Update AWS Account Permissions
Introduction
This guide assumes that you have already added your AWS account/Organization to Chronom.
If you haven't added your AWS account yet, please follow the steps in the Add an AWS account Add an AWS organization guides.
As Chronom continues to expand its coverage, the IAM policy assigned to the IAM Role that enables our system to scan your cloud resources may require updates.
These adjustments ensure that the necessary permissions for newly supported services are included, allowing Chronom to maintain comprehensive scanning and monitoring of your infrastructure.
To make it easier for you to update the IAM policy attached to the IAM Role in your AWS account, we have created our CloudFormation template to allow in-place updates by updating the existing stack.
Prerequisites
In order to use this CloudFormation template, you need to have the following:
- An external id that is provided during the Account Registration process in Chronom.
- Access to an AWS account with the following permissions:
iam:CreateRole
iam:AttachRolePolicy
iam:PutRolePolicy
iam:DeleteRole
iam:DetachRolePolicy
iam:TagRole
iam:CreatePolicy
iam:DeletePolicy
Usage
- AWS Account
- AWS Organization
This guide assumes that the CloudFormation stack has already been created using the readonly-role.yaml
template in the us-east-1
region and that you have not changed the default name of the stack from chronom-readonly-role
.
If you haven't created the stack in the us-east-1
region or have changed the default name, please adjust the steps accordingly.
To update the readonly-role.yaml
CloudFormation stack, follow the steps below:
-
Open the AWS Management Console and navigate to the CloudFormation service in the
us-east-1
region. -
From the list of stacks, select the stack named
chronom-readonly-role
and clickUpdate Stack
. -
Choose
Replace existing template
andAmazon S3 URL
and paste the following URL in the input field and clickNext
:https://chronom-public-assets.s3.amazonaws.com/readonly-role.yaml
-
Click
Next
(You can skip theSpecify stack details
step). -
Click
Next
on theConfigure stack options
step. -
Review the changes and check the
I acknowledge that AWS CloudFormation might create IAM resources with custom names
✅, finally clickSubmit
. -
The stack will be updated automatically, so you can safely close the CloudFormation console.
This guide assumes that the CloudFormation stack has already been created using the org-level-readonly-role.yaml
template in the us-east-1
region and that you have not changed the default name of the stack from chronom-readonly-role-auto-discover
.
If you haven't created the stack in the us-east-1
region or have changed the default name, please adjust the steps accordingly.
To update the org-level-readonly-role.yaml
CloudFormation stack, follow the steps below:
-
Open the AWS Management Console and navigate to the CloudFormation service in the
us-east-1
region. -
From the list of stacks, select the stack named
chronom-readonly-role-auto-discover
.noteMake sure you do not select the
NESTED
stack, which is created by thechronom-readonly-role-auto-discover
stack and has a suffix to the stack name. -
click
Update Stack
>Make a direct update
. -
Choose
Replace existing template
andAmazon S3 URL
and paste the following URL in the input field and clickNext
:https://chronom-public-assets.s3.amazonaws.com/org-level-readonly-role.yaml
-
Click
Next
(You can skip theSpecify stack details
step as it will re-use previous deployment values). -
Scroll all the way down and approve both capabilities by checking the
I acknowledge that AWS CloudFormation might create IAM resources with custom names.
andI acknowledge that AWS CloudFormation might require the following capability: CAPABILITY_AUTO_EXPAND
✅ checkboxes, then clickNext
. -
Review the changes and click
Submit
.