- AWS
- Azure
- GCP
- OCI
AWS
1. Prerequisites
- A Sysdig Secure administrator account.
- An AWS user or role with permission to install IAM policies, as shown in the table below.
- A local workstation with Terraform v1.5+ installed or access to CloudFormation.
- Docs Help
- Onboard AWS Help
Click to Learn More About Using Terraform and AWS CLI
Click to Learn More About Using Terraform and AWS CLI
import TerraformSnippet from ‘/snippets/terraform-snippet.mdx’;
Click to Learn More About IAM Permissions
Click to Learn More About IAM Permissions
| Access | Description |
|---|---|
| IAMFullAccess | Required to create IAM Roles and associated permissions. |
| AWSOrganizationsReadOnlyAccess | Required to list Accounts and OUIDs in your Organization. |
| AWSCloudFormationFullAccess | Required to create a CloudFormation StackSet that creates IAM roles in each Account in your Organization. |
IAMFullAccess is required for individual accounts.2. Collect Your Account Details

- Sign in to the AWS Console. For an Organization, ensure you sign in to your organization’s management account.
-
Expand the dropdown in the top right corner of the AWS Console and copy your Account ID.
You can also get your AWS AccountID by using this command via AWS CLI or the AWS Console terminal:
- Optional Organization Unit IDs. By default, your entire AWS Organization will be onboarded. If you want to restrict onboarding to a subset of your Organization, you can gather specific OUIDs now and enter them in the following steps.
3. Connect with Terraform

Click Integrations
Click Integrations at the bottom of the main left-hand navigation menu, and choose AWS Cloud Accounts.
Enter IDs and region
For Organization accounts, in Step 2, enter your AWS management Account ID and select your Primary Region. For Single Accounts, enter only your AWS Account ID.
Enter OUIDs
In Step 3, you can onboard a subset of your Organization Accounts by entering the OUIDs in a comma-separated list. Leave the field blank to onboard your entire Organization.
Generate Terraform file
In Step 4, click the Next button to generate a
main.tf file to use with Terraform. Copy its contents and paste them into a new file, or download the file to an empty folder on your workstation, such as /home/user/sysdig_onboarding.Execute Terraform
- On your workstation, navigate using the CLI to the folder containing your main.tf file and execute the following commands:
4. Connect with CloudFormation
- Log in to Sysdig Secure.
- In a separate browser window, log in to your AWS Account. For Organization installs, be sure to log into your Organization’s Management Account.
- For Organization accounts, in Step 2, enter your AWS management account ID and your OUID(s). For a Single Account, enter only your AWS Account ID.
- In Step 3, click the Launch Stack button. This will shift you to an AWS console browser window. Follow any prompts in AWS to deploy the required resources, and be sure to check the Acknowledgements in the AWS Capabilities section.
- When CloudFormation completes, click the Complete Onboarding button in the Sysdig dashboard. Your newly added account will appear in the Cloud Accounts page.
5. Check the Connection
- To validate your AWS connection, navigate to Sysdig Secure’s Integrations > Environments > AWS.
- Click the Added On column heading to show the most recently added account on top.
- The Status column shows the overall connection status:
- Connected
- Error
- Needs Attention
- Unknown
See an Example of the Health Status for CSPM
See an Example of the Health Status for CSPM
| CSPM Status | Description |
|---|---|
| ✅ Healthy | The account has been successfully connected, and all the resources have been scanned. |
| ! Needs Attention | Some features are not working properly. |
| ❌ Error | Authentication errors. For example:
|
Further Reading
Learn More About Permissions
Learn More About Permissions
Permissions Granted to Sysdig
The above installation creates two IAM Roles that Sysdig can access. These Roles have the following permissions:- A role named
sysdig-secure-onboarding-XXXX, used to manage the base integration with Sysdig- AWSAccountManagementReadOnlyAccess
- AWSOrganizationsReadOnlyAccess (Organizational install)
- A role named
sysdig-secure-posture-XXXX, used to collect an inventory of cloud resources and perform CSPM- SecurityAudit
- A Custom IAM Policy containing the following permissions:
account:GetContactInformationelasticfilesystem:DescribeAccessPointslambda:GetFunctionlambda:GetRuntimeManagementConfigmacie2:ListClassificationJobswaf-regional:ListRuleGroupswaf-regional:ListRulesbedrock:ListAgentsbedrock:GetAgentbedrock:ListKnowledgeBasesbedrock:GetKnowledgeBasebedrock:ListGuardrailsbedrock:GetGuardrailbedrock:GetModelInvocationLoggingConfiguration
Learn More About Identities Shared with Sysdig
Learn More About Identities Shared with Sysdig