AWS Monitoring Issues

Service Control Policies

Service Control Policies (SCPs) serve as organization policies to manage permissions within an organization, providing central control over maximum permissions for all accounts. SCPs are designed to ensure compliance with access control guidelines by defining limits on actions delegated to IAM users and roles in affected accounts.

  1. Identification
    • Confirm the existence of SCPs affecting the organization's accounts.
    • Verify if Prisma Cloud DSPM's capabilities are restricted by SCPs.
  2. Review SCP Configuration
    • Access the SCP configuration settings for the organization.
    • Identify the specific SCP that affects Prisma Cloud DSPM.
  3. Update SCP for Prisma Cloud DSPM
    • Modify the SCP to allow necessary access for the Prisma Cloud DSPM role.
    • Adjust permissions within the SCP to align with the operational requirements of Prisma Cloud DSPM.
  4. Validation
    • Confirm the changes made to the SCP for Prisma Cloud DSPM.
    • Test Prisma Cloud DSPM's operations to ensure that the desired capabilities are restored.
  5. Documentation
    • Document the changes made to the SCP and the resolution process.
    • Update internal documentation regarding SCP configurations to reflect the adjustments for Prisma Cloud DSPM.

Additional Resources

Refer to AWS Service Control Policies for a comprehensive understanding of SCPs and their configuration options.

Quota Issues

Virtual Private Cloud (VPC) Quota Exceeded

Elastic IP Addresses Quota Exceeded

S3 Bucket Quota Exceeded

EventBridge Rule Invocation Throttled

IAM Misconfiguration

Failure to assume Role

DDR Permissions Out of Date

Missing permissions on the KMS

  1. Add an alias to the KMS key
    1. Sign in to the AWS Management Console and open the AWS Key Management Service (AWS KMS) console at https://console.aws.amazon.com/kms.
    2. To change the AWS Region, use the Region selector in the upper-right corner of the page.
    3. In the navigation pane, choose Customer managed keys.
    4. In the table, choose the key ID according to the KMS Key ARN that appeared on the error page. Then, on the KMS key detail page, choose the Aliases tab.
      If a KMS key has multiple aliases, the Aliases column in the table displays one alias and an alias summary, such as (+n more). Choosing the alias summary takes you directly to the Aliases tab on the KMS key detail page.
    5. On the Aliases tab, choose Create alias. Enter “dig-security-redshift” as the alias name and choose Create alias.
  2. Add a tag to the KMS key
    1. Sign in to the AWS Management Console and open the AWS Key Management Service (AWS KMS) console at https://console.aws.amazon.com/kms.
    2. To change the AWS Region, use the Region selector in the upper-right corner of the page.
    3. In the navigation pane, choose Customer managed keys.
    4. In the table, choose the key ID according to the KMS Key ARN that appeared on the error page.
    5. Select the check box next to the alias of a KMS key.
    6. Choose Key actions, Add or edit tags.
    7. On the details page for KMS key, choose the Tags tab.
      1. To create your first tag, choose Create tag, type the tag key “dig-security” and the tag value “true”, and then choose Save.
      2. To add a tag, choose Edit, choose Add tag, type a tag key “dig-security” and the tag value “true”, and then choose Save.
      3. To save your changes, choose Save changes.
  3. Update the KMS key policy
    1. Sign in to the AWS Management Console and open the AWS Key Management Service (AWS KMS) console at https://console.aws.amazon.com/kms.
    2. To change the AWS Region, use the Region selector in the upper-right corner of the page.
    3. In the navigation pane, choose Customer managed keys.
    4. In the table, choose the key ID according to the KMS Key ARN that appeared on the error page.
    5. Choose the Key policy tab.
    6. Choose Edit.
    7. Add the policy statement that appeared on the error page.
    8. To save your changes, choose Save changes.

Cloud Resources

VM failed to communicate with Prisma Cloud console

VM failed to communicate with Audit Storage

Resource Not Found

Handling Default EBS Encryption

If you have Default EBS Encryption enabled, you would need to add the permissions for Prisma Cloud DSPM to use the encryption key to spin up EC2 instances.

Note that the Default EBS Encryption feature is per-region per orchestrator account. so this process needs to be done for each one of them.

To check if you have Default EBS Encryption enabled, follow the these steps:

  1. Open the Amazon EC2 console.
  2. In the navigation bar, select the Region.
  3. In the upper-right corner, choose "Data protection and security"
  4. Under "EBS encryption" section you can see the Default encryption key.

To add the required permissions to the KMS, follow these steps:

  1. Search for the relevant KMS Id in the KMS navigation page.
  2. Add the following statement to the KMS resource-policy:
{
      "Sid": "Allow access for DigSecurityOrchestratorRole",
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::<Account-ID>:role/DigSecurityOrchestratorRole"
      },
      "Action": [
        "kms:Create*",
        "kms:Describe*",
        "kms:Enable*",
        "kms:List*",
        "kms:Put*",
        "kms:Update*",
        "kms:Get*",
        "kms:Encrypt",
        "kms:Decrypt",
        "kms:ReEncrypt*",
        "kms:GenerateDataKey*",
        "kms:DescribeKey"
      ],
      "Resource": "*"
}