Integrations

Connecting SecureSlate & AWS Accounts

Connecting Amazon Web Services (AWS) to SecureSlate enables continuous cloud scanning and misconfiguration checks. SecureSlate connects with read-only permissions so it can evaluate your environment without making changes to your AWS resources.

After connecting, findings appear on the Checks tab of the Cloud overview page, filtered by AWS.

Prerequisites

Before you start, make sure you have:

  • SecureSlate permissions: access to create/manage integrations (typically Admin).
  • AWS permissions: permission to create IAM users and customer-managed policies, and to attach AWS managed policies.
  • An AWS account owner/admin (or equivalent) available to complete the IAM steps in the AWS console.

Connect an AWS account

SecureSlate guides you through a short setup wizard. The connection is completed in four steps: create an IAM user, create a supplemental policy, paste credentials into SecureSlate, and name the connection.

Step 1: Start the AWS wizard in SecureSlate

  1. In SecureSlate, open the Cloud overview page.
  2. Click Connect cloud, then choose AWS to open the AWS Configuration wizard.
  3. In the wizard, begin at Create IAM user.

Step 2: Create an IAM user in AWS

  1. Log into the AWS console as an admin (or a role that can create IAM resources).
  2. Open IAMUsersAdd user.
  3. Set the username to secureslate-scanner.
  4. Enable Programmatic access.
  5. Choose Attach existing policies directly and attach the AWS managed policy SecurityAudit.
  6. Pause before you finish creating the user. You’ll add a SecureSlate supplemental policy next, then return to complete user creation.

 
AWS Configuration - Create IAM user

Step 3: Create the SecureSlate supplemental policy

SecureSlate requires a small set of additional read-only permissions (primarily Describe* / List* actions) beyond SecurityAudit for certain services.

  1. In the SecureSlate wizard, go to Set up policy and copy the JSON policy shown.
  2. In AWS IAM, open PoliciesCreate policy.
  3. Switch to the JSON editor and paste the policy from SecureSlate.
  4. Create the policy with the name SecureSlateSupplemental.
  5. Return to the IAM user you were creating and attach SecureSlateSupplemental to secureslate-scanner.
  6. Finish creating the IAM user and generate an Access key ID and Secret access key.
  7. Save the secret access key immediately (AWS will not show it again).

 
AWS Configuration - Set up policy

Step 4: Add AWS credentials in SecureSlate

  1. In the SecureSlate wizard, go to Connect accounts.
  2. Paste the Access key ID and Secret access key for the secureslate-scanner IAM user.
  3. Click Continue.

 
AWS Configuration - Connect accounts

Step 5: Name the connection and complete setup

  1. In the wizard, go to Name your cloud connection.
  2. Enter a clear Cloud name (for example, “AWS Production” or “AWS Staging”).
  3. Select a purpose (production, staging, development).
  4. Click Complete Configuration.

 
AWS Configuration - Name your cloud connection

After you complete the flow, SecureSlate will begin scanning. In most environments, initial findings appear within a few minutes.

Verify the integration

To confirm everything is working:

  • Open Cloud overview and confirm the AWS connection appears.
  • Open Checks and filter to AWS to see results populate.
  • If you recently connected, wait a few minutes and refresh—larger AWS environments can take longer on the initial pass.

Troubleshooting

If the connection fails or findings don’t appear:

  • Confirm the IAM user has both policies attached:
    • AWS managed SecurityAudit
    • Customer-managed SecureSlateSupplemental
  • Confirm you copied the correct access keys for secureslate-scanner and that the secret access key was saved at creation time.
  • If keys were rotated or lost, create a new access key (or a new IAM user) and update the connection in SecureSlate.

Last updated: April 13, 2026