Multicloud Defense for your Security Cloud Control tenant.
Procedure
|
Step 1 |
In the Security Cloud Control dashboard, click the Multicloud Defense tab located in the left navigation pane. |
|
Step 2 |
Click Multicloud Defense Controller located in the upper right window. |
|
Step 3 |
From the Multicloud Defense Controller dashboard, click Setup located to the left of the window. |
|
Step 4 |
Select Connect Account. |
|
Step 5 |
Select the Azure icon. |
|
Step 6 |
Enter the required information:
|
|
Step 7 |
Click Next. |
What to do next
Once you connect the account, Multicloud Defense Controller automatically starts to discover assets and inventory associated with the cloud service provider account. Note that this is different from discovering traffic. Because Multicloud Defense Controller discovers account assets and inventory by default, the next step in this wizard is to Enable traffic visibility.
Connect Google Cloud Platform Account
Use this procedure to onboard a singular GCP project as an account using the Multicloud Defense Controller's easy setup wizard:
Before you begin
-
You must have an active Google Cloud Platform (GCP) project.
-
Ensure you have the permissions required to create VPCs, subnets, and a service account within your GCP project. For more information, refer to the GCP documentation.
-
You must have an Admin or Super Admin role in your Security Cloud Control tenant.
-
You must enable Multicloud Defense for your Security Cloud Control tenant.
Procedure
|
Step 1 |
In the Multicloud Defense Controller dashboard, click Setup. |
|
Step 2 |
Select Connect Account. |
|
Step 3 |
Select the GCP icon. |
|
Step 4 |
Click Cloud Platform Cloud Shell to launch the Cloud Shell. You can also log into your GCP account and launch the Cloud Shell from the project to connect to Multicloud Defense; note that the script automatically modifies the project name to the name of the project you launch the cloud shell from.
If the GCP project you are connecting to Multicloud Defense has been previously onboarded, you may get an error about the GCP's cloud storage bucket already existing. If that is not amenable, create a new storage bucket in your GCP account to handle the flow logs on this project after it is connected to Multicloud Defense. |
|
Step 5 |
Enter the required information:
|
|
Step 6 |
Click Next. |
What to do next
GCP does not automatically include the regions your project is confugred for. After your project is connected to Multicloud Defense we strongly recommend navigating to to manually modify and add any and all appropriate regions.
Once you connect the account, Multicloud Defense Controller automatically starts to discover assets and inventory associated with the cloud service provider account. Note that this is different from discovering traffic. Because Multicloud Defense Controller discovers account assets and inventory by default, the next step in this wizard is to Enable traffic visibility.
Connect to an OCI Account
Review the procedures to prepare your OCI account before you connecting it to Multicloud Defense.
Prepare Your OCI Account
This procedure automates the connection between Multicloud Defense and your OCI account and then create a policy with the correct permissions. Without the necessary permissions provided in this procedure, certain features are unavailable.
Execute this procedure to connect to an Oracle Cloud (OCI) account using Multicloud Defense's setup wizard:
Procedure
|
Step 1 |
Log in to your OCI tenant. |
|
Step 2 |
Navigate to . |
|
Step 3 |
Click Create Group. |
|
Step 4 |
Enter the following:
|
|
Step 5 |
Click Create. |
|
Step 6 |
Create a Network Firewall Policy in OCI. For more information, refer to the OCI documentation. Include this information when creating the policy:
|
|
Step 7 |
Create a user in OCI. For more information, refer to the OCI documentation. Provide the configuration information when creating a user:
|
|
Step 8 |
Create an API Key. For more information, refer to the OCI documentation. Download both the private key and the public key before adding the API Key. |
|
Step 9 |
Accept the Terms and Conditions for an OCI account. For more information, refer to the OCI documentation. Ensure to access the Change image section of the UI to add the following "community image" information specific to Multicloud Defense: |
Connect Oracle Account
Use this procedure to connect to an OCI account using Multicloud Defense Controller's easy setup wizard:
Before you begin
-
You must have an existing Oracle Cloud (OCI) account.
-
Ensure your OCI account prerequisites are completed before onboarding. For more information, refer to Prepare Your OCI Account.
-
You must have an Admin or Super Admin role in your Security Cloud Control tenant.
-
You must enable Multicloud Defense for your Security Cloud Control tenant.
Procedure
|
Step 1 |
In the Multicloud Defense Controller dashboard, click Setup. |
|
Step 2 |
Select Connect Account. |
|
Step 3 |
Select the OCI icon. |
|
Step 4 |
Click Oracle Cloud Shell to launch the native shell prompt. |
|
Step 5 |
Run the command from the Multicloud Defense Setup wizard in your cloud shell. This command automates the process of creating an IAM policy, OCI group, and an OCI user that facilitate the communication between your OCI account and the Multicloud Defense. |
|
Step 6 |
Enter the required information:
|
|
Step 7 |
Click Next. |
What to do next
Once you connect the account, Multicloud Defense Controller automatically starts to discover assets and inventory associated with the cloud service provider account. Note that this is different from discovering traffic. Because Multicloud Defense Controller discovers account assets and inventory by default, the next step in this wizard is to Enable traffic visibility.

Feedback