Hi everyone,
We recently signed on with Check Point's Infinity Platform, with particular interest in CloudGuard Posture Management. We have 12+ AWS accounts ranging from PoC to full-on Production and want to keep close tabs on what user activity and configured services look like over time. We have defined CloudTrail instances within each account, along with the required policies, roles, and S3 buckets.
However, because we're using Control Tower (with Organizations), we have a single AWS account with aggregated CloudTrail logs present in a single location. We've onboarded all our accounts referencing this single CloudTrail source but have run into problems with the applied AWS SCPs at the OU levels. Because Control Tower restricts access into any account it has ownership of, all externally sourced requests to pull logs and read AWS services are denied. After a few weeks of working with TAC, we determined we could manually change a single line in the applied SCPs in Control Tower. This worked perfectly... until Control Tower began complaining that our configuration was in a "drift state," blocking us from adding any new AWS accounts.
A colleague went ahead with re-deploying the AWS-generated SCPs across Control Tower and, as a result, our CloudGuard access is gone. The only fix I see is it reapply the one-off workaround with modifying the SCPs, but we will be right back in the same position then. ("Working," but "broken" from AWS' perspective.)
So, my question is this, please: those of you who use CloudGuard with Control Tower-integrated AWS environments... how do you do it? How do you apply permissions that allow ControlTower to retain ultimate authority, but with CloudGuard granted the access it needs to ingest and analyze data?
I appreciate any feedback or help you can provide. Please also let me know if you need more info or details on a particular area.
Thanks very much for your time and help in advance.