Welcome to the Scope AWS documentation section. This section will guide you through connecting AWS to Scope and getting the necessary data to start analyzing your AWS environment.
To connect to AWS, a user need to be created for Scope with a minimal set of permssions that allow for read-only access to the compromised AWS account.
To create the Scope user, head to the IAM service and create a new user. The user can be called anything such as Scope. If you believe there is an active threat in the account, you may want to choose a less obviouse name such as technical-support.
You don’t need to give this user access to the management consol.
To give Scope the necessary permisions, head to permission options, choose “Attach Policies Directly” and then “Create Policy”.
In Policy editor, choose JSON and replace the default policy with the policy below. Choose a name for the policy and provide a description. Click create the policy. Now attach the policy to the new user you created. You can now create the user.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cloudtrail:DescribeTrails",
"cloudtrail:GetTrailStatus",
"cloudtrail:LookupEvents",
"logs:DescribeLogGroups",
"logs:DescribeLogStreams",
"logs:GetLogEvents",
"logs:FilterLogEvents",
"ec2:DescribeInstances",
"ec2:DescribeVolumes",
"ec2:DescribeSnapshots",
"ec2:DescribeSecurityGroups",
"ec2:DescribeImages",
"ec2:DescribeFlowLogs",
"ec2:DescribeNetworkInterfaces",
"ec2:DescribeVpcEndpoints",
"s3:ListAllMyBuckets",
"s3:GetBucketLocation",
"s3:ListBucket",
"s3:GetObject",
"iam:GetUser",
"iam:ListUsers",
"iam:GetRole",
"iam:ListRoles",
"iam:SimulatePrincipalPolicy",
"iam:GenerateCredentialReport",
"iam:GetCredentialReport",
"config:DescribeConfigRules",
"config:GetComplianceDetailsByConfigRule",
"config:GetResourceConfigHistory",
"lambda:ListFunctions",
"lambda:GetFunction",
"rds:DescribeDBInstances",
"elasticloadbalancing:DescribeLoadBalancers",
"guardduty:ListDetectors",
"guardduty:GetFindings"
],
"Resource": "*"
}
]
}
Now we will generate the access key and secret key for the new AWS user in the AWS Management Console.
These credentials will be used by your app to authenticate API requests to AWS.
Use the “Connect AWS” workflow in your app to input the generated access keys.
Scope will now validate that your credentials can access the AWS environment you are investigating.
If the credentials for vapor have been generated and added to Scope, a message will display saying “AWS account connected successfully”.