Edit

Share via


How Defender for Cloud Apps helps protect your Amazon Web Services (AWS) environment

Amazon Web Services is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of using infrastructure in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.

Connecting AWS to Defender for Cloud Apps helps you secure your assets and detect potential threats by monitoring administrative and sign-in activities, notifying on possible brute force attacks, malicious use of a privileged user account, unusual deletions of virtual machines (VMs), and publicly exposed storage buckets.

Main threats

  • Abuse of cloud resources
  • Compromised accounts and insider threats
  • Data leakage
  • Resource misconfiguration and insufficient access control

How Defender for Cloud Apps helps to protect your environment

Control AWS with built-in policies and policy templates

You can use the following built-in policy templates to detect and notify you about potential threats:

Type Name
Activity policy template Admin console sign-in failures
CloudTrail configuration changes
EC2 instance configuration changes
IAM policy changes
Logon from a risky IP address
Network access control list (ACL) changes
Network gateway changes
S3 Bucket Activity
Security group configuration changes
Virtual private network changes
Built-in anomaly detection policy Activity from anonymous IP addresses
Activity from infrequent country
Activity from suspicious IP addresses
Impossible travel
Activity performed by terminated user (requires Microsoft Entra ID as IdP)
Multiple failed login attempts
Unusual administrative activities
Unusual multiple storage deletion activities (preview)
Multiple delete VM activities
Unusual multiple VM creation activities (preview)
Unusual region for cloud resource (preview)
File policy template S3 bucket is publicly accessible

For more information about creating policies, see Create a policy.

Automate governance controls

In addition to monitoring for potential threats, you can apply and automate the following AWS governance actions to remediate detected threats:

Type Action
User governance - Notify user on alert (via Microsoft Entra ID)
- Require user to sign in again (via Microsoft Entra ID)
- Suspend user (via Microsoft Entra ID)
Data governance - Make an S3 bucket private
- Remove a collaborator for an S3 bucket

For more information about remediating threats from apps, see Governing connected apps.

Protect AWS in real time

Review our best practices for blocking and protecting the download of sensitive data to unmanaged or risky devices.

Connect Amazon Web Services to Microsoft Defender for Cloud Apps

This section provides instructions for connecting your existing Amazon Web Services (AWS) account to Microsoft Defender for Cloud Apps using the connector APIs. For information about how Defender for Cloud Apps protects AWS, see Protect AWS.

You can connect AWS Security auditing to Defender for Cloud Apps connections to gain visibility into and control over AWS app use.

Step 1: Configure Amazon Web Services auditing

  1. Sign in to the Amazon Web Services console

  2. Add a new user for Defender for Cloud Apps, and give the user Programmatic access.

  3. Select Create policy and enter a name for your new policy.

  4. Select the JSON tab and paste the following script:

    {
      "Version" : "2012-10-17",
      "Statement" : [{
          "Action" : [
            "cloudtrail:DescribeTrails",
            "cloudtrail:LookupEvents",
            "cloudtrail:GetTrailStatus",
            "cloudwatch:Describe*",
            "cloudwatch:Get*",
            "cloudwatch:List*",
            "iam:List*",
            "iam:Get*",
            "s3:ListAllMyBuckets",
            "s3:PutBucketAcl",
            "s3:GetBucketAcl",
            "s3:GetBucketLocation"
          ],
          "Effect" : "Allow",
          "Resource" : "*"
        }
      ]
     }
    
  5. Select Download .csv to save a copy of the new user's credentials. You'll need them later.

    Note

    After connecting AWS, you'll receive events for seven days prior to connection. If you just enabled CloudTrail, you receive events from the time you enabled CloudTrail.

Connect Amazon Web Services auditing to Defender for Cloud Apps

  1. In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps. Under Connected apps, select App Connectors.

  2. In the App connectors page, to provide the AWS connector credentials, do one of the following:

For a new connector

  1. Select the +Connect an app, followed by Amazon Web Services.

    Screenshot that shows where to find the +Connect an app button in the Microsoft Defender portal.

  2. In the next window, provide a name for the connector, and then select Next.

    Screenshot that shows how to add the instance name for your new AWS connector.

  3. On the Connect Amazon Web Services page, select Security auditing, and then select Next.

  4. On the Security auditing page, paste the Access key and Secret key from the .csv file into the relevant fields, and select Next.

    Screenshot that shows the AWS app security auditing page and where to enter the access key and secret key.

For an existing connector

  1. In the list of connectors, on the row in which the AWS connector appears, select Edit settings.

  2. On the Instance name and Connect Amazon Web Services pages, select Next. On the Security auditing page, paste the Access key and Secret key from the .csv file into the relevant fields, and select Next.

    Screenshot that shows the AWS app security auditing page and where to enter the access key and secret key.

  3. In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps. Under Connected apps, select App Connectors. Make sure the status of the connected App Connector is Connected.

Next steps