How would I restrict JupiterOne from attempting to scan an AWS region?

SbDobbs
admin
We have an org policy for newer accounts to only be able to create resources in us-east-1. in older accounts we lock the possible regions for creation to 5 regions.
In Cloudtrail, I'm seeing a fair amount of failed API calls to these regions. In the integration job I am also seeing signs of failure.
0
Answers
-
We scan all regions by default. There is not a way to turn it off, per se.This allows J1 to identify if there are any rogue resources created through some loophole or malicious behavior. We typically recommend adding a condition to your AWS Service Control Policies (SCP), like below, to prevent JupiterOne from being denied:
{ "Version": "2012-10-17", "Statement": { "Sid": "DenyAllOutsideUSExceptJ1", "Effect": "Deny", "NotAction": [ "iam:*", "organizations:*", "route53:*", "budgets:*", "waf:*", "cloudfront:*", "globalaccelerator:*", "importexport:*", "support:*", "directconnect:*" ], "Resource": "*", "Condition": { "StringNotEquals": { "aws:RequestedRegion": [ "us-east-1", "us-east-2", "us-west-1", "us-west-2" ] }, "ArnNotLike": { "aws:PrincipalArn": "arn:aws:iam::*:role/JupiterOne*" } } } }
0
This Month's Leaders
Categories
- 336 All Categories
- Featured Categories
- 7 About the AskJ1 Community
- 11 Product Announcements
- From Mission Control
- 1 Rapid Response
- 3 How J1 Uses J1
- Topics
- 131 Asset Management
- 56 Compliance & Reporting
- 65 Security Operations
- 40 Security Engineering
- 5 Open Source
- 18 News, Careers and More