How can we help?
AutoFix In Paladin Cloud
AutoFix
AutoFix remediates cloud resources violation detected by Paladin Cloud. PaladinCloud provides an AutoFix feature that reduces the response time to/repair a policy violation. PaladinCloud provides auto-fixes to correct resource misconfiguration and the email notification on auto-fix done on cloud resources.
By default AutoFix for a policy is disabled, Use How to enable Autofix
List of Policies provided with AutoFix
-
AWS
-
Azure
-
GCP
Policy-specific configuration for AutoFix
-
Delete Unused Security Groups
Configuration changes:
DB changes:
Update the following properties in the pac_config_properties tableautofix.allowlist.accounts.Unused-Security-group_version-1_UnusedSecurityGroup_sg = Accounts for applying autofix for unused security
group policy
pacman.autofix.waittime.Unused-Security-group_version-1_UnusedSecurityGroup_sg = Enter the number of hours to wait before auto fix EX:24
pacman.auto.fix.max.email.notifications.Unused-Security-group_version-1_UnusedSecurityGroup_sg = Enter the number of auto generated
notification email you want to send before autofix to the owner/user Ex:5
IAM Role Changes
The account where PaladinCloud is installed is called the base account. The accounts that are monitored by PaladinCloud is called client account.
Client Account Change: Create an IAM role named paladincloud and attach an Inline policy to delete the security group. Allow paladincloud from the base account to assume this role. Sample Inline policy and trust configuration for the Paladin Cloud role is here: Inline Policy: `{ "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Action": "ec2:DeleteSecurityGroup", "Resource": "*" } ] }` Trust configuration: `{ "Version":"2012-10-17", "Statement":[ {"Effect":"Allow", "Principal":{ "AWS":["arn:aws:iam::Base_Account_ID:role/paladincloud"] }, "Action":"sts:AssumeRole" }] }` Base Account Change: Fetch client account Paladin Cloud role arn and update/add Paladin Cloud policy associated with paladincloud role in Base account. Sample Paladin Cloud policy `{ "Version":"2012-10-17", "Statement":[ {"Sid":"", "Effect":"Allow", "Action":"sts:AssumeRole", "Resource":["arn:aws:iam::Client_Account_ID_1:role/paladincloud","arn:aws:iam::Client_Account_ID_2:role/paladincloud"] }] }`