AWS Security Incident Response and AWS Organizations
AWS Security Incident Response is a security service that provides 24/7, live, human-assisted security incident support to help customers respond rapidly to cybersecurity incidents such as credential theft and ransomware attacks. By integrating with Organizations you enable security coverage for your entire organization. For more information, see Managing AWS Security Incident Response accounts with AWS Organizations in the Security Incident Response User Guide.
Use the following information to help you integrate AWS Security Incident Response with AWS Organizations.
Service-linked roles created when you enable integration
The following service-linked roles are automatically created in your organization's management account when you enable trusted access.
-
AWSServiceRoleForSecurityIncidentResponse
- used for creating Security Incident Response membership - your subscription to the service through AWS Organizations. -
AWSServiceRoleForSecurityIncidentResponse_Triage
- used only when you enable the triage feature during sign-up.
Service principals used by Security Incident Response
The service-linked roles in the previous section can be assumed only by the service principals authorized by the trust relationships defined for the role. The service-linked roles used by Security Incident Response grant access to the following service principal:
-
security-ir.amazonaws.com
Enabling trusted access to Security Incident Response
Enabling trusted access to Security Incident Response allows the service to keep track of your organization's structure and ensure that all accounts in the organization have active security incident coverage. It also allows the service to use a service-linked role in member accounts for triaging capabilities when you enable the triage feature.
For information about the permissions needed to enable trusted access, see Permissions required to enable trusted access.
You can enable trusted access using either the AWS Security Incident Response console or the AWS Organizations console.
Important
We strongly recommend that whenever possible, you use the AWS Security Incident Response console or tools to enable integration with Organizations. This lets AWS Security Incident Response perform any configuration that it requires, such as creating resources needed by the service. Proceed with these steps only if you can’t enable integration using the tools provided by AWS Security Incident Response. For more information, see this note.
If you enable trusted access by using the AWS Security Incident Response console or tools then you don’t need to complete these steps.
Organizations automatically enables the Organizations trusted access when you use the Security Incident Response console for setup and management. If you use the Security Incident Response CLI/SDK then you have to manually enable trusted access by using the EnableAWSServiceAccess API. To learn how to enable trusted access through the Security Incident Response console, see Enabling trusted access for AWS Account Management in the Security Incident Response User Guide.
You can enable trusted access by using either the AWS Organizations console, by running a AWS CLI command, or by calling an API operation in one of the AWS SDKs.
Disabling trusted access with Security Incident Response
Only an administrator in the Organizations management account can disable trusted access with Security Incident Response.
You can only disable trusted access using the Organizations tools.
You can disable trusted access by using either the AWS Organizations console, by running an Organizations AWS CLI command, or by calling an Organizations API operation in one of the AWS SDKs.
Enabling a delegated administrator account for Security Incident Response
When you designate a member account as a delegated administrator for the organization, users and roles from that account can perform administrative actions for Security Incident Response that otherwise can be performed only by users or roles in the organization's management account. This helps you to separate management of the organization from management of Security Incident Response. For more information, see Managing AWS Security Incident Response accounts with AWS Organizations in the Security Incident Response User Guide.
Minimum permissions
Only a user or role in the Organizations management account can configure a member account as a delegated administrator for Security Incident Response in the organization
To learn how to configure a delegated administrator through the Security Incident Response console, see Designating a delegated Security Incident Response administrator account in the Security Incident Response User Guide.
Disabling a delegated administrator for Security Incident Response
Important
If membership was created from the delegated administrator account, deregistering the delegated administrator is a destructive action and will cause service disruption. To re-register DA:
Sign in to the Security Incident Response console at https://console.aws.amazon.com/security-ir/home#/membership/settings
Cancel membership from the service console. Membership remains active until the end of billing cycle.
Once membership is cancelled disable service access through the Organizations console, CLI or SDK.
Only an administrator in the Organizations management account can remove a delegated
administrator for Security Incident Response. You can remove the delegated administrator using the Organizations DeregisterDelegatedAdministrator
CLI or SDK operation.