LogoLogo
APISupportDashboard
  • Welcome
  • Platform
    • Platform Overview
    • Getting Started Guide
    • Discovery
      • Domain Discovery
      • Network Discovery
      • Discovered Assets
    • Targets
      • Scan Policies
      • Add-on Services
      • Tags & Filtering
        • Default Tags
      • Managing Targets
      • Scan Configuration
    • Risk
    • Firewalls
      • Ports
      • HTTP Servers
      • DNS Records
    • Websites
      • Certificates
      • Scripts
      • Cookies
      • Headers
      • Forms
      • Links
      • Downloads
      • Traffic Hosts
      • Meta Tags
      • Pages
    • Technology
    • Issues
      • Vulnerability Management
      • Issue Settings
    • Reports
    • Compliance
    • Projects
      • Penetration Testing
      • Other Projects
    • Events
      • Event Rules
      • Event Types
    • Automations
      • Target Automations
      • Asset Automations
      • Target Issue Automations
  • Integrations
    • Discovery Integrations
      • Azure
      • Google Cloud
      • AWS
      • Cloudflare
      • Oracle Cloud Infrastructure
      • F5
      • GoDaddy
      • Wiz
      • HTTP
    • Workflow Integrations
      • Slack
      • Google Chat
      • Jira
      • PagerDuty
      • Splunk
      • AWS
      • Vanta
      • Microsoft Teams
      • ArmorCode
      • Zapier
        • Slack (via Zapier)
        • Jira (via Zapier)
        • Service Now (via Zapier)
    • Feeds
      • Using Feeds with Google Sheets
    • API
    • Webhooks
  • Account
    • Account Overview
      • Account Security
    • Users
      • Roles & Permissions
Powered by GitBook

© 2024 Halo Security

On this page
  • Halo Security Setup
  • AWS Setup
  • Custom Policy JSON
  • Monitor Dynamic IP Addresses
  • Sending Events to AWS

Was this helpful?

  1. Integrations
  2. Discovery Integrations

AWS

You can import new assets directly from your AWS by giving Halo Security restricted read access.

PreviousGoogle CloudNextCloudflare

Last updated 2 months ago

Was this helpful?

Import assets directly from Route53, ElasticIP, and Elastic Load Balancer by integrating with AWS.

Halo Security Setup

  1. Visit your Account > Integrations > .

  2. Add the AWS integration.

  3. Add a name for the integration.

  4. Enter your AWS account information and click Save Changes.

Keep this page open while configuring the AWS permissions.

AWS Setup

  1. In your AWS dashboard navigate to Identity and Access Management (IAM)

  2. Click Roles then Create role

  3. Select AWS account

  4. Select Another AWS account and Require external ID. Add the external ID value found in your .

  5. Click Next

  6. On Add permissions click Next

  7. Add Role name: HaloSecurity

  8. Add Description: Must remain in place for HaloSecurity to function correctly. Email support@halosecurity.com for assistance.

  9. Click Create role

  10. Select the role you just created: HaloSecurity

  11. Under Add permissions, select Create inline policy

  12. Click JSON and paste the provided below

  13. Click Next

  14. Add Policy name: HaloSecurity

  15. Click Create Policy

Once you've created the policy, return to the Halo Security dashboard and click Run on the integration to confirm it is working correctly.

Custom Policy JSON

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "HaloSecurity01",
            "Effect": "Allow",
            "Action": [
                "ec2:Describe*",
                "elasticloadbalancing:Describe*",
                "route53:GetHostedZone",
                "route53:ListHostedZones",
                "route53:ListResourceRecordSets",
                "route53:ListHostedZonesByName",
                "s3:ListAllMyBuckets",
                "cloudfront:ListDistributions",
                "organizations:ListRoots",
                "organizations:ListOrganizationalUnitsForParent",
                "organizations:ListAccounts"
            ],
            "Resource": "*"
        }
    ]
}

Monitor Dynamic IP Addresses

Sending Events to AWS

You can also send events from Halo Security to AWS, using the instruction below:

If you're connected with AWS, Halo Security can monitor assets with dynamic IP addresses by setting an AWS Instance ID for targets. For more information, see the page.

Scan Configuration
AWS
Add
integration settings
custom policy