FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
juvan
Staff
Staff
Article Id 296992
Description This article describes which three mandatory configuration steps must be followed when adding an Amazon Web Services (AWS) account to the FortiCNP.
Scope Public Cloud
Solution

When adding the Amazon Web Services (AWS) account to the FortiCNP, follow these three mandatory configuration steps:

  1. Add AWS accounts through FortiCNP. This is the first step to enable cloud protection for an AWS account. Add one or multiple accounts automatically or manually. Provide the AWS account ID and a name for the account.
 

1.png

 

2.png

 

It is also necessary to select the optional permissions to be granted to FortiCNP as needed.

 

  1. Accept FortiCNP to create CloudTrail for the account. This is required for FortiCNP to collect and analyze the AWS API calls and events. Either choose to let FortiCNP create a CloudTrail for the account or use an existing one. It is also necessary to specify the aggregation region for the CloudTrail.

  2. Launch the CloudFormation template. This is required for FortiCNP to create a stack and a role in the AWS account.

3.png

 

Note: Do not change the UUID. The UUID is a unique parameter designated for the specific Company on FortiCNP.

4.png

 

The stack contains the resources that FortiCNP needs to access and monitor the AWS account. The role allows FortiCNP to assume it and perform actions on the user's behalf. It is necessary to enter a custom or default role name and a unique UUID that is designated for the company on FortiCNP.

 

5.png

 

Related documents:

Contributors