Configure AWS for Arctic Wolf CSPM using a Terraform script
You can configure Amazon Web Services (AWS)® for Arctic Wolf® Cloud Security Posture Management (CSPM) using a Terraform® script.
These resources are required:
- A valid Arctic Wolf® Managed Risk license
- These tools, which are automatically configured during installation:
- The latest version of the Terraform binary
Tip: Run this command to verify your existing Terraform version:
terraform version - AWS CLI
- The latest version of the Terraform binary
These actions are required:
- Download the CSPM AWS Terraform script.
- Complete Enable Terraform debugging for AWS.
Enable Security Token Service
To make sure you have the correct credentials, enable AWS Security Token Service (STS) for each AWS account that you want to monitor.
Determine the Arctic Wolf AWS account ID
- Sign in to the Arctic Wolf Unified Portal.
- In the navigation menu, click .
- In the Cloud Infrastructure Scans section, in the AWS row, copy the Account ID, and then save it in a safe, encrypted location. You will provide it to Arctic Wolf later.
Create an IAM policy
Arctic Wolf suggests creating a new IAM policy to make sure that Terraform has only the permissions needed to configure CSPM. However, if you have an existing IAM policy that allows the actions specified in this procedure, you can proceed to Create an IAM user using your existing policy.
Create an IAM user
Arctic Wolf recommends creating a new IAM user to make sure that Terraform has only the permissions needed to configure CSPM. However, you can use an existing IAM user and attach the new IAM policy you created in Create an IAM policy or use an existing IAM policy that allows the required actions.
- Sign in to the AWS IAM console.
- In the Access Management section, click Users.
- Click Add users.
- Enter a name for the IAM user.
- Click Next.
- Select Attach policies directly, and then select the policy that you created in Create an IAM policy.
- Click Next.
- Click Create user.
Create an access key
Configure the AWS CLI
Configure the CSPM Terraform script
For each AWS account that you want CSPM to scan, complete these steps:
Provide credentials to Arctic Wolf
For each AWS account that you want CSPM to scan, complete these steps:
Delete IAM policies and users
After you provide the AWS account credentials to Arctic Wolf for CSPM scanning, it is best practice to delete the IAM policies and users that Terraform used to create the resources.
- Sign in to the AWS IAM console.
- If you created a new IAM policy to configure Terraform, delete the IAM policy:
- In the Access Management section, click Policies.
- Search for the policy that you created in Step 2: Create an IAM policy, and select it.
- Click Delete.
- To confirm deletion, enter the policy name and click Delete.
- If you created a new IAM user to configure Terraform, delete the IAM user:
- In the Access Management section, click Users.
- Search for the user that you created in Step 3: Create an IAM user, and select it.
- To confirm deletion, enter the user name and click Delete.
- Click Delete user.