Integrations
Amazon Web Services (AWS)
title: Amazon Web Services (AWS) description: Configure AWS integration for automatic compliance monitoring in Tidal Control sidebar_position: 3
Amazon Web Services (AWS)
Configuring AWS integration
The AWS integration enables Tidal Control to automatically execute compliance tests on your AWS environment via a cross-account role configuration.
Requirements:
- Super User role in Tidal Control
- AWS IAM role management rights
- Access to AWS Management Console
Configuration step-by-step plan
What we're going to do: We'll create a cross-account role in your AWS account that allows Tidal to retrieve compliance data. A cross-account role is an AWS mechanism that enables an external AWS account (Tidal) to securely access specific resources in your account without sharing credentials.
Configuration steps:
- Note Tidal information
- Create AWS IAM role
- Assign permissions
- Retrieve Role ARN
- Complete integration
Step 1: Note Tidal information
- Go to Settings → Integrations in Tidal Control
- Click the plus icon next to Amazon Web Services
- Note the Tidal Account ID from the dialogue screen
- Note the suggested External ID (Tidal automatically generates a secure ID)
- Save these values - you'll need them for AWS configuration
Step 2: Create AWS IAM role
- Log in to AWS Management Console
- Navigate to IAM → Roles → Create role
- Select "AWS account" → "Another AWS account"
- Enter the Tidal Account ID (from step 1)
- Tick "Require external ID"
- Enter the External ID (from step 1)
- Click "Next"
Step 3: Assign permissions
- Search for policy "SecurityAudit"
- Select SecurityAudit policy
- Click "Next" to continue
- (Optional) Add tags and click "Next"
Step 4: Retrieve Role ARN
- Give the role the name "Tidal Integration"
- Add description: "Read-only role for Tidal Control compliance monitoring"
- Click "Create role"
- Go to Roles overview and search for your new role
- Click on role name to open details
- Copy the Role ARN (save for Tidal configuration)
Step 5: Complete integration
- Return to Tidal dialogue screen
- Enter recognisable name for integration
- Paste the Role ARN (from step 4)
- Check External ID is correctly carried over
- Select AWS Region (top right in AWS Console)
- Click "Test connection" for verification
Region setting: Use aws-global
if your account uses global services, otherwise the specific region like eu-west-1
Verification
After successful configuration, Settings → Integrations shows a "Connected" status for AWS, AWS-specific tests are available in the Tests section, and test refreshes deliver results without authentication errors.
Save External ID: Note the External ID securely - it's unique and needed for troubleshooting
Troubleshooting
Troubleshooting issues:
- Verify Role ARN correctly copied (no extra spaces)
- Check External ID matches between AWS and Tidal
- Confirm SecurityAudit policy linked to role
- Verify AWS Region correctly selected
Still having trouble?
Send an email to support@tidalcontrol.com, and we'll get in touch as soon as possible.
Gathering support info: Note which browser you're using, exact error messages, which steps you've already tried, and screenshots of the problem. This significantly speeds up the solution.
- Previous
- Microsoft Azure