Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -17,10 +17,14 @@ With cross-account scanning, Agentless scanners are deployed across multiple reg

For larger accounts with 250 or more hosts, this is the most cost-effective option as it avoids cross-region scans, and reduces friction for managing your Agentless scanners. You can either create a dedicated account for your Agentless scanners or choose an existing one. The account where the Agentless scanners are located can also be scanned.

For AWS Organizations, you can use a [CloudFormation StackSet][5] to deploy the delegate role across all member accounts, automating the onboarding process for cross-account scanning.

The following diagram illustrates how Agentless scanning works when deployed in a central cloud account:

{{< img src="/sensitive_data_scanner/setup/cloud_storage/central-scanner.png" alt="Diagram of Agentless scanning showing the Agentless scanner is deployed in a central Cloud account" width="90%" >}}

[5]: /security/cloud_security_management/setup/agentless_scanning/enable#aws-cloudformation-stackset-setup

{{% /tab %}}
{{% tab "Same account scanning" %}}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -276,6 +276,54 @@ Datadog recommends updating the CloudFormation stack regularly, so you can get a

<br />

### AWS CloudFormation StackSet (Multi-Account)

For AWS Organizations with multiple accounts, use a CloudFormation StackSet to deploy the Agentless Scanning delegate role across all member accounts. This approach automates the onboarding process and ensures new accounts added to your Organization are automatically configured.

{{% collapse-content title="AWS CloudFormation StackSet setup guide" level="h4" id="aws-cloudformation-stackset-setup" %}}

This setup deploys the delegate role required for [cross-account scanning][18] across your AWS Organization or specific Organizational Units (OUs).

##### Prerequisites

1. Access to the AWS management account.
2. [Trusted Access with AWS Organizations][19] must be enabled for CloudFormation StackSets.
3. Agentless Scanning must already be configured in your central scanning account. See [AWS CloudFormation](#aws-cloudformation-setup) or [Terraform](#terraform-setup) setup.

##### Deploy the StackSet

1. Log in to your AWS management account and navigate to **CloudFormation > StackSets**.

2. Click **Create StackSet**.
3. Select **Service-managed permissions**.
4. Under **Specify template**, select **Amazon S3 URL** and enter the following URL:

{{< code-block lang="text" >}}
https://datadog-cloudformation-template-quickstart.s3.amazonaws.com/aws/v4.3.1/datadog_agentless_delegate_role_stackset.yaml
{{< /code-block >}}

5. Enter a **StackSet name** (for example, `DatadogAgentlessScanningStackSet`).
6. Configure the required parameters:
- **ScannerInstanceRoleARN**: The ARN of the IAM role attached to your Agentless scanner instances.

The `ScannerInstanceRoleARN` establishes a trust relationship between the delegate role (created in target accounts) and your scanner instances (already running in the central account). This enables cross-account scanning where:
1. The scanner runs in Account A.
2. The delegate role exists in Accounts B, C, D (deployed through the StackSet).
3. The scanner assumes the delegate roles to scan resources in those accounts.
7. Set **Deployment targets** to deploy across your Organization or specific OUs.
8. Enable **Automatic deployment** to automatically configure new accounts added to your Organization.
9. Select a **single region** for deployment (the IAM role is global and only needs to be deployed once per account).
10. Review and submit the StackSet.

After the StackSet deploys successfully, the member accounts are configured to allow cross-account scanning from your central scanner account.

[18]: /security/cloud_security_management/setup/agentless_scanning/deployment_methods
[19]: https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-enable-trusted-access.html

{{% /collapse-content %}}

<br />

### Azure Resource Manager

Use the Azure Resource Manager template to deploy the Agentless Scanner. The template includes the role definitions required to deploy and manage Agentless scanners.
Expand Down Expand Up @@ -401,4 +449,4 @@ If you did not use a dedicated resource group, you must manually delete the scan
[14]: https://github.com/DataDog/cloudformation-template/blob/master/aws_quickstart/version.txt
[15]: https://app.datadoghq.com/security/csm/vm
[16]: https://app.datadoghq.com/security/code-security/sca
[17]: https://app.datadoghq.com/sensitive-data-scanner/storage
[17]: https://app.datadoghq.com/sensitive-data-scanner/storage
Loading