Integrations
AWS
Integrate with AWS Guard Duty
Wirespeed uses the AssumeRole API to integrate into your AWS accounts.
Integrating all accounts (recommended)
This method uses AWS CloudFormation StackSets to deploy the required integration permissions across all AWS organizations underneath your root account. It will also automatically deploy Wirespeed in any new AWS accounts you deploy.
We recommend you test deployment with a subset of accounts first to minimize errors. Copy our CloudFormation Quick Link, login to your desired AWS console account, and navigate to the copied link to deploy to a single account.
In Wirespeed
- Navigate to Automation > Integrations > Add Integration > AWS > Organization-wide
- Copy the API key for use in Step 2 below
In AWS
Ensure all accounts you want to integrate with have Guard Duty enabled. If not, the integrations will be set to failed.
- Log in to your root AWS account on the AWS console as an Administrator
- Ensure Trusted Access has been enabled for your account
- Navigate to CloudFormation > Stack Sets > Create Stack Set
- Continue with the steps below
Step 1
- Permission Model > Service-Managed Permissions
- Prepare Template > Template is ready
- Specify Template > Amazon S3 URL >
https://s3.us-west-2.amazonaws.com/aws-deploy.wirespeed.co/deploy-template.yaml
Step 2
- Use a sensible name and description
- Provide the API key you copied from the Getting Started > In Wirespeed step above
Step 3
- Acknowledge the disclaimer
Step 4
- Leave all defaults selected
- Choose a single region to deploy in (IAM roles are global, so you only need to choose one)
Step 5
- Click Submit
Step 6
- This stack set does not include deployment to your root management account. To deploy to that account, login to the AWS console for your root account, navigate here and follow the instructions.
Ensure the stack set deploys correctly across all accounts in your organization, address any errors as needed. Reach out to Wirespeed for assistance. Upon successful deployment, the accounts will show up in Wirespeed underneath Automation > IntegrationsThis Cloudformation stack will deploy in all new accounts you make in your organization going forward.
Integrating a single account
Cloudformation (Option A)
- Click here to deploy a CloudFormation stack
- Follow all instructions and default options
Upon completion you will see the account added on the Wirespeed Integrations page.
Manual (Option B)
- Log in to your AWS console and open the IAM page.
- Go to Access Management > Roles.
- Click Create Role.
- Under Trusted Entity Type, select AWS Account.
- Check Require External ID and enter a secure, randomly generated password.
a. Be sure to save this information, as you’ll need it later to add the account in Wirespeed.
b**. Note: AWS **requires that the External ID match the regular expression
^[\w+=,.@:/-]*$
. - Choose Another AWS Account and enter the ID
590183894387
. - Select Next to advance to the Add Permissions page.
- Open a new tab in IAM and go to the Policies page. Select Create Policy.
- In the newly opened browser window, paste the following JSON template:
- Click Next, then enter a name for the policy and select Create Policy.
- Go back to the role creation window, refresh the policy list, and check the box for the newly created policy.
- Click Next.
- Provide a name for the role, then review the Trusted Entities section. The trust policy should resemble the following:
- Ensure that the newly created policy appears in the permissions section, then select “Create Role”. Note the role ARN.
- Continue to Add an Integration for next steps