JupiterOne + AWS Integration

Navigate SecOps complexity by connecting Users, Endpoints and Devices with specific Amazon Web Services using JupiterOne’s AWS Integration.

Overview of the AWS Integration

JupiterOne provides a managed integration with Amazon Web Services. The integration connects directly to AWS APIs to obtain infrastructure metadata and analyze resource relationships. Customers authorize read-only, security audit access by establishing an IAM trust relationship that allows JupiterOne to assume a role in their account.

Information is ingested from all AWS regions that do not require additional contractual arrangements with AWS. Please submit a JupiterOne support request if you need to monitor additional regions.

Robust AWS Integration

JupiterOne integrates with 29 (and growing) AWS services to provide unparalleled security and compliance visibility in a single location. It is easy to view and analyze the relationships between users, services and critical resources to quickly spot gaps, risks and vulnerabilities across your cloud environment.

A Searchable Graph

After ingesting and maintaining resources from your AWS services, JupiterOne maps the resources on a searchable graph. This graph highlights the complex relationships between resources, users and services while the JupiterOne query language allows users to ask questions or do simple text search to find details around a specific asset.

These searches can be performed two ways: using DevOps/engineering language or using compliance/security language. This makes JupiterOne a centralized resource for various teams, providing a single source of truth.

AWS Integrated Services

  • Account
  • AWS Certificate Manager
  • API Gateway
  • Amazon Batch
  • AWS CloudFormation
  • Amazon CloudFront
  • Amazon CloudWatch
  • AWS Config
  • Amazon DynamoDB
  • Amazon EC2
  • Amazon EC2 AutoScaling
  • Amazon Elastic Container Registry
  • Amazon Elastic Container Service
  • Amazon Elastic Kubernetes Service
  • Amazon Elastic Load Balancing
  • Amazon GuardDuty
  • AWS Identity and Access Management (IAM)
  • AWS IAM Cross Account Trust
  • AWS IAM Policy Analysis
  • Amazon Inspector
  • AWS Key Management Service
  • AWS Lambda
  • Amazon Relational Database Service
  • Amazon RedShift
  • Amazon Route 53
  • Amazon Simple Storage Service (S3)
  • S3 Bucket Policies
  • Transfer for SFTP
  • AWS Web Application Firewall

What our customers say

“As we assessed tool and technology options, we wanted to be certain we avoid featured overload. Centralized and simple was a priority” – David Atkins, Lucerna Health

Read the case study

“We had to learn what it meant to scale and secure a cloud application in the healthcare industry. Our customers’ sophistication and expectations for information security became increasingly complex as we moved up market.” – Bryce Daines, PierianDX

Read the case study

Download our research paper.

Learn how we implemented a "zero trust", data-centric security model with and a virtually air-gapped production environment by harnessing the power of cloud infrastructure, platform and services in Amazon Web Services (AWS).

Download Now

Providing Complete Visibility for Leading Cloud-Native Organizations

databricks logo

Providing Complete Visibility for Leading Cloud-Native Organizations

databricks logo