Skip to main content

AWS (Amazon Web Services)

Description

The AWS connector uses the AWS IAM REST API to discover IAM users, groups, roles, and group memberships within an AWS account. It uses AWS Signature Version 4 (SigV4) request signing to authenticate directly with the IAM service without requiring any AWS SDK installation on the OrbisID server.

System Type Classification

FieldValue
System TypeInfrastructure
Default Scan Priority500

Version Support

OrbisID EditionSupported
CommunityNo
ProYes
EnterpriseYes

AWS scanning requires a Pro or Enterprise licence.

Supported Protocol

ProtocolPortNotes
AWS IAM REST API (HTTPS + SigV4)443 TCPGlobal IAM endpoint: iam.amazonaws.com

What OrbisID Discovers

DataSource
IAM usersListUsers (paginated via Marker)
IAM groupsListGroups (paginated via Marker)
IAM rolesListRoles (paginated via Marker)
Group membershipsGetGroup per group
User status (active/inactive)Derived from access key and login profile existence

Roles are enumerated but not mapped to users — AWS roles are assumed by entities rather than assigned to users directly. Role discovery supports PAM reconciliation for service accounts that use role-based access.

Connection Requirements

AWS IAM User (Scanning Identity)

OrbisID authenticates using an IAM user with an access key. The IAM user should be a dedicated service account for OrbisID with read-only IAM permissions.

Recommended IAM policy:

{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "OrbisIDIAMReadOnly",
"Effect": "Allow",
"Action": [
"iam:ListUsers",
"iam:ListGroups",
"iam:ListRoles",
"iam:GetGroup"
],
"Resource": "*"
}
]
}

Attach this policy to the dedicated IAM user and generate an Access Key ID and Secret Access Key.

Credential Mapping

OrbisID FieldAWS Value
credential.usernameIAM Access Key ID (e.g., AKIAIOSFODNN7EXAMPLE)
credential.passwordIAM Secret Access Key

System Attributes

AttributeRequiredDefaultDescription
awsRegionNous-east-1AWS region for the IAM endpoint (IAM is global, but region is used for SigV4 signing)
awsAccountIdNoAWS account ID (12-digit) — stored for reference in scan results

Network Requirements

RequirementDetail
Outbound HTTPSOrbisID server (or On-Premise Agent) must reach iam.amazonaws.com on port 443

Configuration Steps

  1. Create a dedicated IAM user (e.g., orbisid-scanner) in the AWS account
  2. Attach the recommended IAM read-only policy
  3. Generate an Access Key for the IAM user — note the Access Key ID and Secret Access Key
  4. Create a Credential in OrbisID:
    • Username: Access Key ID
    • Password: Secret Access Key
  5. Navigate to Systems → Add System
  6. Fill in the fields:
FieldValue
NameDescriptive name (e.g., AWS – Production Account)
Hostnameiam.amazonaws.com (used for reference)
OS TypeAWS
System TypeInfrastructure
CredentialThe IAM user credential created above
  1. Optionally, set awsAccountId in system attributes for reference
  2. Click Test Connection to verify IAM access
  3. Click Save
Multiple AWS Accounts

To scan multiple AWS accounts, add a separate OrbisID target system for each account with its own dedicated IAM user and access key.

Access Key Security

Store the IAM Secret Access Key only in OrbisID's encrypted credential store. Do not share it across systems. Rotate access keys regularly and use a dedicated scanning-only IAM user with minimal permissions.

Troubleshooting

SymptomLikely CauseResolution
InvalidClientTokenIdAccess Key ID is invalid or deletedVerify the access key exists and is active in the AWS console
SignatureDoesNotMatchSecret Access Key is incorrectRegenerate or verify the secret access key
AccessDeniedMissing IAM permissionsAttach the recommended policy; verify iam:ListUsers, iam:ListGroups, iam:ListRoles, iam:GetGroup are allowed
Connection refused / timeoutNetwork path to iam.amazonaws.com blockedCheck outbound firewall rules on port 443 from the OrbisID server or agent
No groups or users returnedAccount has no IAM entitiesVerify the correct AWS account is being scanned; check the access key belongs to the intended account