Credential options
InfraAudit supports three ways to authenticate with AWS. All three require the same IAM policy — they differ only in how credentials are stored and rotated.Option 1: IAM user access keys (simplest)
Option 1: IAM user access keys (simplest)
Create a dedicated IAM user with read-only permissions and generate a long-lived access key pair.
Create an IAM user
In the AWS console, go to IAM → Users → Create user. Give the user a descriptive name such as
infraudit-reader.Attach the InfraAudit policy
Attach the policy from the Required IAM policy section below, either directly or via a policy attached to a group.
Option 2: IAM role with AssumeRole (recommended for production)
Option 2: IAM role with AssumeRole (recommended for production)
Create an IAM role that InfraAudit can assume. This avoids long-lived user credentials.
Create the IAM role
In the AWS console, go to IAM → Roles → Create role. Set the trust policy to allow your InfraAudit service account or IAM user to call
sts:AssumeRole.Attach the InfraAudit policy
Attach the policy from the Required IAM policy section to the role.
Option 3: IAM Identity Center (SSO)
Option 3: IAM Identity Center (SSO)
For organizations using AWS IAM Identity Center (formerly SSO), use the SSO portal to generate temporary credentials and pass them to InfraAudit. Temporary credentials expire, so you’ll need to refresh them periodically.
Required IAM policy
Attach this policy to the IAM user or role InfraAudit will use. All actions are read-only.Connect your AWS account
- UI
- CLI
- API
Enter your credentials
Fill in:
- Access Key ID
- Secret Access Key
- Region — the primary region for API calls (resources in other regions are also discovered automatically)
- Display name — a label for this account in the InfraAudit UI
What gets synced
After connecting, InfraAudit discovers and continuously monitors the following resource types:| Resource type | Internal type name |
|---|---|
| EC2 instances | ec2_instance |
| S3 buckets | s3_bucket |
| RDS instances | rds_instance |
| RDS clusters | rds_cluster |
| Lambda functions | lambda_function |
| CloudFront distributions | cloudfront_distribution |
| VPCs | vpc |
| Security groups | security_group |
Multi-region and multi-account support
InfraAudit discovers resources across all enabled regions in your AWS account automatically. The Region field in the connection form sets the primary region for API calls, not a filter. To monitor multiple AWS accounts, connect each as a separate provider. All accounts appear together in the unified resource inventory. The number of accounts you can connect depends on your plan.Security notes
- Credentials are encrypted at rest using AES-GCM with the server’s
ENCRYPTION_KEY. - InfraAudit never writes to your AWS account. Every API call is read-only.
- For tighter security, you can scope the IAM policy to specific regions or resource ARN prefixes.