diff --git a/README.md b/README.md index a2b1e302c..9cef6e559 100644 --- a/README.md +++ b/README.md @@ -1154,6 +1154,7 @@ The permissions are separated to different policies. Use the relevant policies a 2. In order to create network resources such as VPC, NAT Gateway, Internet Gateway etc., use the permissions specified here - [create network resources permissions](/permissions_samples/aws/CreateNetworkResourcesPermissions.txt). 3. In order to onboard a MySQL RDS with CloudWatch configured, use the permissions specified here - [onboard MySQL RDS permissions](/permissions_samples/aws/OnboardMysqlRdsPermissions.txt). 4. In order to onboard a MsSQL RDS with audit configured and with synthetic data, use the permissions specified here - [onboard MsSQL RDS with synthetic data permissions](/permissions_samples/aws/OnboardMssqlRdsWithDataPermissions.txt). +5. In order to create FAM classification integration resources such as S3 bucket, SQS, IAM policy etc., use the permissions specified here - [create FAM classification integration resources permissions](/permissions_samples/aws/FAMClassificationIntegrationResourcesPermissions.txt). **NOTE:** When running the deployment with a custom 'deployment_name' variable, you should ensure that the corresponding condition in the AWS permissions of the user who runs the deployment reflects the new custom variable.

**NOTE:** The permissions specified in option 2 are irrelevant for customers who prefer to use their own network objects, such as VPC, NAT Gateway, Internet Gateway, etc. @@ -1583,6 +1584,14 @@ Below is a list of possible issues and troubleshooting remediations. Connect with SSH to the Sonar node EC2 and fix the aws cli profile misconfiguration. Run, for example, 'aws sts get-caller-identity' to test it. + + CipherTrust connection timeout error + + Error: failed to set auth token Get "https://x.x.x.x/api/v1/system/services/status": dial tcp x.x.x.x:443: connect: operation timed out + + Check your network configuration. For the 'terraform destroy' command, you can set the enable_ciphertrust variable to false in order to skip the CipherTrust provider connection (in case the CipherTrust provider resources have not been created yet). + +
Azure issues diff --git a/examples/aws/poc/dsf_deployment/README.md b/examples/aws/poc/dsf_deployment/README.md index c103ba9ba..17cf71f1e 100644 --- a/examples/aws/poc/dsf_deployment/README.md +++ b/examples/aws/poc/dsf_deployment/README.md @@ -23,6 +23,7 @@ The deployment is modular and allows users to deploy one or more of the followin - Agentless audit sources (RDS instances) 6. CipherTrust Manager 7. CipherTrust Transparent Encryption (CTE) and/or Data Discovery and Classification (DDC) Agents +8. FAM classification integration resources (disabled by default) ### Deploying Specific Modules @@ -87,6 +88,7 @@ Several variables in the `variables.tf` file are important for configuring the d - `enable_dam`: Enable DAM sub-product - `enable_dra`: Enable DRA sub-product - `enable_ciphertrust`: Enable CipherTrust sub-product +- `create_fam_classification_integration_resources`: Create FAM classification integration resources (disabled by default) ### Server Count - `dra_analytics_count`: Number of DRA Analytics servers diff --git a/permissions_samples/aws/CreateNetworkResourcesPermissions.txt b/permissions_samples/aws/CreateNetworkResourcesPermissions.txt index 966fdf2ae..b37cee5c1 100644 --- a/permissions_samples/aws/CreateNetworkResourcesPermissions.txt +++ b/permissions_samples/aws/CreateNetworkResourcesPermissions.txt @@ -89,6 +89,21 @@ } } }, + { + "Sid": "ec2CreateTagsForDefaultResources", + "Effect": "Allow", + "Action": "ec2:CreateTags", + "Resource": [ + "arn:aws:ec2:*:*:security-group/*", + "arn:aws:ec2:*:*:network-acl/*", + "arn:aws:ec2:*:*:route-table/*" + ], + "Condition": { + "StringLike": { + "aws:RequestTag/deployment_name": "imperva-dsf-*" + } + } + }, { "Sid": "RunInstancePermissions", "Effect": "Allow", diff --git a/permissions_samples/aws/FAMClassificationIntegrationResourcesPermissions.txt b/permissions_samples/aws/FAMClassificationIntegrationResourcesPermissions.txt new file mode 100644 index 000000000..0222293ac --- /dev/null +++ b/permissions_samples/aws/FAMClassificationIntegrationResourcesPermissions.txt @@ -0,0 +1,102 @@ +{ + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "S3Permissions", + "Effect": "Allow", + "Action": [ + "s3:DeleteBucket", + "s3:DeleteObject", + "s3:CreateBucket", + "s3:PutObject", + "s3:PutObjectAcl", + "s3:PutBucketTagging", + "s3:PutObjectTagging", + "s3:PutObjectVersionTagging", + "s3:DeleteAccessPoint", + "s3:DeleteObjectVersion", + "s3:CreateAccessPoint", + "s3:PutBucketPublicAccessBlock", + "s3:PutAccountPublicAccessBlock", + "s3:PutEncryptionConfiguration", + "s3:PutBucketPolicy", + "s3:DeleteBucketPolicy", + "s3:PutBucketNotification" + ], + "Resource": [ + "arn:aws:s3:::imperva-dsf-*", + "arn:aws:s3:::imperva-dsf-*/*" + ] + }, + { + "Sid": "s3GeneralPermissions", + "Effect": "Allow", + "Action": [ + "s3:ListBucket", + "s3:ListAllMyBuckets", + "s3:ListBucketVersions", + "s3:GetBucketPolicy", + "s3:GetBucketLocation", + "s3:GetBucketCORS", + "s3:GetBucketWebsite", + "s3:GetBucketVersioning", + "s3:GetAccelerateConfiguration", + "s3:GetBucketRequestPayment", + "s3:GetBucketLogging", + "s3:GetLifecycleConfiguration", + "s3:GetReplicationConfiguration", + "s3:GetEncryptionConfiguration", + "s3:GetBucketObjectLockConfiguration", + "s3:GetObject", + "s3:GetBucketAcl", + "s3:GetObjectAcl", + "s3:GetBucketLocation", + "s3:GetBucketTagging", + "s3:GetObjectTagging", + "s3:GetAccountPublicAccessBlock", + "s3:GetBucketPublicAccessBlock", + "s3:GetBucketNotification" + ], + "Resource": [ + "arn:aws:s3:::imperva-dsf-*", + "arn:aws:s3:::imperva-dsf-*/*" + ] + }, + { + "Sid": "SQSPermissions", + "Effect": "Allow", + "Action": [ + "sqs:CreateQueue", + "sqs:DeleteQueue", + "sqs:GetQueueAttributes", + "sqs:SetQueueAttributes", + "sqs:GetQueueUrl", + "sqs:TagQueue", + "sqs:UntagQueue", + "sqs:ListQueueTags", + "sqs:AddPermission", + "sqs:RemovePermission" + ], + "Resource": [ + "arn:aws:sqs:*:*:imperva-dsf-*" + ] + }, + { + "Sid": "IAMPolicyPermissions", + "Effect": "Allow", + "Action": [ + "iam:CreatePolicy", + "iam:DeletePolicy", + "iam:GetPolicy", + "iam:GetPolicyVersion", + "iam:ListPolicyVersions", + "iam:TagPolicy", + "iam:UntagPolicy", + "iam:ListPolicyTags" + ], + "Resource": [ + "arn:aws:iam::*:policy/imperva-dsf-*" + ] + } + ] +} \ No newline at end of file