Skip to main content

Documentation Index

Fetch the complete documentation index at: https://help.dsalta.com/llms.txt

Use this file to discover all available pages before exploring further.

Overview

Amazon Web Services (AWS) is the world’s leading cloud platform, offering over 200 services across compute, storage, databases, networking, machine learning, and security. DSALTA provides deep integration with AWS to monitor IAM configuration, infrastructure security, encryption, backups, logging, and network exposure across your entire AWS environment.
Read-only access. DSALTA never modifies, creates, or deletes resources in your Amazon Web Services (AWS) environment. All API access is strictly read-only.

Integration Details

PropertyValue
CategoryCloud Infrastructure
Data Library ModulesAccess, Inventory, Vulnerabilities, Incidents
AuthenticationIAM Role with read-only policy (SecurityAudit managed policy recommended)
Sync FrequencyEvery 24 hours (manual sync available)
PermissionsRead-only

What Data DSALTA Collects

When you connect Amazon Web Services (AWS), DSALTA automatically collects the following data on every sync cycle:
  • IAM users, roles, groups, and policies
  • EC2 instances, RDS databases, S3 buckets
  • EBS volumes, EFS/FSx file systems
  • ElastiCache, Redshift, DynamoDB clusters
  • CloudTrail, GuardDuty, VPC flow logs
  • Load balancer and API Gateway configuration
  • Encryption and backup settings across all services
  • Security group and network ACL rules
Every record includes the integration name as its source, a sync timestamp, and is treated identically to manually entered records by auditors.

Key Use Cases

  • Monitor IAM user MFA and credential hygiene
  • Detect unencrypted storage and databases
  • Verify backup and point-in-time recovery settings
  • Monitor infrastructure health (CPU, memory, storage, latency)
  • Ensure CloudTrail and GuardDuty are active
  • Detect resources exposed to the internet
  • Validate S3 bucket access controls and versioning

How to Connect

1

Navigate to Integrations

Go to Settings → Integrations in your DSALTA dashboard and find Amazon Web Services (AWS) in the catalog.
2

Review Permissions

Review the permissions DSALTA requires. All access is read-only. Click Connect.
3

Authenticate

Follow the on-screen instructions to authenticate with your Amazon Web Services (AWS) account. Admin-level access is required for the initial setup.
4

Configure Scope

Select which accounts, projects, or resources DSALTA should monitor. You can adjust this later from the integration settings.
5

Initial Sync

DSALTA performs an initial data pull (typically 5–15 minutes). Automated compliance tests are generated immediately after sync completes.
After connecting, allow 15–20 minutes for the initial data sync. DSALTA may take up to 24 hours to fully evaluate all synced data and activate all relevant compliance tests.

