ShadowMap allows seamless integration with your AWS environment to provide visibility into your external attack surface. This guide will walk you through creating an AWS IAM user with the necessary permissions and configuring ShadowMap to use these credentials.
Step 1: Create an AWS IAM User
Sign in to the AWS Management Console.
Navigate to IAM (Identity & Access Management).
Click on Users from the left menu and select Add user.
Provide a name for the user (e.g.,
ShadowMap-Integration
).Select Programmatic access as the access type.
Step 2: Attach the Required Permissions
Click Attach existing policies directly.
Click on Create policy to add custom permissions.
Switch to the JSON tab and enter the following permissions:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:DescribeInstances",
"s3:ListAllMyBuckets",
"s3:GetBucketLocation",
"route53:ListCidrBlocks",
"route53:ListHostedZones",
"route53:ListHostedZonesByName",
"elasticloadbalancing:DescribeLoadBalancers"
],
"Resource": "*"
}
]
}
Click Review policy, enter a name (e.g.,
ShadowMapPolicy
), and create the policy.Back in the IAM user creation flow, attach the newly created policy.
Click Next: Tags (optional), then Next: Review, and Create user.
Copy the Access Key ID and Secret Access Key for later use.
Step 3: Configure AWS in ShadowMap
Log in to your ShadowMap account.
Navigate to Settings -> Cloud Sources
Select Amazon Web Services Integration.
Create a new Configuration
Enter the Name, Region, Access Key ID and Secret Access Key.
Click Create Source to save and enable the integration.
How AWS Data is Used in ShadowMap
Once the AWS integration is complete, ShadowMap begins scanning relevant AWS services to enhance your external attack surface mapping. Specifically:
EC2 instances: IP addresses and associated metadata are pulled and added to the ShadowMap scope.
Route53: Hosted zones and DNS records are used to identify sub-domains and additional IPs.
Elastic Load Balancers (ELB): Public-facing endpoints are included as part of your monitored infrastructure.
S3 Buckets: Bucket names and their accessible URLs are identified and assessed for exposure.
These elements are then:
Continuously monitored for changes.
Automatically included in ShadowMap's scanning engine.
Evaluated for vulnerabilities, misconfigurations, and threats.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article