Amazon Security Incident Response and Amazon Organizations - Amazon Organizations
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Amazon Security Incident Response and Amazon Organizations

Amazon Security Incident Response is a security service that provides 24/7, live, human-assisted security incident support to help customers respond rapidly to cybersecurity incidents such as credential theft and ransomware attacks. By integrating with Organizations you enable security coverage for your entire organization. For more information, see Managing Amazon Security Incident Response accounts with Amazon Organizations in the Security Incident Response User Guide.

Use the following information to help you integrate Amazon Security Incident Response with Amazon Organizations.

Service-linked roles created when you enable integration

The following service-linked roles are automatically created in your organization's management account when you enable trusted access.

  • AWSServiceRoleForSecurityIncidentResponse - used for creating Security Incident Response membership - your subscription to the service through Amazon Organizations.

  • AWSServiceRoleForSecurityIncidentResponse_Triage - used only when you enable the triage feature during sign-up.

Service principals used by Security Incident Response

The service-linked roles in the previous section can be assumed only by the service principals authorized by the trust relationships defined for the role. The service-linked roles used by Security Incident Response grant access to the following service principal:

  • security-ir.amazonaws.com

Enabling trusted access to Security Incident Response

Enabling trusted access to Security Incident Response allows the service to keep track of your organization's structure and ensure that all accounts in the organization have active security incident coverage. It also allows the service to use a service-linked role in member accounts for triaging capabilities when you enable the triage feature.

For information about the permissions needed to enable trusted access, see Permissions required to enable trusted access.

You can enable trusted access using either the Amazon Security Incident Response console or the Amazon Organizations console.

Important

We strongly recommend that whenever possible, you use the Amazon Security Incident Response console or tools to enable integration with Organizations. This lets Amazon Security Incident Response perform any configuration that it requires, such as creating resources needed by the service. Proceed with these steps only if you can’t enable integration using the tools provided by Amazon Security Incident Response. For more information, see this note.

If you enable trusted access by using the Amazon Security Incident Response console or tools then you don’t need to complete these steps.

Organizations automatically enables the Organizations trusted access when you use the Security Incident Response console for setup and management. If you use the Security Incident Response CLI/SDK then you have to manually enable trusted access by using the EnableAWSServiceAccess API. To learn how to enable trusted access through the Security Incident Response console, see Enabling trusted access for Amazon Account Management in the Security Incident Response User Guide.

You can enable trusted access by using either the Amazon Organizations console, by running a Amazon CLI command, or by calling an API operation in one of the Amazon SDKs.

Amazon Web Services Management Console
To enable trusted service access using the Organizations console
  1. Sign in to the Amazon Organizations console. You must sign in as an IAM user, assume an IAM role, or sign in as the root user (not recommended) in the organization’s management account.

  2. In the navigation pane, choose Services.

  3. Choose Amazon Security Incident Response in the list of services.

  4. Choose Enable trusted access.

  5. In the Enable trusted access for Amazon Security Incident Response dialog box, type enable to confirm, and then choose Enable trusted access.

  6. If you are the administrator of only Amazon Organizations, tell the administrator of Amazon Security Incident Response that they can now enable that service to work with Amazon Organizations from the service console .

Amazon CLI, Amazon API
To enable trusted service access using the OrganizationsCLI/SDK

Use the following Amazon CLI commands or API operations to enable trusted service access:

  • Amazon CLI: enable-aws-service-access

    Run the following command to enable Amazon Security Incident Response as a trusted service with Organizations.

    $ aws organizations enable-aws-service-access \ --service-principal security-ir.amazonaws.com

    This command produces no output when successful.

  • Amazon API: EnableAWSServiceAccess

Disabling trusted access with Security Incident Response

Only an administrator in the Organizations management account can disable trusted access with Security Incident Response.

You can only disable trusted access using the Organizations tools.

You can disable trusted access by using either the Amazon Organizations console, by running an Organizations Amazon CLI command, or by calling an Organizations API operation in one of the Amazon SDKs.

Amazon Web Services Management Console
To disable trusted service access using the Organizations console
  1. Sign in to the Amazon Organizations console. You must sign in as an IAM user, assume an IAM role, or sign in as the root user (not recommended) in the organization’s management account.

  2. In the navigation pane, choose Services.

  3. Choose Amazon Security Incident Response in the list of services.

  4. Choose Disable trusted access.

  5. In the Disable trusted access for Amazon Security Incident Response dialog box, type disable to confirm, and then choose Disable trusted access.

  6. If you are the administrator of only Amazon Organizations, tell the administrator of Amazon Security Incident Response that they can now disable that service from working with Amazon Organizations using the service console or tools .

Amazon CLI, Amazon API
To disable trusted service access using the Organizations CLI/SDK

You can use the following Amazon CLI commands or API operations to disable trusted service access:

  • Amazon CLI: disable-aws-service-access

    Run the following command to disable Amazon Security Incident Response as a trusted service with Organizations.

    $ aws organizations disable-aws-service-access \ --service-principal security-ir.amazonaws.com

    This command produces no output when successful.

  • Amazon API: DisableAWSServiceAccess

Enabling a delegated administrator account for Security Incident Response

When you designate a member account as a delegated administrator for the organization, users and roles from that account can perform administrative actions for Security Incident Response that otherwise can be performed only by users or roles in the organization's management account. This helps you to separate management of the organization from management of Security Incident Response. For more information, see Managing Amazon Security Incident Response accounts with Amazon Organizations in the Security Incident Response User Guide.

Minimum permissions

Only a user or role in the Organizations management account can configure a member account as a delegated administrator for Security Incident Response in the organization

To learn how to configure a delegated administrator through the Security Incident Response console, see Designating a delegated Security Incident Response administrator account in the Security Incident Response User Guide.

Amazon CLI, Amazon API

If you want to configure a delegated administrator account using the Amazon CLI or one of the Amazon SDKs, you can use the following commands:

  • Amazon CLI:

    $ aws organizations register-delegated-administrator \ --account-id 123456789012 \ --service-principal security-ir.amazonaws.com
  • Amazon SDK: Call the Organizations RegisterDelegatedAdministrator operation and the member account's ID number and identify the account service security-ir.amazonaws.com as parameters.

Disabling a delegated administrator for Security Incident Response

Important

If membership was created from the delegated administrator account, deregistering the delegated administrator is a destructive action and will cause service disruption. To re-register DA:

  1. Sign in to the Security Incident Response console at https://console.aws.amazon.com/security-ir/home#/membership/settings

  2. Cancel membership from the service console. Membership remains active until the end of billing cycle.

  3. Once membership is cancelled disable service access through the Organizations console, CLI or SDK.

Only an administrator in the Organizations management account can remove a delegated administrator for Security Incident Response. You can remove the delegated administrator using the Organizations DeregisterDelegatedAdministrator CLI or SDK operation.