Automated Compliance Tests

When you connect Amazon Web Services (AWS), DSALTA automatically generates the following compliance tests. Each test runs every 24 hours and produces pass/fail evidence for your auditor.
TestDescription
AWS access should be removed for offboarded usersChecks that AWS access is revoked for offboarded users.
AWS users should have MFA enabledChecks that all AWS IAM users have MFA enabled.
AWS should be on HTTPSChecks that AWS resources are served over HTTPS.
AWS should redirect HTTP to HTTPSChecks that HTTP traffic is automatically redirected to HTTPS in AWS.
AWS CloudTrail should be enabledChecks that AWS CloudTrail is enabled to log account activity.
AWS GuardDuty should be enabledChecks that AWS GuardDuty is enabled for threat detection.
Reported incidents should be closed in GuardDutyChecks that incidents reported in GuardDuty are closed and resolved.
AWS credentials not used in last 90 days should be disabledChecks that AWS credentials unused for 90+ days are disabled.
AWS user access keys should not be older than 90 daysChecks that AWS IAM user access keys are not older than 90 days.
AWS root account should have MFA enabledChecks that the AWS root account has MFA enabled.
AWS users should not have attached IAM policiesChecks that AWS users do not have IAM policies attached directly.
AWS account password policy should be configuredChecks that an AWS account-level password policy is configured.
AWS root account usage should be avoidedChecks that the AWS root account is not being used for routine activity.
AWS server access logs should be retained for 90 daysChecks that AWS server access logs are retained for at least 90 days.
AWS S3 server access logging should be enabledChecks that S3 server access logging is enabled for important buckets.
AWS groups should have at least one IAM policyChecks that all AWS IAM groups have at least one policy attached.
Infrastructure entities should be classifiedChecks that all AWS infrastructure entities are classified by criticality.
AWS RDS database free space should be monitoredChecks that AWS RDS free storage space is being monitored.
AWS RDS database CPU utilization should be monitoredChecks that AWS RDS CPU utilization is being monitored.
AWS RDS database freeable memory should be monitoredChecks that AWS RDS freeable memory is being monitored.
AWS RDS database IO utilization should be monitoredChecks that AWS RDS I/O utilization is being monitored.
AWS RDS database backup should be enabledChecks that automated backups are enabled for AWS RDS databases.
AWS RDS database storage should be encryptedChecks that AWS RDS database storage is encrypted at rest.
AWS RDS database should be protected from direct internet trafficChecks that AWS RDS databases are not directly exposed to the internet.
AWS ElastiCache CPU utilization should be monitoredChecks that AWS ElastiCache CPU utilization is being monitored.
AWS ElastiCache current connections should be monitoredChecks that AWS ElastiCache current connection count is being monitored.
AWS ElastiCache freeable memory should be monitoredChecks that AWS ElastiCache freeable memory is being monitored.
AWS Redshift cluster backup should be enabledChecks that automated backups are enabled for AWS Redshift clusters.
AWS Redshift cluster should be encryptedChecks that AWS Redshift clusters are encrypted at rest.
AWS Redshift CPU utilization should be monitoredChecks that AWS Redshift CPU utilization is being monitored.
AWS Redshift health should be monitoredChecks that AWS Redshift cluster health status is being monitored.
AWS EC2 instances should be protected from direct internet trafficChecks that AWS EC2 instances are not directly exposed to the internet.
AWS EC2 instance CPU utilization should be monitoredChecks that AWS EC2 instance CPU utilization is being monitored.
AWS EBS volume backup should be enabledChecks that EBS volume snapshots (backups) are enabled.
AWS EBS volumes should be encryptedChecks that AWS EBS volumes are encrypted at rest.
AWS EFS storage backup should be enabledChecks that AWS EFS storage has backups enabled.
AWS FSx File System storage backup should be enabledChecks that AWS FSx File System has backups enabled.
AWS EFS storage should be encryptedChecks that AWS EFS storage is encrypted at rest.
AWS FSx File System storage should be encryptedChecks that AWS FSx File System storage is encrypted at rest.
AWS VPC flow logs should be capturedChecks that VPC flow logs are enabled to capture network traffic.
AWS S3 storage buckets should be encryptedChecks that AWS S3 buckets are encrypted at rest.
AWS S3 bucket public access should be blockedChecks that AWS S3 bucket public access block is enabled.
AWS S3 buckets should be versionedChecks that AWS S3 bucket versioning is enabled.
AWS SQS message visibility should be monitoredChecks that AWS SQS message visibility timeout is being monitored.
AWS SQS message age should be monitoredChecks that AWS SQS message age is being monitored.
