Add cloud devices

Relevant for: AFA Administrators

This topic describes how to add an AWS account or an Azure subscription to AFA, to be managed and analyzed similarly to on-premises devices. ASMS supports Google Cloud Project policy visibility and risks for Google Cloud firewalls added in ACE.

Add AWS (Amazon Web Service) accounts in AFA

When ASMS is connected to ACE, onboarding AWS accounts is done in ACE and the accounts are onboarded automatically to ASMS. See Simultaneously Onboard AWS Accounts into ACE and ASMS.

For existing onboarded AWS accounts in ASMS:

Simultaneously Onboard AWS Accounts into ACE and ASMS

You can use onboard AWS accounts to both ACE and ASMS from one central location—ACE Cloud Network Security (see Onboard AWS Accounts to Cloud Network Security). By following the steps in this section, once you add AWS accounts to ACE, they will automatically be onboarded to ASMS, using the permissions set in ACE.

Note: Accounts that are already added to ASMS but not to ACE will continue to operate in ASMS without interruption.

When you make changes to the status of accounts in ACE, you need to sync these changes to ASMS to ensure alignment.

This is particularly useful:

  • After initially connecting ASMS and ACE.

  • After upgrading to A33.10.

  • After updating ActiveChange permissions for AWS accounts in ACE.

  • If there is a discrepancy in account listings between ASMS and ACE.

Note: When ACE is connected to ASMS, always update the account display name in ACE—any changes you make in ASMS will be overwritten by ACE at the next sync.

Do the following:

  1. ASMS-ACE Integration If ASMS is not yet integrated with ACE, refer to ASMS integration to SaaS services for guidance on completing the integration. Once integration is established, any AWS accounts already onboarded to ACE will automatically be included in ASMS, and newly onboarded accounts will be simultaneously added to ASMS.

  2. Sync between ASMS and ACE:

    You can initiate a sync in either of two ways:

    • In AFA: click your username, and select Administration > Integrations.

      Click Sync Now. This aligns ACE entity inventory including permissions with ASMS.

    • Use the Sync AWS Accounts API: by sending a POST request to /aws-accounts/sync. See Sync ACE Resources with ASMS .

    Added accounts to ACE, will automatically be onboarded to ASMS, including all associated permissions.

    Tip: If you notice some accounts aren’t yet in ASMS, let ACE finish onboarding them before you try again.

  3. For instructions on how to add new accounts, visit AWS Account Management in ACE Tech Docs.

Edit AWS accounts onboarded with ACE

After onboarding an AWS account to ACE, you can still update AWS account details directly in ASMS.

Do the following:

  1. Access the Devices Setup page. For details, see Access the DEVICES SETUP page.

  2. Select the AWS account from the device tree that you want to edit and click Edit.

    The Web Services (AWS) EC2 page opens.

  3. Complete the fields as needed.

    Access Information

    In the Display Name field, enter the name that you want to appear in the device tree for this account.

    Note: if you change the Display Name in ACE, the update will automatically be reflected in ASMS. However, any changes you make in ASMS will be overwritten by ACE at the next sync.

    Tip: Use the account's host or route name.

    ActiveChange This read-only field shows whether ActiveChange is enabled. ActiveChange is enabled when permissions for policy change are granted during onboarding. To update the ActiveChange status of an onboarded AWS account, see Update AWS details.

    Additional Information

    Network Elements Collection Source This read-only field displays the source module that collects the network elements of the subject AWS account and updates the network map.

    The default source is ACE. To switch to ASMS for AWS network element support in the network map, set the AWS_Network_Elements_Parse_From_AFA parameter to true.For instructions on how to modify this parameter, see Configuring the AWS Network Elements Collection Source in Algopedia .

    Note: When set to be run from ASMS, data collection is performed on the Central Manager only (not on Load Distribution Units).

    Route Collection

    Select one of the following to determine how AFA should acquire the device's routing data.

    • Automatic. Automatically generate routing data upon analysis or monitoring.

    • Static Routing Table (URT). Take the device's routing data from a static file that you provide.

      For details, see Specify routing data manually.

    Options

    Select the following options for your AWS account as needed:

    • Real-time change monitoring.Select this option to enable real-time alerting upon configuration changes. For more details, see Configure real-time monitoring.
    • Set user permissions. Select this option to set user permissions for this device.

    Proxy

    Click Set Proxy Server to configure a proxy server to connect all cloud devices defined in AFA, including both AWS and Azure.

    For more details, see Define a proxy server .

  4. Click Edit to save your changes.

  5. If you selected Set user permissions, the Edit users dialog box appears.

    In the list of users displayed, select one or more users to provide access to reports for this account.

    1. To select multiple users, press the CTRL button while selecting.

    1. Click OK to close the dialog.

Set Up Specific Regions for Data Collection in AFA

When onboarding new accounts, AFA connects to multiple data centers spread across multiple geographical locations (regions) to gather data from the available AWS resources. If you want to limit data collection to specific regions only, this section explains how you can configure a customized set of regions for data collection on the DEVICES SETUP.

Do the following:

  1. Edit the file /usr/share/fa/data/plugins/aws/brand_config.xml as follows:

    1. In the configuration file, locate the FORM_FIELD with the title "Regions".

      The FORM_FIELD is followed by a list of dropdown options.

    2. Add a new option to the dropdown specifying the regions to collect data from. Set 'value' to the specific data collection regions and 'display' to how the selection appears in the Regions dropdown. For example:

      <OPTIONS value="eu-north-1 eu-central-1 us-east-1 eu-west-1" display="My Regions"/>

  2. Save the file.

    Note: For the new option to appear in the dropdown, log out and then log in.

Add accounts to ASMS when ACE is not connected

Add an AWS account to AFA to analyze data using the AWS access key and secret IDs you provide.

Analyzed data includes all of the security groups protecting EC2 instances and application load balancers (ALBs), from all AWS regions related to the configured access key. AFA separates these instances into groups called security sets. Each AWS security set is a group of instances or ALBs with the same security group and network ACLs, as well as network policies.

This section explains how to add AWS accounts to ASMS when ACE is NOT connected, as follows:

Tip: You can also add an AWS account, using the Assume-Role method. For more details, see AWS account fields and options using the assume-role method.

Network connection

The following diagram shows an ASMS Central Manager connecting to an AWS account via HTTPS-REST (TCP/443).

Tip: ASMS also supports connecting to AWS via a proxy server, which can be configured when adding the device to AFA. For more details, see Define a proxy server .

Note: AFA does not support using Geographical Distribution Remote Agents to manage AWS accounts.

Permission requirements for AWS

ASMS requires the following permissions for your AWS accounts:

Add an AWS account to AFA

You can add an AWS account to ASMS in two ways:

  • Using the standard method: Add an account by providing regular credentials - Access Key ID, Secret Access Key

  • Using the assume-role method: By using the assumed role method, you can leverage the same authentication credentials for multiple accounts. To implement this, add target AWS accounts to ASMS and configure them to assume the role of an existing AWS base account. During each target account setup, provide the base account's Access Key ID and Secret Access Key and enter the target account's Role ARN.

    Note: The setup of target accounts is a sequential process and does not involve simultaneous onboarding of multiple accounts.

    Note: The base account does not have to be onboarded to ASMS.

Do the following:

  1. Access the DEVICES SETUP page. For details, see Access the DEVICES SETUP page.

  2. Click New > Devices.

  3. In the vendor and device selection page, select Amazon > Web Services (AWS) EC2.

  4. Configure the fields and options as needed:

  5. Click Finish. The new device is added to the device tree.

  6. If you selected Set user permissions, the Edit users dialog box appears.

    In the list of users displayed, select one or more users to provide access to reports for this account.

    1. To select multiple users, press the CTRL button while selecting.

    1. Click OK to close the dialog.

A success message appears to confirm that the account is added.

In the device tree, AWS accounts are shown in three levels: the account, region/VPC, and security group.

For example:

Tip: In the onboarding stage, communication may be temporarily directed to the public services of the AWS firewall when using a third party proxy. Wait 10-15 minutes to sync the proxy settings inside the ASMS services.

To verify that proxy setting have been synced to all nodes, on the Central Manager run the following code:

/bin/algosec_conf --verify-proxy-configuration

Bulk Update of AWS Account Credentials

An API facilitates access/key password updating, which some customers require to do periodically for their AWS accounts, without reloading the accounts, which can be very time-consuming. See Bulk update keys of AWS cloud accounts

Add Microsoft Azure subscriptions in AFA

These instructions apply to the feature’s general availability, which requires onboarding Azure subscriptions separately to AFA and ACE.

For centralized onboarding via ACE—with automatic ASMS integration using ACE’s permissions—see the Early Availability feature: Unified Azure Subscription Onboarding via ACE.

Important: To see Azure topology in the ASMS map (used for Traffic Simulation Queries) and FireFlow Automation, you must onboard the Azure Subscription in both ASMS and ACE. First connect ACE to ASMS (see ACE - ASMS Integration) and then onboard your subscription (see Onboard Azure Subscriptions to Cloud Network Security).

When you add an Azure subscription to AFA, all VMs related to your subscription are represented in the device tree.

  • AFA separates the VMs into groups called security sets. Each Azure security set is a group of VMs with the same network security group and subnet network security groups.

  • VMs with no network security groups are assigned to a security set called Unprotected VMs. To enable accurate traffic simulation, AFA automatically creates a rule to allow all traffic for these VMs.

  • A Network security group, that is not attached to any VMs or subnets, is placed into a dedicated security set.

For more details, see:

Network connection

The following diagram shows an ASMS Central Manager connecting to an Azure subscription via HTTPS-REST (TCP/443).

Tip: ASMS also supports connecting to Azure via a proxy server, which can be configured when adding the device to AFA. For more details, see Define a proxy server .

Permission requirements for Azure

ASMS requires the following permissions for your Azure subscriptions:

Add a Microsoft Azure subscription to AFA

Do the following:

  1. In your Azure subscription, configure Entra ID Application to use to connect to AFA, if you have not already.

    For details, see How to configure a Microsoft Entra ID application in AlgoPedia .

  2. In AFA, access the Devices Setup page. For details, see Access the DEVICES SETUP page.
  3. In the vendor and device selection page, select Microsoft > Azure.

  4. Configure the fields and options as needed.

  5. Click Finish.

    The subscription is added to the device tree.

  6. If you selected Set user permissions, the Edit users dialog box appears.

    In the list of users displayed, select one or more users to provide access to reports for this account.

    1. To select multiple users, press the CTRL button while selecting.

    1. Click OK to close the dialog.

A success message appears to confirm that the account is added.

Tip: In the onboarding stage, communication may be temporarily directed to the public services of the Azure Cloud firewall when using a third party proxy. Wait 10-15 minutes to sync the proxy settings inside the ASMS services.

To verify that proxy setting have been synced to all nodes, on the Central Manager run the following code:

/bin/algosec_conf --verify-proxy-configuration

Enable ACE - ASMS integration (optional)

Enable ACE - ASMS integration to see:

  • VNets and NSGs on the network map.

  • Azure Firewalls and Hubs in the device tree and on the network map

  • Azure Load Balancers

Do the following:

  1. Integrate ACE and ASMS. See ASMS Integration.

  2. Onboard the Azure subscription in both AFA and ACE.

  3. Enable real time device monitoring. See Configure real-time monitoring. All Azure elements will be visible after the next monitoring cycle.

Tip:

  1. To get details about an Azure Firewalls policies and risks:

    • Click the Azure Firewall in the device tree to open the device page.

    • Click Policy page to see policies associated with the device in the ACE Policy page.

    • Click Risks page to see risks associated with the device in the ACE Risks page.

  2. If your on-premises network is connected to the Azure network via an Azure ExpressRoute, see the following knowledge base article.

Device tree display of NSGs

  • Attached NSGs: in the device tree, Azure NSGs have a three-tier hierarchy:

    1. Subscription (customer-given name for the subscription when onboarded to AFA)

    2. Region/VNet

    3. Security set (a container for one or two NSGs assigned to one or more instances)

      Note; When two NSGs exist in the security set, they are both shown separate by a / (For example, WindowsVM-nsg/DT3019).

  • Unattached NSGs: Unattached NSGs include network security groups that are either unassigned or not associated with a VM or App Service Environment (ASE), even if they are linked to an interface or subnet. In the device tree they are shown with the same three-tier hierarchy as attached NSGs except that the second tier is shown as a placeholder virtual network labeled region/"Unattached_Network_Security_Groups".

    Note: Network Map/TSQ/Routing Query are not relevant for unattached NSGs.

Device tree display of Azure Firewall

  • Azure Firewall: in the device tree, Azure Firewall has a three-tier hierarchy:

    1. Subscription (customer-given name for the subscription when onboarded to AFA)

    2. Region/VNet or Virtual Hub

    3. Azure Firewall

  • For unassigned Azure Firewall policies (policies which are not assigned to any Azure Firewall): The device tree displays the following three-tier hierarchy:

    Note: Unassigned Azure Firewall policies are not shown in the network map and the TSQ results

    1. Subscription (customer-given name for the subscription when onboarded to AFA)

    2. Region/"Unassigned_Firewall_Policies"

    3. Unassigned Firewall Policies

Device tree display of Azure Load Balancer

  • In the device tree, Azure Load Balancer has a three-tier hierarchy:

    1. Subscription (customer-given name for the subscription when onboarded to AFA)

    2. Region/VNet or Virtual Hub/Azure Global Load Balancer

    3. Azure Load Balancer

Google Cloud projects in AFA

Note: ASMS supports visibility and risks calculations for Google Cloud Projects. There is an Early Availability feature which supports additional features including Map and Traffic Simulation Query. See Google Cloud Map and Traffic Simulation Query.

ASMS supports Google Cloud Project policy visibility and risks for Google Cloud added in ACE (formerly CloudFlow).

Note: To enable this feature, you must first:

  1. Integrate ASMS with ACE, see ACE - ASMS Integration

  2. Onboard your Google Cloud Project, see Onboard Google Cloud Project.

To open the Google Cloud Risk Report in ACE from ASMS.

Do the following:

  1. In the ASMS device tree, select the Google Cloud Project.

  2. Click the link to Google Cloud Risk Report to open the report in ACE.