The AWS GovCloud integration enables security and compliance teams to automate continuous monitoring and evidence collection for infrastructure-level security controls within AWS GovCloud environments.
Key Capabilities
Infrastructure Monitoring: Continuously monitors AWS GovCloud configurations for compliance evidence.
Evidence Collection: Automatically collects data across dozens of security controls.
Resource Scoping: Define which AWS GovCloud resources are included in or excluded from monitoring.
Automatically saving: When you start creating an AWS GovCloud connection, Drata automatically saves your progress as a draft so you can pause and resume at any time. If you exit the wizard before completing setup, the connection appears in your Active connections list with an In progress status, where you can resume to continue connecting or Delete to remove it.
Prerequisites & Data Access
Must have Admin access in your AWS GovCloud account.
Must have permissions to create IAM roles and assign the SecurityAudit policy.
Must have access to the Drata Connections page.
Carefully review your organization’s data residency and compliance requirements before enabling this integration.
IMPORTANT NOTICE: It is important to note that Drata is currently hosted outside AWS GovCloud. You can find a complete list of our Sub-processors here.
This feature involves providing Drata with read-only access to AWS’s SecurityAudit policy, which may not be appropriate in all AWS GovCloud use cases.
Permissions & Data Table
Permission/Scope | Why It’s Needed | Data Accessed (Read Only) |
SecurityAudit Policy | Grants read-only visibility into AWS services and configurations for compliance monitoring. | Infrastructure configuration, encryption settings, IAM roles, and audit metadata |
Step-by-Step Setup
Open the AWS GovCloud Connection in Drata
In Drata, go to the Connections page.
Search for AWS GovCloud and select it.
A side panel opens with an overview of the integration, including its description, required permissions, and data accessed.
Review the details, then click Connect to launch the setup wizard.
Expected outcome: You'll open the guided connection wizard for AWS GovCloud.
Wizard Step 1: Select Workspace
If your account uses workspaces, select the workspace you want to associate with this AWS GovCloud connection, then click Next.
Wizard Step 2: Connect & Create & Enter Your Role ARN
Before entering anything in Drata, you first need to create a read-only IAM role in your AWS GovCloud account.
Create a Read-Only IAM Role in AWS GovCloud
Sign in to your AWS GovCloud console at https://console.amazonaws-us-gov.com using an account with privileges to create IAM roles.
Go to the IAM service: https://console.amazonaws-us-gov.com/iam.
In the sidebar, select Roles, then click Create role.
Choose AWS account → Another AWS account.
Copy the Account ID field (
345844027492) from Drata.Note: This is Drata’s AWS GovCloud account ID, used for all customers.
Copy the Require external ID from Drata.
This unique External ID ensures a secure cross-account connection between your AWS environment and Drata.
Leave Require MFA unchecked. Click Next.
In the search bar, type SecurityAudit, then select the checkbox next to SecurityAudit (AWS-managed policy). Click Next.
(Optional) In the Role name and Description field, enter:
Role Name:
DrataAutopilotRoleDescription:
Cross-account read-only access for Drata Autopilot.
(Optional) Add tags if required by your organization.
Click Create role.
After creation, open the new role and copy the Role ARN. You’ll paste this into Drata in the next step.
Note: The integration uses AWS’s default SecurityAudit policy, which grants broad read-only access. If your organization requires stricter controls, review the policy before proceeding to ensure it aligns with internal compliance requirements.
Expected outcome: You’ve created a secure, read-only IAM role in AWS GovCloud for Drata.
Enter the Role ARN in Drata:
Copy the Role ARN from your newly created role in AWS GovCloud.
In Drata’s connection setup, paste the Role ARN into the required field.
Once validated, the connection will appear under your active connections.
Drata Field | AWS GovCloud Value |
Role ARN | ARN of the |
All the Infrastructure monitoring tests should also include data from the AWS GovCloud account.
Wizard Step 3: Configure Scope
Region Scoping: Which regions should Drata evaluate?
Choose a region option:
All active regions (default): Drata evaluates both AWS GovCloud regions. No further action needed; proceed to the resource scoping section below.
Specific regions: Drata evaluates only the regions you select. Then, check one or both of the available GovCloud regions:
us-gov-east-1orus-gov-west-1
Resource Scoping: Which resources should Drata monitor?
Note: AWS GovCloud supports resource-level scoping only. Project- or account-level scoping is not available.
Under Select resources, choose one of the following:
All resources: Drata monitors all supported resources in the selected region(s). No further configuration needed; click Next to continue.
Specific resources: Drata monitors only the resources that match conditions you define. Continue with the steps below.
If you selected Specific resources:
Select a scoping tab to define whether your conditions determine what is monitored or excluded:
In scope: Resources that match your conditions are explicitly included in Drata's resource sync.
Out of scope: Resources that match your conditions are explicitly excluded from Drata's resource sync.
In the Condition Group that appears, define your first condition:
Under Property, select the resource attribute to filter by (for example, Name).
Under Operator, select how to match the value (for example, equal).
Under Value, enter the value to match against (for example,
NNSA).
To add more conditions to the same group, click + Add condition and repeat step 2.
To add a separate condition group, click + Add condition group and repeat steps 2–3.
Conditions within a group are evaluated together.
Multiple condition groups allow you to define more complex scoping logic.
Click Next to continue.
Wizard Step 4: Confirm
Review your connection settings. When everything looks correct, click Finish to activate the connection. The AWS GovCloud connection will appear as active in your Connections list, and all infrastructure monitoring tests will begin collecting data from your AWS GovCloud account.
Viewing and Editing Scope
Once an AWS GovCloud connection is active, you can view and update your resource scope settings directly from the connection overview page.
To view your current scope:
Go to the Connections page and select your AWS GovCloud connection.
On the connection overview page, locate the Scoping section. This displays your current inclusion/exclusion rules.
To edit your scope:
On the connection overview page, click Edit next to the Scoping section.
Update your inclusion or exclusion rules as needed.
Click Save to apply the changes.
Note: Changes to scope take effect on the next monitoring cycle.

