Fortinet black logo

Online Help

AWS Account Checklist Troubleshooting

Copy Link
Copy Doc ID cf00dcb1-0886-11ed-bb32-fa163e15d75b:939555

AWS Account Checklist Troubleshooting

Role and Policy Related Issues

External ID Issue

AWS CloudTrail Issue

Traffic Related Issue

Role and Policy Related Issues

If you are adding the AWS account manually, follow the solutions below.

Checklist Item Description Solution
FortiCNP Role not generated. FortiCNP role is not created successfully on the AWS account. Check if the FortiCNP role is created following the guide in Add AWS Account Manually.
AWS Autofix policies are not attached to the Role. FortiCNP policies are not attached to the FortiCNP role. Check if the FortiCNP policies are attached to the role in Add AWS Account Manually

AWS Notification policies are not attached to the Role.

FortiCNP policies are not attached to the FortiCNP role.

Check if the FortiCNP policies are attached to the role in Add AWS Account Manually.

AWS Insepctor and Guard Duty Integration policies are not attached to the Role. Specific policy and role needs to be attached in AWS Inspector and Guard Duty to activate both services on FortiCNP Check if the AWS Inspector and Guard Duty Integration policies are attached to the Role in Add AWS Account Manually

If you are adding the AWS account automatically, follow the solutions below.

Checklist Item Description Solution
CloudFormation FortiCNP Role not generated. There is a duplicate stack or stackset already in CloudFormation. The duplicate stack or stackset needs to be deleted first for the role to be generated successfully. Delete the stack or stackset associated with the AWS account(s) first by following Stack Already Exists Error
AWS Autofix policies are not attached to the Role. There is a duplicate stack or stackset already in CloudFormation. The duplicate stack or stackset needs to be deleted first for the role to be generated successfully. Delete the stack or stackset associated with the AWS account(s) first by following Stack Already Exists Error

AWS Notification policies are not attached to the Role.

There is a duplicate stack or stackset already in CloudFormation. The duplicate stack or stackset needs to be deleted first for the role to be generated successfully

Delete the stack or stackset associated with the AWS account(s) first by following Stack Already Exists Error

AWS Insepctor and Guard Duty Integration policies are not attached to the Role. Specific policy and role needs to be attached in AWS Inspector and Guard Duty to activate both services in FortiCNP. Delete the stack or stackset associated with the AWS account(s) first by following Stack Already Exists Error

External ID Issue

If you are adding the AWS account manually, follow the solutions below.

Checklist Item Description Solution
External ID doesn't meet the complexity and security requirements. External ID is an unique ID attached to the role for security purpose. If it was previously assigned and did not meet the complexity requirement, the external ID needed to be reassigned by FortiCNP. Please remove the AWS account from FortiCNP, and re-authenticate the account by going thorough the manual installation, you will be asked to generate an External ID. For more details, please see Add AWS Account Manually.

If you are adding the AWS account automatically, follow the solutions below.

Checklist Item Description Solution
External ID doesn't meet the complexity and security requirements. External ID is an unique ID attached to the role for security purpose. If it was previously assigned and did not meet the complexity requirement, the external ID needed to be reassigned by FortiCNP. Please remove the AWS account from FortiCNP, and re-authenticate the account by going thorough the installation. An unique 32 bit external ID will be re-assigned to the account if you are adding the account automatically.

AWS CloudTrail Issue

AWS CloudTrail failures only occurs when the AWS account was added manually or it was not created by AWS CloudFormation.

If you happen to receive any error below when you install AWS account automatically, please delete the CloudTrail Stack or Stack set and reauthenticate, please see Stack Already Exists Error.

For manual installation, please see solutions below:

Checklist Item Description Solution
More than one AWS CloudTrail is created and enabled. There should only be one cloudtrail enabled. Check the CloudTrail name used for the AWS account on FortiCNP located in Authentication tab in the Cloud Account status. Log into AWS account and delete or disable any other CloudTrail name other than the one that is used on FortiCNP.
CloudTrail is not configured with read/write event permission. AWS CloudTrail needs to be configured with read/write event permission for FortiCNP to access the CloudTrail logs.

Check read/write event permission in Add AWS Account Manually

CloudTrail is not applied to all regions. AWS CloudTrail needs to be applied to all regions in configurations in order for FortiCNP to receive CloudTrail logs from all regions.

Check if it is applied to all regions in Add AWS Account Manually

FortiCNP cannot gain access to the CloudTrail S3 Bucket. AWS CloudTrail needs to grant FortiCNP with access to S3 bucket to monitor and protect the data in the S3 bucket.

Check if AWS has granted FortiCNP access to S3 bucket by seeing Add AWS Account Manually

Traffic Related Issue

This solution applies to both manual and automatic installation.

