Getting Started
An introduction to Cloud Admission Controller and Cloud Scanner
Cloud Controller is an innovative admission controller designed for cloud environments, introduced by Nirmata to bring robust governance and security capabilities to any cloud or cloud service. Inspired by Kubernetes admission controllers like Kyverno, Cloud Controller fills a critical gap in cloud-native operations by enforcing policy-as-code standards directly in cloud resource configurations. This capability enables organizations to prevent misconfigurations from reaching production environments, ensuring that resources adhere to defined policies for security and compliance.
As a core component of the Nirmata Control Hub, Cloud Controller provides a unified solution for managing security and governance across pipelines, clusters, and cloud environments. With admission control, continuous background scanning, and event-driven reporting, Cloud Controller helps teams maintain a consistent and secure posture across their entire cloud infrastructure.
The AWS Organisation and Account Discovery feature introduces a new custom resource called AWSOrgConfig. This feature allows users to create an AWSOrgConfig for an Organisation Unit or root Org. The cloud controller will then discover all the child OUs for the configured org, create an AWSOrgConfig for them, and discover the AWS accounts within those OUs, creating AWSAccountConfig for them. The discovery process is recursive, ensuring that all child orgs and child accounts at all levels are discovered.
AWSOrgConfigapiVersion: nirmata.io/v1alpha1
kind: AWSOrgConfig
metadata:
name: root
spec:
customAssumeRoleName: DevTestAccountAccessRole
orgID: r-zyre
orgName: Root
regions:
- us-west-1
roleARN: arn:aws:iam::<account-id>:role/<role-name>
scanInterval: 1h
services:
- EKS
- ECS
- EC2
- Lambda
- RDS
```text
#### Field Descriptions
- **orgID**: The ID of the organisation unit or root to be configured, assigned by AWS.
- **orgName**: The name of the organisation as desired by the user. It is recommended to keep it the same as the AWS assigned name.
- **regions**: The regions from which resources need to be scanned in the discovered child AWS accounts.
- **scanInterval**: The frequency of the scan.
- **services**: The services in which resources need to be scanned.
- **roleARN**: This is the critical role that needs to be created in the management account. It must have permissions to fetch accounts, fetch OUs, describe them, and can be assumed by the IAM role bound to the Service account of the cloud scanner through the pod identity agent.
- **customAssumeRoleName**: The name of the IAM role that must be present in the discovered accounts, with permissions to fetch resources in the specified services. It is similar to the role for the scanner.
## Licensing
Nirmata Control Hub is **commercial software** available under a paid Nirmata subscription. Use is governed by the [Nirmata Terms of Use](https://nirmata.com/terms-of-use/). See the [Licensing](/docs/reference/licensing/) page for details.
## Pricing Information
Contact [Nirmata Customer Support](https://nirmata.com/contact-us) for pricing details.
An introduction to Cloud Admission Controller and Cloud Scanner
Step-by-step guide for setting up AWS Organisation and Account Discovery
Cloud Admission Controller
Ensuring Cloud Resource Compliance
Reporting System