Get Started
Welcome to the DataDefender portal! Assuming you are already logged in to the DataDefender solution, all you need to get started is to link AWS accounts for us to ingest.

Linking Accounts
To get started, you will deploy our CloudFormation stack into the first AWS account which you would like to us to ingest data from, confirm the stack creation in DataDefender, and we'll begin ingesting data. You can link as many AWS accounts as you would like using the following method.
Linking an Account is a 4 step process. This page will detail how to complete each step.
Initiate Deployment from DataDefender
Configure and deploy CloudFormation stack from AWS
Link the stack to DataDefender
Confirm Deployment
1. Initiate Deployment from DataDefender
In order to do this, navigate to Linked Accounts and click the
button.
You will see the following form:

Name your CloudFormation Stack.
Indicate the region your stack should reside in.
The next four settings determine whether our app will have access to and try to retrieve data for the S3 Inventory, EBS Inventory, File Systems, and Security Checks feature sets. If you select any of these settings, DataDefender will provision the necessary permissions required to gather information for these feature sets.
Decide whether to enable the Activity Monitoring CloudTrail Feature Set. DataDefender uses this information in its Monitoring and File Access Report features. The form requires an existing CloudTrail Trail and the S3 Bucket ARN of where the Trail is logging into. Place that ARN into the form. Please refer to the Configuration CloudTrail Log Bucket section for more details.
Decide whether to enable the Activity Monitoring S3 Server Access Logs Feature Set. DataDefender uses this feature in its Monitoring and File Access Report features. The form requires Server Access Logging enabled. We accept one S3 Bucket as input so ensure all buckets are pointing to one logging bucket. Place the ARN of that bucket into the form. Please refer to the Configuring Server Access Log Bucket section for more details.
2. Configure and deploy CloudFormation stack in AWS
Select 'Launch CloudFormation'. It will bring you to an AWS Login where you will need to sign in to the account where you wish to deploy our stack.
Once signed in, you'll be brought to CloudFormation's 'Quick create stack' menu.

Linked Account Stack Parameters
Currently, we have 13 parameters that you can configure to deploy our stack. Most settings are already created from the form from the previous step. Here is each parameter and its function:
Stack Name
What your stack will be named
my-stack
ActivityMonitoringCloudTrailQueueName
Optional; name to give the created Activity Monitoring SQS queue.
datadefender-activity-monitoring-ct
ActivityMonitoringCloudTrailS3BucketArn
The ARN of the S3 bucket that CloudTrail events are logged to.
arn:aws:s3:::example
ActivityMonitoringS3ServerAccessLogsBucketArn
The ARN of the S3 bucket that S3 server access logs are logged to.
arn:aws:s3:::example
ActivityMonitoringS3ServerAccessLogsQueueName
Optional; name to give the created Activity Monitoring S3 Server Access Logs SQS queue.
datadefender-activity-monitoring-sal
ConnectionManagementType
Whether the connection is self-managed or is a manager of other connections.
Self, Managed
EnableActivityMonitoringCloudTrailFeatureSet
Pick Yes if you would like to enable the activity monitoring feature set for a CloudTrail event source.
Yes, No
EnableActivityMonitoringS3ServerAccessLogsFeatureSet
Pick Yes if you would like to enable the activity monitoring feature set for a S3 Server Access Logs event source.
Yes, No
EnableEBSInventoryFeatureSet
Pick Yes if you would like to enable the EBS Inventory feature set.
Yes, No
EnableFileSystemsInventoryFeatureSet
Pick Yes if you would like to enable the File Systems Inventory feature set.
Yes, No
EnableS3InventoryFeatureSet
Pick Yes if you would like to enable the S3 Inventory feature set.
Yes, No
EnableSecurityChecksFeatureSet
Pick Yes if you would like to enable the security checks feature set.
Yes, No
IamRoleNameSuffix
Optional; suffix to include in the created IAM role. May be required if there are IAM role name conflicts.
CloudStorageSec
IdentityProviderUrl
The URL of the Cloud Storage Security identity provider to verify the identity when assuming the role. Do not include https:// in the URL. This does not have to be modified.
auth.datadefender.io/realms/datadefender
After you are satisfied with your parameters, select 'I acknowledge that AWS CloudFormation might create IAM resources with custom names.' and deploy the stack.
3. Link the Stack to DataDefender
After the stack finishes deploying, open the Outputs tab. You should see three outputs.
For all deployments, copy the ARN of the Cross-Account IAM Role.
If you also enabled Activity Monitoring – S3 Server Access Logs and Activity Monitoring – CloudTrail Feature Set, copy the values of the respective queues as well.

Now, return to the DataDefender portal and complete the following steps:
Click Continue to go to Step 2: Activate Account.
Leave the CloudFormation stack name and region as they appear (these are the stack name and region used in the previous deployment).
Paste the Cross-Account IAM Role ARN into the AWS Role ARN field.
In Connection Management, you can choose between:
Self-Managed: An account that operates independently, with all configurations managed directly.
Manager: A management account that can discover and connect to child accounts within its organization.
Enter the AWS Account ID where you deployed the stack.
(Optional) Enter an Account Nickname.
Click ![]()
If you enabled Activity Monitoring with CloudTrail or S3 Access Logging, complete Step 3: Configure Activity Monitoring. (Otherwise, disable and skip this step.)
Paste the CloudTrail Queue value from the Outputs into the CloudTrail queue name field, and select the region where the queue resides.
Paste the S3 Access Logging Queue value from the Outputs into the S3 queue name field, and select the region where the queue resides.

Click ![]()
4. Confirm Deployment
Your stack should now be linked. Verify in the 'Linked Accounts' section for the green check symbol under 'Credential Status' alongside your alias.

Using the Product
Now that you have data flowing into your account, you are free to start using DataDefender! For explanations of the DataDefender Portal, head on over to the Portal Overview page.
Last updated
