AWS IAM definition

Define your IAM policy for your AWS account, depending on the required permissions.

The minimum IAM permissions include viewing configuration and changing tags. They do not include enabling the DB audit, or restarting a DB. This JSON defines the minimum permissions, without which you cannot run cloud database service protection.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Action": [
                "rds:DescribeDBParameters",
                "rds:DescribeDBInstances",
                "rds:DescribeDBParameterGroups",
                "rds:DownloadDBLogFilePortion",
                "rds:DescribeDBLogFiles",
                "rds:ListTagsForResource",
                "rds:RemoveTagsFromResource",
                "rds:AddTagsToResource",
                "ec2:DescribeSecurityGroups",
                "ec2:DescribeVpcs"
            ],
            "Effect": "Allow",
            "Resource": "*"
        }
    ]
}
Full permission is enabled with these parameters.
Enable, disable DB audit on instance
When not configured, the Enable DB Auditing and Disable DB Auditing buttons are grayed out, and you need to request the DBA to enable or disable the DB instance on the AWS console.
"rds:CopyDBParameterGroup",
"rds:CreateDBParameterGroup",
"rds:ModifyDBInstance",
"rds:ModifyDBParameterGroup",
Restart DB instance
When not configured, the Restart buttons is grayed out, and you need to request the DBA to restart the DB instance on the AWS console.
"rds:RebootDBInstance",
Handle security group when the supported platform is EC2
When not configured, the DBA needs to add the Guardium IP to the security group. When configured, Guardium adds its IP to the security group of the DB instance. If the Guardium system cannot identify its own IP due to the network configuration, then the DBA needs to add the IP on the AWS console.
 "rds:ModifyDBInstance"
"rds:AuthorizeDBSecurityGroupIngress",
"rds:CreateDBSecurityGroup",
Handle security group when the supported platform is VPC
When not configured, the DBA needs to add the Guardium IP to the security group. When configured, Guardium adds its IP to the security group of the DB instance. If the Guardium system cannot identify its own IP due to the network configuration, then the DBA needs to add the IP on the AWS console.
 "rds:ModifyDBInstance"
"ec2:AuthorizeSecurityGroupIngress",
"ec2:CreateSecurityGroup",

When configuring these parameters, Guardium creates an inbound rule in the RDS instance security group, with collector public IP CIDR mask = 24.