Connect AWS Account to Aikido

Why connect my AWS cloud?

Securing your cloud infrastructure is crucial to protecting your user data. You can leverage Aikido's security checks to detect and address any misconfigurations in your infrastructure.

Aikido will surface critical cloud misconfigurations that allow hackers to get into your AWS cloud, such as the risk highlighted in this blog post. We focus on the risks that can have a truly big impact on your company's business and cut the noise.

To view the list of security checks performed by Aikido on your cloud environment, go to the 'checks' tab on the cloud overview page at. Filter to AWS to see specific checks performed on your connected AWS account.

Assuming you're using multiple AWS accounts via 'AWS Organizations' to separate staging from production, we recommend trying out Aikido on your staging account first, to get a feel for the process.

Features

After connecting, Aikido will perform the following monitoring:

Getting started

To get started, head to the cloud overview page on Aikido and click 'Connect cloud.' Follow the step-by-step setup wizard to connect your AWS account to Aikido.

Aikido will require the creation of new role in your AWS account. The permissions for this role enable us to do a security audit of your cloud, but not edit your cloud infrastructure. This works by giving the Aikido AWS account a trust relationship with the newly created role in your account

To view the exact CloudFormation template used to create this role, click here. Inside the wizard, Aikido can also generate an equivalent Terraform template for you.

After creation of the role, Aikido only needs the specific ARN to get started. No access keys or passwords are ever shared with Aikido.

Finally, you can name your connected project in Aikido and specify the environment it operates in. This information helps Aikido prioritize findings based on the severity and impact to your business.

Within 1-2 minutes after connecting your account, Aikido will report misconfigurations that could pose a threat.

Advanced Rules

Besides the checks mentioned above, Aikido offers a suit of complementary checks/rules that you can enable. We call these advanced cloud rules and you can find them here. After enabling any of these rules, you can expect to see the results (as new issues in the feed) within a few seconds.

Just like the standard checks, these are evaluated with each scan of your cloud environments. Moreover, they are mapped to the compliance reports. By default, the advanced rules will appear as disabled in the compliance reports, unless you activate them.

AWS Advanced Rules Changelog

Rule
Severity
Release Date

IAM users have old access keys

Medium

Jun 25, 2025

S3 buckets allow plain HTTP access

Low

Jun 25, 2025

EBS snapshot is publicly accessible

High

Jun 25, 2025

Redshift cluster is publicly accessible

High

Jun 25, 2025

Redshift clusters allow unrestricted inbound traffic

High

Jun 25, 2025

SNS topic allows public access

High

Jun 25, 2025

EventBridge bus allows cross-account access

High

Jun 25, 2025

IAM user has not logged in for over 90 days

Medium

Jun 25, 2025

Elastic Beanstalk environment without managed platform updates

Medium

Jun 25, 2025

RDS instance without deletion protection

Medium

Jun 25, 2025

DynamoDB table without deletion protection

Medium

Jun 25, 2025

Neptune cluster without deletion protection

Medium

Jun 25, 2025

DocumentDB cluster without deletion protection

Medium

Jun 25, 2025

Neptune cluster has IAM database authentication disabled

Medium

Jun 25, 2025

OpenSearch domain is publicly accessible

High

Jun 25, 2025

CloudWatch Log Groups without retention period

Medium

Aug 14, 2025

RDS instances do not have Multi-AZ enabled

Medium

Aug 14, 2025

ECS task definitions do not limit container memory usage

Medium

Aug 14, 2025

Load balancers do not enforce HTTPS

High

Aug 14, 2025

CloudFront distributions do not enforce HTTPS

High

Aug 14, 2025

EC2 instances termination protection disabled

Medium

Aug 14, 2025

Last updated

Was this helpful?