LogoLogo
APISupportDashboard
  • Welcome
  • Platform
    • Platform Overview
    • Getting Started Guide
    • Discovery
      • Domain Discovery
      • Network Discovery
      • Discovered Assets
    • Targets
      • Scan Policies
      • Add-on Services
      • Tags & Filtering
        • Default Tags
      • Managing Targets
      • Scan Configuration
    • Risk
    • Firewalls
      • Ports
      • HTTP Servers
      • DNS Records
    • Websites
      • Certificates
      • Scripts
      • Cookies
      • Headers
      • Forms
      • Links
      • Downloads
      • Traffic Hosts
      • Meta Tags
      • Pages
    • Technology
    • Issues
      • Vulnerability Management
      • Issue Settings
    • Reports
    • Compliance
    • Projects
      • Penetration Testing
      • Other Projects
    • Events
      • Event Rules
      • Event Types
    • Automations
      • Target Automations
      • Asset Automations
      • Target Issue Automations
  • Integrations
    • Discovery Integrations
      • Azure
      • Google Cloud
      • AWS
      • Cloudflare
      • Oracle Cloud Infrastructure
      • F5
      • GoDaddy
      • Wiz
      • HTTP
    • Workflow Integrations
      • Slack
      • Google Chat
      • Jira
      • PagerDuty
      • Splunk
      • AWS
      • Vanta
      • Microsoft Teams
      • ArmorCode
      • Zapier
        • Slack (via Zapier)
        • Jira (via Zapier)
        • Service Now (via Zapier)
    • Feeds
      • Using Feeds with Google Sheets
    • API
    • Webhooks
  • Account
    • Account Overview
      • Account Security
    • Users
      • Roles & Permissions
Powered by GitBook

© 2024 Halo Security

On this page
  • AWS Setup
  • Create Policy
  • Create User
  • Custom Policy JSON
  • Connect AWS to Halo Security

Was this helpful?

  1. Integrations
  2. Discovery Integrations

AWS v1 (deprecated)

You can import new assets directly from your AWS by giving us restricted read access.

Last updated 3 months ago

Was this helpful?

This version of the AWS integration is now deprecated. Please follow the instructions for when adding a new integration.

Import assets directly from Route53, ElasticIP, and Elastic Load Balancer by integrating with AWS.

If you're connected with AWS, Halo Security can monitor assets with dynamic IP addresses by setting an AWS Instance ID for targets. For more information, see the page.

AWS Setup

Create Policy

  1. In your AWS dashboard navigate to Identity and Access Management (IAM)

  2. Click Policies then Create policy

  3. Click JSON tab

  4. Paste the below

  5. Click Next: Tags

  6. Click Next: Review

  7. Enter a name Halo Security-integration-policy

  8. Click Create Policy

Create User

  1. In your AWS dashboard navigate to 'Identity and Access Management (IAM)'

  2. Click Users then Add user

  3. Enter a username Halo Security-integration

  4. Check access type Programmatic access

  5. Select Attach existing policies directly

  6. Search for Halo Security-integration-policy and check the row.

  7. Click Next: Tags

  8. Click Next: Review

  9. Click Create user

  10. Save your Access key ID and Secret access key

Custom Policy JSON

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "HaloSecurity01",
            "Effect": "Allow",
            "Action": [
                "ec2:Describe*",
                "elasticloadbalancing:Describe*",
                "route53:GetHostedZone",
                "route53:ListHostedZones",
                "route53:ListResourceRecordSets",
                "route53:ListHostedZonesByName",
                "s3:ListAllMyBuckets",
                "cloudfront:ListDistributions"
            ],
            "Resource": "*"
        }
    ]
}

Connect AWS to Halo Security

  1. Click Add

  2. Select "AWS".

  3. Enter your Access key ID and Secret access key

  4. Select any other options

  5. Click Save

In your Halo Security dashboard navigate to the section.

Asset Import integration
AWS v2
Scan Configuration
Policy JSON