Skip to main content

What AWS endpoints does the platform require access to?

The / Forensic Acquisition and Investigation platform requires access to the following AWS API endpoints, including regional addresses for regions that are accessed (e.g. us-east-2.ec2.amazonaws.com). If the VPC, in which / Forensic Acquisition and Investigation is deployed, will not be able to access these endpoints over the public internet, then a VPC Endpoint may be required.

Core PlatformKMS encrypted EC2sMemory ForensicsLambda FunctionsECS/EKS Containers
ec2.amazonaws.comkms.amazonaws.comssm.amazonaws.comlambda.amazonaws.comecs.amazonaws.com
secretsmanager.amazonaws.comcloudwatch.amazonaws.comecs-tasks.amazonaws.com
s3.amazonaws.comeks.amazonaws.com
sts.amazonaws.com
iam.amazonaws.com
cloudtrail.amazonaws.com

Regional Endpoints

If you have opted to use regional endpoints, you will need to ensure there is access to the regional endpoints for any regions you use. For example ec2.us-east-1.amazonaws.com to access the EC2 service in us-east-1.

How Darktrace uses regional endpoints

In general, / Forensic Acquisition and Investigation attempts to automatically fallback to an available endpoint if possible.

/ Forensic Acquisition and Investigation automatically sets the environment variable AWS_DEFAULT_REGION to the appropriate partition:

  • us-gov-west-1 for GovCloud
  • cn-north-1 for China
  • The region / Forensic Acquisition and Investigation is deployed in - if the global endpoints are not available but the regional endpoints are.

In addition, / Forensic Acquisition and Investigation enables regional STS endpoints to avoid token validation issues, by setting the environment variable AWS_STS_REGIONAL_ENDPOINTS to "regional".

For more information, please see AWS documentation.

/ Forensic Acquisition and Investigation Update Definitions

/ Forensic Acquisition and Investigation requires access to cado-public.s3.amazonaws.com in order to perform a GET (read only) request to confirm the latest version that is available.