AWS Firehose stream throttling should be monitoredChecks that AWS Firehose stream throttling is being monitored.
AWS DynamoDB latency should be monitoredChecks that AWS DynamoDB read/write latency is being monitored.
AWS DynamoDB point-in-time recovery should be enabledChecks that AWS DynamoDB point-in-time recovery (PITR) is enabled.
AWS DynamoDB should be encryptedChecks that AWS DynamoDB tables are encrypted at rest.
AWS DynamoDB read capacity should be monitoredChecks that AWS DynamoDB read capacity utilization is being monitored.
AWS DynamoDB write capacity should be monitoredChecks that AWS DynamoDB write capacity utilization is being monitored.
AWS DynamoDB backup should be enabledChecks that AWS DynamoDB backups are enabled.
AWS API Gateway V2 errors should be monitoredChecks that AWS API Gateway V2 errors are being monitored.
AWS ECS CPU utilization should be monitoredChecks that AWS ECS CPU utilization is being monitored.
AWS ECS memory utilization should be monitoredChecks that AWS ECS memory utilization is being monitored.
AWS ECR repositories should be encryptedChecks that AWS ECR container repositories are encrypted at rest.
AWS Elasticsearch cluster free space should be monitoredChecks that AWS Elasticsearch cluster free storage space is being monitored.
AWS FSx File System free space should be monitoredChecks that AWS FSx File System free space is being monitored.
AWS Elasticsearch cluster CPU utilization should be monitoredChecks that AWS Elasticsearch cluster CPU utilization is being monitored.
AWS Elasticsearch cluster health should be monitoredChecks that AWS Elasticsearch cluster health status is being monitored.
AWS EBS health should be monitoredChecks that AWS EBS volume health status is being monitored.
AWS load balancer errors should be monitoredChecks that AWS load balancer error rates are being monitored.
AWS load balancer latency should be monitoredChecks that AWS load balancer latency is being monitored.
AWS classic load balancer errors should be monitoredChecks that AWS classic load balancer error rates are being monitored.
AWS classic load balancer latency should be monitoredChecks that AWS classic load balancer latency is being monitored.
AWS load balancer should redirect HTTP to HTTPSChecks that AWS load balancers redirect HTTP traffic to HTTPS.
AWS load balancer healthy host count should be monitoredChecks that AWS load balancer healthy host count is being monitored.
AWS load balancer should have valid configurationChecks that AWS load balancer configuration is valid and correct.
AWS load balancer host health should be monitoredChecks that AWS load balancer backend host health is being monitored.
AWS application load balancer should be protected from direct internet trafficChecks that AWS application load balancers are not directly exposed to the internet.
AWS Lightsail instance CPU utilization should be monitoredChecks that AWS Lightsail instance CPU utilization is being monitored.
AWS Lightsail disk backup should be enabledChecks that AWS Lightsail disk backups are enabled.
AWS Lightsail disks should be encryptedChecks that AWS Lightsail disks are encrypted at rest.
AWS CloudTrail log file integrity validation should be enabledChecks that AWS CloudTrail log file integrity validation is enabled.
AWS CloudTrail S3 logging bucket access logging should be enabledChecks that access logging is enabled on the S3 bucket used by CloudTrail.
AWS CloudTrail logging bucket should be protected from direct internet trafficChecks that the CloudTrail logging S3 bucket is not publicly accessible.
Tests run automatically every 24 hours. Failed tests generate alerts and appear in your compliance dashboard with remediation guidance. All test results are stored as audit evidence with timestamps.

Compliance Frameworks

This integration provides evidence for the following compliance frameworks:

SOC 2

Access controls, monitoring, and change management evidence.

ISO 27001

Asset management, access control, and operations security evidence.

GDPR

Access records and data processing evidence.

Troubleshooting

Re-authenticate by going to Settings → Integrations → Amazon Web Services (AWS) and clicking Reconnect. This usually happens when API tokens expire or permissions change.
Verify that the connected account still has the required admin permissions. Try a manual sync from the integration settings page. If the issue persists, check your Amazon Web Services (AWS) API rate limits.
Tests generate after the first successful data sync. If sync completed but tests are missing, ensure the relevant features are configured in Amazon Web Services (AWS) (e.g., GuardDuty must be enabled in AWS for GuardDuty tests to appear).
DSALTA syncs all users visible to the connected admin account. If users are missing, verify they are within the scope you configured during setup. Suspended or deleted accounts may not appear.