Skip to main content

Identify and Add Missing AWS Permissions for Drata

Updated over a week ago

Overview

This guide walks you through how to identify and add missing AWS permissions when Drata tests enter an error state or new services are enabled. You'll locate the IAM role connected to Drata and update it using AWS best practices.

Drata uses a default read-only permission set designed to support the most common monitoring and evidence collection use cases. While this set is broad enough for most setups, you may need to expand it as your environment evolves.

Prerequisites

Before you begin, confirm you have the following as prerequisites:

  • An existing AWS integration with Drata

  • Permission to manage IAM roles and policies

  • Name or ARN of the IAM role connected to Drata

  • The specific missing permissions identified by Drata

    • These are provided in Drata error messages or test instructions.

Don't have AWS access?

If you don’t have direct access to AWS or your organization manages IAM roles through Infrastructure as Code (IaC), you’ll need to submit a request to your infrastructure or DevOps team.

When creating a ticket or request, include the following:

  • Name or ARN of the IAM role used by Drata

  • Specific AWS permissions required (e.g., s3:GetBucketPolicy)

  • Source of the request (e.g., erroring test)

  • Suggested location for the update (e.g., existing SecurityAudit-based policy)

Your team can apply the changes using their preferred method, such as Terraform, CloudFormation, or the AWS Console.

Steps

Step 1: Identify the Required Permissions

To find out which permissions are missing:

  1. In Drata, go to the Monitoring page and locate the relevant test.

    • You can filter tests by an Error or Failed state to narrow the results.

  2. Open the test and review the Latest result section in the Overview tab or go to the Findings tab to view the affected resources and the raw JSON output.

Make a note of the specific AWS actions required (e.g., ec2:DescribeInstances).

Note: To view the test instructions, select the test from the Monitoring page, then in the Overview tab, go to the Details section and select View instructions. A modal opens with specific guidance on the permissions required to pass the test.

Step 2: Find the IAM Role Drata Uses

  1. In Drata, go to Connections > AWS integration.

  2. Copy the IAM role ARN shown in the connection details.

  3. Sign in to the AWS Management Console.

  4. Navigate to IAM > Roles.

  5. Paste the ARN or search for the role name.

  6. Open the role to view and manage permissions.

Step 3: Update the Existing Policy on the IAM Role

Most Drata customers use the AWS-managed SecurityAudit policy as the foundation for their integration. If a required permission is missing, you can update the customer-managed policy attached to the IAM role or add a new statement to the existing inline policy.

To modify an attached policy:

  1. In AWS, go to IAM > Roles and select the role used for Drata.

  2. Under the Permissions tab, find the attached policy (e.g., your custom policy or SecurityAudit).

  3. Select Edit policy.

  4. In the JSON tab, add the required actions to the existing policy statement.

Example addition

Note: Replace SERVICE:Action with the actual permission required.

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": ["SERVICE:Action"],
"Resource": "*"
}
]
}

Step 4: Confirm the Update

  • In AWS, verify that the new policy appears under the IAM role.

  • If your organization uses Service Control Policies or permission boundaries, confirm that they don’t restrict the new permissions.

Verification

To verify the changes:

  1. Return to Drata.

  2. Go to the affected test or AWS integration status view.

  3. Re-run the test.

If the permissions were added correctly, the test should now execute successfully.

Next Steps

Did this answer your question?