The IAM role created by the CloudFormation and Terraform scripts serves a crucial purpose in facilitating security audits as part of the Zero 2 FedRAMP (Z2F) gap assessment and remediation process. This role acts as a means for Aquia's Z2F AWS account to access and perform security auditor tasks within customer accounts. By granting the necessary permissions through this role, Aquia members can assume it from their Z2F AWS account, thereby gaining the privileges required to assess security controls, identify gaps, and help implement remediations where necessary.
- Access to the AWS Management Console or AWS CLI.
- Necessary permissions to create CloudFormation stacks and IAM roles.
- Retrieve the CloudFormation template file
aquia-audit-role.yaml
that defines the IAM role.
- Open the AWS Management Console and navigate to the CloudFormation service.
- Click on "Create stack" and upload the CloudFormation template file.
- Follow the on-screen instructions, providing values for any required parameters, such as the Aquia Z2F AWS Account ID (provided from Aquia).
- Review the stack configuration and then click "Create stack".
- Wait for the stack creation process to complete. Once finished, the IAM role allowing access to Aquia's Z2F AWS account should be provisioned in the customer account.
- Terraform installed on your local machine.
- AWS credentials configured with necessary permissions.
- Change to the Terraform configuration directory containing the Terraform scripts.
- Navigate to the Terraform configuration directory and locate the
variables.tf
file. - Modify the variables to provide values specifically the Aquia Z2F AWS Account ID.
- Open a terminal or command prompt and navigate to the Terraform configuration directory.
- Run
terraform init
to initialize the Terraform working directory.
- Run
terraform plan
to generate an execution plan. Review the plan to ensure that Terraform will create the desired IAM role with the correct configurations.
- Execute
terraform apply
to apply the Terraform configuration. Terraform will prompt for any required variable values, such as the Aquia Z2F AWS Account ID. (If you have not updated the values.tf file already) - Review the proposed changes and confirm by typing
yes
. - Terraform will then proceed to provision the IAM role as specified in the configuration.
By following these steps, users can effectively deploy the IAM role using either CloudFormation or Terraform. It ensures that Aquia's Z2F AWS account gains the necessary permissions to assume the role and perform Security Auditor tasks within the customer account.