Our AWS integration supports EC2 Elastic IP addresses or Amazon Route 53.
Any other will need to be added manually.
This feature is only available on the Premium plan
Intruder Portal
There are three places you can add your AWS organization from within the Intruder Portal:
1a. From the Targets page. Click the Discovery tab and select 'Add Asset Source
'
1b. From the Integrations page. Click + Add
under AWS:
1c. the Targets page by clicking the yellow + Add Targets
button > Cloud asset sync
:
2. Click 'AWS
':
3. Click 'Add organization
'
4. Download the org file and integration file from Intruder
AWS Console
1. Navigate to the 'Stacks' section of your AWS console > Create stack
:
2. Upload the template file provided by Intruder
3. Specify a name
4. No need to configure stack options – leave as default:
5. Acknowledge the AWS rules, by selecting this checkbox:
6. Once finished (which can take some time), copy the role ARN value:
Intruder Portal
Enter the role ARN you just copied from the AWS console:
AWS Console
1. Navigate to 'stackset' area > click 'Create stackset':
2. Upload template file provided by Intruder (downloaded in step 4):
3. Set name:
4. Leave stackset option as default:
5. Set deployment options:
Deploy new stacks ☑️
Deploy to organization ☑️
Enable automatic deployment ☑️
6. Specify region:
7. Acknowledge AWS rules and click submit:
Intruder portal
1. Once it has succeeded, hit Next
:
2. Configure your CloudBot Automations (more on Cloudbot, here) and click Connect
:
3. Once Intruder has connected with AWS, you'll see one of two messages. If it's the top one, click Choose accounts
; if it's the bottom one, you'll need to hit Back
and review the integration configuration:
4. Assuming all is well, you can select which cloud accounts you'd like to add to Intruder and hit Add x accounts
"
5. When you see this, click Go to organization
:
6. Once the import has completed, your Discovery tab will look something like this 👇.
Clicking on ...
> View details
will take you through to the cloud account details page:
7. On each cloud account details page, you can do a multitude of things for each target such as adding authentication methods, kicking off a scan and applying a tag:
Clicking on the Settings button in the top right will display account-specific options such as the ability to apply selective sync rules (only import targets matching a specific condition), automatically kick off scans when changes are detected or delete the AWS account entirely: