Connect an AWS Account to Guardrails
Connect an AWS Account to Guardrails
In this guide, you will deploy the Guardrails IAM access role to your AWS account using a CloudFormation template and then connect that account to Guardrails.
This is the second guide in the Getting started with AWS series.
Prerequisites
- Completed the previous guide: Prepare an AWS Account for import to Guardrails.
- Access to the Turbot Guardrails console with admin privilege.
Step 1: Return to Guardrails console
Switch back to the Guardrails console browser tab you opened in the previous guide. You should still be on the account configuration step where you downloaded the CloudFormation template.
Note: If you closed the tab, you'll need to start over: Navigate to Accounts in the left sidebar, click Actions > Connect Account, select AWS, then AWS Account, choose your folder, and configure the role settings again.
Step 2: Enter the Role ARN
Paste the Role ARN you obtained from the CloudFormation stack outputs (Step 7 in the previous guide) into the IAM Role ARN field.

Step 3: Test the connection
Click the Test Connection button to verify Guardrails can access your AWS account using the IAM role you created.

If successful, you'll see a confirmation message indicating Guardrails can connect to your account.
Troubleshooting: If the test fails, verify:
- The CloudFormation stack completed successfully
- The Role ARN matches exactly (copy from CloudFormation outputs)
- The External ID in Guardrails matches the one used in the CloudFormation template
Step 4: Connect the account
Click Connect to import your account into Guardrails.

Step 5: Observe progress
Wait for the progress bar to complete. The time this takes will depend on how many resources are in the account; it is normal for the progress bar to fluctuate in size as new types of resources are discovered.

Step 6: View Controls by state
Select Reports from the top navigation menu. Type controls into the Search reports… field to show only reports with the word "controls" in their name. Select the Controls by State report from the list.

Step 7: Configure report filters
From the filter bar, expand the Type dropdown. Then select the checkbox next to AWS to limit the report to only show AWS controls.
Bookmark the Controls by State report, you'll need it in subsequent guides.

Step 8: View the report
Review the status of your controls for AWS. Alarm, OK, Skipped, and TBD are all common and normal states to see in your account.
[!IMPORTANT] The controls in
ErrororInvalidstates must be cleared before moving further into these guides. It takes few mins depending on various factors. We suggest to wait and report to Turbot support, in case these errors are not cleared up automatically.

Step 9: Review
In this guide you successfully imported an AWS account into Guardrails.
Next Steps
In the next guide we’ll see how Guardrails monitors cloud events and reacts to resource changes.
Troubleshooting
If you run into issues following this guide, jump in the #guardrails channel in the Turbot Community Slack, or open a support ticket.
Progress tracker
- [x] Prepare an AWS Account for Import to Guardrails
- [x] Connect an AWS Account to Guardrails
- [ ] Observe AWS Resource Activity
- [ ] Enable Your First Policy Pack
- [ ] Review Account-Wide Governance
- [ ] Create a Static Exception to a Guardrails Policy
- [ ] Create a Calculated Exception to a Guardrails Policy
- [ ] Send an Alert to Email
- [ ] Apply a Quick Action
- [ ] Enable Automatic Enforcement