Getting Started with ASecureCloud
Sign in to your ASecureCloud account or Sign up for a free trial.
Once signed in, you can:
- add an AWS account
- add an Azure subscription
You can also find instructions to add an AWS Organization or an Azure Management Group.
Add an AWS account
Once logged in, click on the “New AWS Account” button.
You can also go to Settings -> Cloud Settings -> New AWS Account
Add your AWS account details
Here you need to provide:
- AWS Account ID
- AWS Account Name / Description
- Workload region (where the workload is deployed, e.g. us-east-1)
- Account Type (Production, Dev, Sandbox)
used for rule severity weighting
- Enable Scheduled Assessments on/off (default is On)
Once done, click on the “Add Account and Create Profile” button.
Create the authentication profile
Here you select permissions for the ASecureCloud to access your AWS account.
- Read-only access (default)
- Read/Write access to the well-Architected tool (if you want to write back to the Well-Architected tool)
Note: You can select read-only or none if you do not use the well-Architected tool.
Once done, click on the “Continue Profile Setup” button.
Finalize the profile setup
Select the IAM Role Name that will be used to access your AWS account.
The system will generate a template for you in both
- cloudformation
- terraform
Click on the “Deploy with CloudFormation” button (recommended). You can also download the Terraform template or follow the instructions and create it manually.
This will open a new tab to the AWS console where you can review the template and deploy it.
Once the deployment is complete, come back to ASecureCloud and click on the “Validate” button.
Validate the profile
If the profile is valid, you will see a green checkmark.
You can now click on the “Create Profile and Launch Assessment” button.
Recap
Here is a quick gif summarizing the process:
Add an Azure subscription
Add an Azure Tenant
Click on the “Add Azure Tenant” button. You can also go to Settings -> Cloud Settings -> Add Azure Tenant
In the pop-up window, you need to provide:
- Scope (Azure + EntraID, EntraID only, or M365)
- Azure Tenant ID
- Azure Tenant Name / Description
- Endpoint type (Azure Public or Azure Government)
- Enable Scheduled Assessments (default is On)
Once done, click on the “Next: Subscription Onboarding Method” button.
Subscription Onboarding Method
In this step, you can either provide
- Azure Subscription ID (multiple subscriptions are supported)
- Onboard a Management Group and list all subscriptions in the management group for you to choose from
Select “Manually enter Subscription IDs” and click on “Next:Input Subscriptions” button.
Input Subscriptions IDs
You can now input the Azure Subscription IDs. For each subscription, you need to provide:
- Subscription ID
- Subscription Description
- Environment (Dev, Test, Production)
Click on + Additional Subscription button to add more subscription ID.
Once done, click on the “Next: Verify Connection” button.
Verify Connection
Using the information you provided, the system will generate various templates including:
- Terraform template
- PowerShell script
- Manual steps
Download the template to deploy to Azure and create the Service Principal.
Once created in Azure, you will need to collect the Service Principal details and enter them in the verify connection window.
- client ID
- client secret
- tenant ID
If the connection is successful, you will see a green checkmark.
Once done, click on the “Save Settings” button.
Support
If you encounter any issues during the onboarding process, please contact support
Next Steps
After successful onboarding, it’s time to review the assessment results.