Skip to main content

Update AWS Account Permissions

Introduction

info

This guide assumes that you have already added your AWS account/Organization to Chronom.
If you haven't added your AWS account yet, please follow the steps in the Add an AWS account Add an AWS organization guides.

As Chronom continues to expand its coverage, the IAM policy assigned to the IAM Role that enables our system to scan your cloud resources may require updates.
These adjustments ensure that the necessary permissions for newly supported services are included, allowing Chronom to maintain comprehensive scanning and monitoring of your infrastructure.

To make it easier for you to update the IAM policy attached to the IAM Role in your AWS account, we have created our CloudFormation template to allow in-place updates by updating the existing stack.

Prerequisites

In order to use this CloudFormation template, you need to have the following:

  • An external id that is provided during the Account Registration process in Chronom.
  • Access to an AWS account with the following permissions:
    • iam:CreateRole
    • iam:AttachRolePolicy
    • iam:PutRolePolicy
    • iam:DeleteRole
    • iam:DetachRolePolicy
    • iam:TagRole
    • iam:CreatePolicy
    • iam:DeletePolicy

Usage

info

This guide assumes that the CloudFormation stack has already been created using the readonly-role.yaml template in the us-east-1 region and that you have not changed the default name of the stack from chronom-readonly-role.
If you haven't created the stack in the us-east-1 region or have changed the default name, please adjust the steps accordingly.

To update the readonly-role.yaml CloudFormation stack, follow the steps below:

  1. Open the AWS Management Console and navigate to the CloudFormation service in the us-east-1 region.

  2. From the list of stacks, select the stack named chronom-readonly-role and click Update Stack.

    Select Stack

  3. Choose Replace existing template and Amazon S3 URL and paste the following URL in the input field and click Next:

    https://chronom-public-assets.s3.amazonaws.com/readonly-role.yaml

    Template URL

  4. Click Next (You can skip the Specify stack details step).

  5. Click Next on the Configure stack options step.

  6. Review the changes and check the I acknowledge that AWS CloudFormation might create IAM resources with custom names , finally click Submit.

    Review

  7. The stack will be updated automatically, so you can safely close the CloudFormation console.