Connect your AWS account to CloudCash securely in under 3 minutes.
CloudCash uses AWS STS (AssumeRole) to scan your account securely without requiring permanent access keys. First, we need to create a role that trusts CloudCash.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::010526239862:role/service-role/CloudCash_Scanner_v1-role-h3uf9wy2"
},
"Action": "sts:AssumeRole"
}
]
}
Click Next to add permissions. Your role needs two policies attached to it: one to read your environment, and one to safely remediate waste.
AmazonEC2ReadOnlyAccess and check the box next to it. This allows CloudCash to find your zombie resources.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowVolumeDeletion",
"Effect": "Allow",
"Action": [
"ec2:DeleteVolume",
"ec2:DescribeVolumes",
"ec2:DescribeInstances"
],
"Resource": "*"
},
{
"Sid": "SafetyNetSnapshots",
"Effect": "Allow",
"Action": [
"ec2:CreateSnapshot",
"ec2:CreateTags"
],
"Resource": [
"arn:aws:ec2:*:*:volume/*",
"arn:aws:ec2:*:*:snapshot/*"
]
}
]
}
Click Next, give your role a name (e.g., CloudCash_CrossAccount_Role), and click Create role.
Now that your role is created and configured, we need to tell CloudCash where to look.
arn:aws:iam::123456789012:role/CloudCash_CrossAccount_Role).You are all set! You can now return to the Overview tab and click "Run Deep Audit".