Connect Amazon Web Services to Microsoft Defender for Cloud Apps

Note

Microsoft Defender for Cloud Apps is now part of Microsoft 365 Defender and can be accessed through its portal at: https://security.microsoft.com. Microsoft 365 Defender correlates signals from the Microsoft Defender suite across endpoints, identities, email, and SaaS apps to provide incident-level detection, investigation, and powerful response capabilities. It improves your operational efficiency with better prioritization and shorter response times which protect your organization more effectively. For more information about these changes, see Microsoft Defender for Cloud Apps in Microsoft 365 Defender.

This article provides instructions for connecting your existing Amazon Web Services (AWS) account to Microsoft Defender for Cloud Apps using the connector APIs. For information about how Defender for Cloud Apps protects AWS, see Protect AWS.

You can connect AWS Security auditing to Defender for Cloud Apps connections to gain visibility into and control over AWS app use.

How to connect AWS Security auditing to Defender for Cloud Apps

Use the following steps to configure your AWS auditing and then connect it to Defender for Cloud Apps.

Step 1: Configure Amazon Web Services auditing

  1. In your Amazon Web Services console, under Security, Identity & Compliance, select IAM.

    AWS identity and access.

  2. Select Users and then select Add user.

    AWS users.

  3. In the Details step, provide a new user name for Defender for Cloud Apps. Make sure that under Access type you select Programmatic access and select Next Permissions.

    Create user in AWS.

  4. Select Attach existing policies directly, and then Create policy.

    Attach existing policies.

  5. Select the JSON tab:

    AWS JSON tab.

  6. Paste the following script into the provided area:

    {
      "Version" : "2012-10-17",
      "Statement" : [{
          "Action" : [
            "cloudtrail:DescribeTrails",
            "cloudtrail:LookupEvents",
            "cloudtrail:GetTrailStatus",
            "cloudwatch:Describe*",
            "cloudwatch:Get*",
            "cloudwatch:List*",
            "iam:List*",
            "iam:Get*",
            "s3:ListAllMyBuckets",
            "s3:PutBucketAcl",
            "s3:GetBucketAcl",
            "s3:GetBucketLocation"
          ],
          "Effect" : "Allow",
          "Resource" : "*"
        }
      ]
     }
    
  7. Select Next: Tags

    AWS code.

  8. Select Next: Review.

    Add tags (optional).

  9. Provide a Name and select Create policy.

    Provide AWS policy name.

  10. Back in the Add user screen, refresh the list if necessary, and select the user you created, and select Next: Tags.

    Attach existing policy in AWS.

  11. Select Next: Review.

  12. If all the details are correct, select Create user.

    User permissions in AWS.

  13. When you get the success message, select Download .csv to save a copy of the new user's credentials. You'll need these later.

    Download csv in AWS.

    Note

    After connecting AWS, you'll receive events for seven days prior to connection. If you just enabled CloudTrail, you'll receive events from the time you enabled CloudTrail.

Step 2: Connect Amazon Web Services auditing to Defender for Cloud Apps

  1. In the Microsoft 365 Defender portal, select Settings. Then choose Cloud Apps. Under Connected apps, select App Connectors.

  2. In the App connectors page, to provide the AWS connector credentials, do one of the following:

    For a new connector

    1. Select the +Connect an app, followed by Amazon Web Services.

      connect AWS auditing.

    2. In the next window, provide a name for the connector, and then select Next.

      AWS auditing connector name.

    3. On the Connect Amazon Web Services page, select Security auditing, and then select Next.

    4. On the Security auditing page, paste the Access key and Secret key from the .csv file into the relevant fields, and select Next.

      Connect AWS app security auditing for new connector.

    For an existing connector

    1. In the list of connectors, on the row in which the AWS connector appears, select Edit settings.

      Screenshot of the Connected Apps page, showing edit Security Auditing link.

    2. On the Instance name and Connect Amazon Web Services pages, select Next. On the Security auditing page, paste the Access key and Secret key from the .csv file into the relevant fields, and select Next.

      Connect AWS app security auditing for existing connector.

  3. In the Microsoft 365 Defender portal, select Settings. Then choose Cloud Apps. Under Connected apps, select App Connectors. Make sure the status of the connected App Connector is Connected.

Next steps

If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket.