AWS
Connect Amazon Web Services to Cased
Permissions and security
We connect with your AWS account securely using the AWS Identity and Access Management (IAM) service. We require two policies:
- A permissions policy that defines what actions a trusted user can take (like listing EC2 instances and VPCs).
- A trust policy that adds Cased as a trusted user.
Connection instructions
Open your AWS Management Console
Navigate to the IAM service
Create a new permissions policy for Cased
- Click on “Policies” on the left-hand navigation pane
- Click on the “Create policy” button.
- Switch to JSON editor instead of visual.
After pasting the following JSON click Next and name the policy CasedPolicy
and a brief description, then Create Policy. All actions listed are read-only.
Create a new IAM role
Click on “Roles” in the left-hand navigation pane, then click on the “Create role” button.
Attach Permissions Policy
- Search by name for the permissions policy you created earlier.
- Select this permissions policy (with the checkbox), and click “Next”
- Give the role a name (like “CasedRole”) and description, then click “Create role”.
Provide Role ARN (almost done!)
Once the role is created, it will appear in the list of roles in your IAM console.
Search for the newly-created role name, and click on it to get a summary view of the role. You’ll see the Role ARN at the top of the Summary page. It’ll look something like this: arn:aws:iam::995840643156:role/CasedRole
Copy and then enter the Role ARN on the AWS Connections page of Cased, making sure to select the correct region as well.