AWS Marketplace

Automate multi account identity governance in AWS using Ermetic and AWS Control Tower

Having a multi-account strategy is a best practice for achieving higher isolation of resources in AWS. It helps you to meet regulatory and compliance needs, track operational costs, and add an extra layer of security. AWS Control Tower uses AWS best practices to establish a well-architected, multi-account baseline across your AWS accounts. For more information about managing multi-account AWS environments with AWS Control Tower, see Getting Started with AWS Control Tower.

Ermetic is a member of the AWS Partner Network (APN) and is available in AWS Marketplace. Managing access entitlements is a critical challenge that enterprises face as they work to protect applications and data in AWS. Ermetic helps you to govern entitlements and eliminate access risks in AWS by continuously analyzing permissions, configurations, and behavior. It does this across the full stack of identities (human and service), entitlements, data, network, and compute resources.

In this post, Or and I share a new solution that integrates Ermetic with AWS Control Tower. You can use this solution to automatically enroll newly added AWS accounts in an AWS Control Tower environment with Ermetic using Account Factory. The integration automates the ability of Ermetic to govern identities, manage their access entitlements, and enforce least privileges for all newly added accounts in your multi-account AWS environment.

Prerequisites

You must complete the following prerequisites before implementing the Ermetic and AWS Control Tower integration solution:

Subscribe to Ermetic via AWS Marketplace. In the upper right, choose Continue to Subscribe.

Solution overview

The solution is deployed using AWS CloudFormation templates and integrates with AWS Control Tower lifecycle events. When a new account is created, or an existing one is enrolled using the AWS Control Tower Account Factory, the lifecycle event triggers an AWS Lambda function. The Lambda function creates a new CloudFormation stack instance in the vended account, creating the required AWS Identity and Access Management (IAM) role in the newly vended account.

The stack instance configures Ermetic with an IAM role (Ermetic IAM integration role). This role enables the Ermetic SaaS solution to collect account data from AWS CloudTrail logs from the new account.

The AWS CloudFormation template and a detailed README for this solution are available here. This template is deployed in the AWS Control Tower management account and creates the following components:

  1. An Ermetic AWS CloudFormation StackSet in the AWS Control Tower management account. This incorporates the following Ermetic components for setting up the Ermetic IAM integration role:
    1. An Amazon CloudWatch Events rule that is triggered based on an AWS Control Tower lifecycle event
    2. An AWS Lambda lifecycle function that is the target for the CloudWatch Events rule
  2. An Ermetic AWS CloudFormation stack instance in the AWS Control Tower managed account. When a new account is added from the AWS Control Tower management account, the Lambda function creates a stack instance in the managed account. The stack instance is based on the Ermetic StackSet deployed in the management account and provisions the  new account with the Ermetic IAM integration role.

Architecture diagram

The following architecture diagram illustrates the components of AWS Control Tower and Ermetic integration.

The AWS Control Tower management account contains the following components:

  1. In the AWS Service Catalog via the Account Factory, an administrator provisions a new AWS Control Tower account.
  2. After the administrator successfully provisions a new account, an AWS Control Tower lifecycle event triggers a CloudWatch Events rule.
  3. The AWS CloudWatch Events rule triggers a Lambda function.
  4. An AWS CloudFormation StackSet launches the Ermetic stack instance in the AWS Control Tower managed account. Refer to the following diagram.

Control Tower management account components that provision a new managed account

The AWS Control Tower managed account contains the following components:

  1. The Ermetic template that provisions the Ermetic IAM integration role in the managed account. Refer to the following architecture diagram.

The Control Tower managed account contains the Ermetic IAM integration role

Solution Setup

The Ermetic integration with AWS Control Tower is set up in one step with single-click automation. Launch the ermetic-controltower.yaml template in the AWS Control Tower managed account.

From the AWS Management Console in the management account, do the following:

  1. Ensure that an AWS CloudFormation StackSet is successfully created.
  2. Ensure that an Amazon CloudWatch Events rule is successfully created with an AWS Lambda target to handle AWS Control Tower lifecycle events.

Test and Validate

Test—Create a Lifecycle Event—Add a managed account

  1. Log in to the AWS Control Tower management account and navigate to the AWS Control Tower console. Then do the following:
    • To enroll a new managed account in the AWS Control Tower organization, in the navigation pane, choose Account Factory.
    • Enter values for Account email, Display name, AWS SSO email, AWS SSO user name, and Organizational unit.
    • Choose Enroll account.
  2. Log in to the newly added AWS Control Tower managed account. Navigate to the AWS CloudFormation console. Check that there is an AWS CloudFormation stack instance in this account that launches the Ermetic IAM integration role in the managed account. From the navigation pane, select this stack instance and choose Stack info. The status field should display a value of CREATE_COMPLETE.

Test—Complete the onboarding of the new managed account in Ermetic

  1. Sign in to your Ermetic account. From the left panel, select Settings, Accounts, and then select Add a new AWS account. Skip steps 1, 2, and 3, since you have already provisioned the IAM role in the new account.  For step 4, provide the Account ID of the new managed account (Managed Account ID) and the ARN of the newly provisioned IAM role in the managed account (arn:aws:iam::<Managed Account ID>:role/IAM_R_ERMETIC_SECURITY_XA).
  2. You will use the centralized CloudTrail from AWS Control Tower, so select Continue without CloudTrail, and choose Finish.

Validate

Sign in to your Ermetic account and validate that identity intelligence data for the new account is being collected and displayed on the Ermetic dashboard. The following screenshot shows the Ermetic identity intelligence dashboard, showing 44 identities with a combination of critical, high, medium, and low risk.

Identity intelligence data for the new account is collected and displayed on the Ermetic dashboard

Conclusion

In this post, we showed you how to automatically enroll new AWS Control Tower accounts with Ermetic. Ermetic’s integration with AWS Control Tower enables you to automatically extend Ermetic’s capabilities to all newly added AWS accounts in your multi-account AWS environment. This integration enables Ermetic to manage access entitlements and enforce least privileges automatically across all newly added AWS accounts in your multi-account AWS environment. For more information about this solution, see Solutions for AWS Control Tower in AWS Marketplace.

About the Authors

Kanishk Mahajan Kanishk Mahajan is an Independent Software Vendor (ISV) Solutions Architecture Lead at AWS. In this role, he leads cloud transformation and solution architecture for AWS partners and mutual customers in all areas that relate to management and governance, security and compliance, and migrations and modernizations in AWS.

Or Priel is the VP of Product Management at Ermetic.  Prior to joining Ermetic, Or worked for Palo Alto networks for over six years, leading projects in various roles. Prior to his tenure there, he worked for CyVera, a cybersecurity company later acquired by Palo Alto Networks. During his military service, Or served as a captain in a special ops unit of the Israel Defense Forces Intelligence Corps.