Checklist Item Description Solution
Some VPCs do not have Flow logs. FortiCNP Traffic is disabled. All AWS VPCs Flow logs need to be enabled to activate Traffic on FortiCNP. Review the steps in AWS Traffic log configuration to see if AWS Flow logs is enabled. Please see AWS Traffic Configuration

AWS Account Checklist Troubleshooting

Role and Policy Related Issues

External ID Issue

AWS CloudTrail Issue

Traffic Related Issue

Role and Policy Related Issues

If you are adding the AWS account manually, follow the solutions below.

Checklist Item Description Solution
FortiCNP Role not generated. FortiCNP role is not created successfully on the AWS account. Check if the FortiCNP role is created following the guide in Add AWS Account Manually.
AWS Autofix policies are not attached to the Role. FortiCNP policies are not attached to the FortiCNP role. Check if the FortiCNP policies are attached to the role in Add AWS Account Manually

AWS Notification policies are not attached to the Role.

FortiCNP policies are not attached to the FortiCNP role.

Check if the FortiCNP policies are attached to the role in Add AWS Account Manually.

AWS Insepctor and Guard Duty Integration policies are not attached to the Role. Specific policy and role needs to be attached in AWS Inspector and Guard Duty to activate both services on FortiCNP Check if the AWS Inspector and Guard Duty Integration policies are attached to the Role in Add AWS Account Manually

If you are adding the AWS account automatically, follow the solutions below.

Checklist Item Description Solution
CloudFormation FortiCNP Role not generated. There is a duplicate stack or stackset already in CloudFormation. The duplicate stack or stackset needs to be deleted first for the role to be generated successfully. Delete the stack or stackset associated with the AWS account(s) first by following Stack Already Exists Error
AWS Autofix policies are not attached to the Role. There is a duplicate stack or stackset already in CloudFormation. The duplicate stack or stackset needs to be deleted first for the role to be generated successfully. Delete the stack or stackset associated with the AWS account(s) first by following Stack Already Exists Error

AWS Notification policies are not attached to the Role.

There is a duplicate stack or stackset already in CloudFormation. The duplicate stack or stackset needs to be deleted first for the role to be generated successfully

Delete the stack or stackset associated with the AWS account(s) first by following Stack Already Exists Error

AWS Insepctor and Guard Duty Integration policies are not attached to the Role. Specific policy and role needs to be attached in AWS Inspector and Guard Duty to activate both services in FortiCNP. Delete the stack or stackset associated with the AWS account(s) first by following Stack Already Exists Error

External ID Issue

If you are adding the AWS account manually, follow the solutions below.

Checklist Item Description Solution
External ID doesn't meet the complexity and security requirements. External ID is an unique ID attached to the role for security purpose. If it was previously assigned and did not meet the complexity requirement, the external ID needed to be reassigned by FortiCNP. Please remove the AWS account from FortiCNP, and re-authenticate the account by going thorough the manual installation, you will be asked to generate an External ID. For more details, please see Add AWS Account Manually.

If you are adding the AWS account automatically, follow the solutions below.

Checklist Item Description Solution
External ID doesn't meet the complexity and security requirements. External ID is an unique ID attached to the role for security purpose. If it was previously assigned and did not meet the complexity requirement, the external ID needed to be reassigned by FortiCNP. Please remove the AWS account from FortiCNP, and re-authenticate the account by going thorough the installation. An unique 32 bit external ID will be re-assigned to the account if you are adding the account automatically.

AWS CloudTrail Issue

AWS CloudTrail failures only occurs when the AWS account was added manually or it was not created by AWS CloudFormation.

If you happen to receive any error below when you install AWS account automatically, please delete the CloudTrail Stack or Stack set and reauthenticate, please see Stack Already Exists Error.

For manual installation, please see solutions below:

Checklist Item Description Solution
More than one AWS CloudTrail is created and enabled. There should only be one cloudtrail enabled. Check the CloudTrail name used for the AWS account on FortiCNP located in Authentication tab in the Cloud Account status. Log into AWS account and delete or disable any other CloudTrail name other than the one that is used on FortiCNP.
CloudTrail is not configured with read/write event permission. AWS CloudTrail needs to be configured with read/write event permission for FortiCNP to access the CloudTrail logs.

Check read/write event permission in Add AWS Account Manually

CloudTrail is not applied to all regions. AWS CloudTrail needs to be applied to all regions in configurations in order for FortiCNP to receive CloudTrail logs from all regions.

Check if it is applied to all regions in Add AWS Account Manually

FortiCNP cannot gain access to the CloudTrail S3 Bucket. AWS CloudTrail needs to grant FortiCNP with access to S3 bucket to monitor and protect the data in the S3 bucket.

Check if AWS has granted FortiCNP access to S3 bucket by seeing Add AWS Account Manually

Traffic Related Issue

This solution applies to both manual and automatic installation.

Checklist Item Description Solution
Some VPCs do not have Flow logs. FortiCNP Traffic is disabled. All AWS VPCs Flow logs need to be enabled to activate Traffic on FortiCNP. Review the steps in AWS Traffic log configuration to see if AWS Flow logs is enabled. Please see AWS Traffic Configuration