9 policies attached · 1 write policy · 8 read-only policies
Role purpose: Collecting compliance evidence from AWS accounts and monitoring — this role is assumed by the Transilience platform to assess security posture, gather audit artifacts, and run configuration checks across your AWS environment.
| Policy | Access | Purpose | Read Permissions | Write Permissions | Scope |
|---|---|---|---|---|---|
SecurityAudit AWS Managed | READ | Collect compliance evidence across AWS services for monitoring and audit |
| none | Resource: * |
Transilience-ECR-S3-Read Customer Managed | READ | Vulnerability scanning of container images and reading S3 bucket configurations |
| none | Resource: * |
Transilience-Logs-VPC-Read Customer Managed | READ | Reading logs for compliance monitoring and network configuration evidence |
| none | Resource: * |
Transilience-Security-Services-Read Customer Managed | READ | Collecting compliance evidence from AWS security services |
| none | Resource: * |
Transilience-CloudTrail-Read Customer Managed | READ | Security — auditing API activity and account-level events |
| none | Resource: * |
Transilience-SSM-Read Customer Managed | READ | Reading instance configuration and patch state as compliance evidence |
| none | Resource: * |
Transilience-SSM-Write Customer Managed | WRITE | Running configuration scripts to collect configurations on instances, such as SSH, FIM. | none |
| Resource: * PassRole: TransilienceComplianceRole |
Transilience-Cost-Explorer Customer Managed | READ | Cost analysis of compliance runs and service usage |
| none | Resource: * |
TransilienceCloudTrailS3Access Inline · Dynamic | READ | Security — reading CloudTrail log files from S3 for audit evidence |
| none | CloudTrail buckets Dynamic — resolved at deploy time |
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article