AWS Audit Manager and AWS Organizations - AWS Organizations

AWS Audit Manager and AWS Organizations

AWS Audit Manager helps you continuously audit your AWS usage to simplify how you assess risk and compliance with regulations and industry standards. Audit Manager automates evidence collection to make it easier to assess if your policies, procedures, and activities are operating effectively. When it is time for an audit, Audit Manager helps you manage stakeholder reviews of your controls and helps you build audit-ready reports with much less manual effort.

When you integrate Audit Manager with AWS Organizations, you can gather evidence from a broader source by including multiple AWS accounts from your organization within the scope of your assessments.

For more information, see Enable AWS Organizations in the Audit Manager User Guide.

Use the following information to help you integrate AWS Audit Manager with AWS Organizations.

Service-linked roles created when you enable integration

The following service-linked role is automatically created in your organization's management account when you enable trusted access. This role allows Audit Manager to perform supported operations within your organization's accounts in your organization.

You can delete or modify this role only if you disable trusted access between Audit Manager and Organizations, or if you remove the member account from the organization.

For more information about how Audit Manager uses this role, see Using service-linked roles in the AWS Audit Manager Users Guide.

  • AWSServiceRoleForAuditManager

Service principals used by the service-linked roles

The service-linked role in the previous section can be assumed only by the service principals authorized by the trust relationships defined for the role. The service-linked roles used by Audit Manager grant access to the following service principals:

  • auditmanager.amazonaws.com

To enable trusted access with Audit Manager

For information about the permissions needed to enable trusted access, see Permissions required to enable trusted access.

Audit Manager requires trusted access to AWS Organizations before you can designate a member account to be the delegated administrator for your organization.

You can enable trusted access using either the AWS Audit Manager console or the AWS Organizations console.

Important

We strongly recommend that whenever possible, you use the AWS Audit Manager console or tools to enable integration with Organizations. This lets AWS Audit Manager perform any configuration that it requires, such as creating resources needed by the service. Proceed with these steps only if you can’t enable integration using the tools provided by AWS Audit Manager. For more information, see this note.

If you enable trusted access by using the AWS Audit Manager console or tools then you don’t need to complete these steps.

To enable trusted access using the Audit Manager console

For instructions about enabling trusted access, see Setting Up in the AWS Audit Manager User Guide.

Note

If you configure a delegated administrator using the AWS Audit Manager console, then AWS Audit Manager automatically enables trusted access for you.

You can enable trusted access by running a Organizations AWS CLI command, or by calling an Organizations API operation in one of the AWS SDKs.

AWS CLI, AWS API
To enable trusted service access using the Organizations CLI/SDK

You can use the following AWS CLI commands or API operations to enable trusted service access:

  • AWS CLI: enable-aws-service-access

    You can run the following command to enable AWS Audit Manager as a trusted service with Organizations.

    $ aws organizations enable-aws-service-access \ --service-principal auditmanager.amazonaws.com

    This command produces no output when successful.

  • AWS API: EnableAWSServiceAccess

To disable trusted access with Audit Manager

For information about the permissions needed to disable trusted access, see Permissions required to disable trusted access.

Only an administrator in the AWS Organizations management account can disable trusted access with AWS Audit Manager.

You can disable trusted access using only the Organizations tools.

You can disable trusted access by running a Organizations AWS CLI command, or by calling an Organizations API operation in one of the AWS SDKs.

AWS CLI, AWS API
To disable trusted service access using the Organizations CLI/SDK

You can use the following AWS CLI commands or API operations to disable trusted service access:

  • AWS CLI: disable-aws-service-access

    You can run the following command to disable AWS Audit Manager as a trusted service with Organizations.

    $ aws organizations disable-aws-service-access \ --service-principal auditmanager.amazonaws.com

    This command produces no output when successful.

  • AWS API: DisableAWSServiceAccess

Enabling a delegated administrator account for Audit Manager

When you designate a member account to be a delegated administrator for the organization, users and roles from that account can perform administrative actions for Audit Manager that otherwise can be performed only by users or roles in the organization's management account. This helps you to separate management of the organization from management of Audit Manager.

Minimum permissions

Only a user or role in the Organizations management account with the following permission can configure a member account as a delegated administrator for Audit Manager in the organization:

audit-manager:RegisterAccount

For instruction about enabling a delegated administrator account for Audit Manager, see Setting Up in the AWS Audit Manager User Guide.

If you configure a delegated administrator using the AWS Audit Manager console, then Audit Manager automatically enables trusted access for you.

AWS CLI, AWS API

If you want to configure a delegated administrator account using the AWS CLI or one of the AWS SDKs, you can use the following commands:

  • AWS CLI:

    $ aws audit-manager register-account \ --delegated-admin-account 123456789012
  • AWS SDK: Call the RegisterAccount operation and provide delegatedAdminAccount as a parameter to delegate the administrator account.