Setting Up With Turbot-Managed IAM Role

In this guide, you will:

  • Setup Global Event Handlers in the Guardrails workspace using the Guardrails UI.
  • Monitor and troubleshoot the GEH update process.

Guardrails is designed to enable organizations to selectively install policies, controls, and guardrails tailored to specific services. The Global Event Handler simplifies cloud management by providing a unified framework for responding to and managing events, ensuring proactive governance and security across cloud environments.

Prerequisites

  • Turbot/Owner permissions at the Turbot resource level.
  • Familiarity with Guardrails console.
  • Turbot Guardrails configured IAM role should have required IAM permissions to create IAM role and policy.
  • CloudTrail should be configured. See here for more details.

Step 1: Login Guardrails Console

Log into the Guardrails console with provided local credentials or by using any SAML based login.

Guardrails Console Login

Step 2: Enable Service Role

IAM role is required for Global Event handler. This can be created manually by customer or can be done by AWS Turbot Service Role

Enable Service Role

Check if all the AWS > Turbot > Service Rolescontrols in all AWS accounts are in OK state

Service Role Control

Step 3: Check Service Role Source Policy

Select any one of the control from the above step and navigate to Policies, select Source to validate the created policy.

Service Role Source Policy

Note

You can create these roles manually and use the same. Open a Support Ticket to help you with the process in case you need to create these roles manually as per your compliance need.

Step 4: Enable Global Event Handler

In the Guardrails's console navigate to the Policies and search for AWS > Turbot > Service Roles > Event Handlers [Global] policy. Select New Policy Setting

Event Handlers [Global] Policy

Choose Resource as Turbot and Setting as Enabled

Enable GEH

Step 5: Review

Validate that the setting is applied successfully. While in Settings tab, select Event Handler [Global] value.

Select Value

Ensure the value is shown as Enabled. Select no of values circled to validate the number of account where the policy is applied.

Validate Post Setting Values

Check if all the related controls for AWS > Turbot > Event Handlers [Global] are in OK state. You can browse to the Reports tab, navigate to Controls by State, select AWS > Turbot > Event Handlers [Global] in Types. Ensure all controls are in OK state.

Report Event Handler Global

Step 6: Verify Events

The global event handlers are now configured in the target account. To verify they are functioning correctly:

  1. Primary Region Testing: Create a resource in the primary region and verify its detection. Confirm that the associated controls are triggered and executed based on the policies set in the Guardrails console.

  2. Secondary Region Testing: Create a resource in a secondary region and verify its detection. Ensure that the associated controls are triggered and executed according to the policies set in the Guardrails console.

Troubleshooting

IssueDescriptionGuide
Permission IssuesIf the permissions granted to the Turbot IAM role do not allow configuration of event rules and SNS topics, then the logs will indicate access denied.Troubleshoot Permission Issues
Service control policies (SCPs) Regional RestrictionsSCPs restrictions will appear as Access Denied errors in the Guardrails console.Work with your SCP admins to determine which regions are permitted then update the AWS > Account > Regions policy to match.
Further AssistanceIf you continue to encounter issues, please open a ticket with us and attach the relevant information to assist you more efficiently.Open Support Ticket