Back to Integrations

AWS Integration

Secure privileged access to your AWS infrastructure with unified identity, just-in-time access, and comprehensive audit trails.

Features

Comprehensive AWS Coverage

Secure access to all your AWS services with unified authentication and authorization.

IAM Integration

Seamlessly integrate with AWS IAM for federated authentication and role assumption.

EC2 Access

SSH access to EC2 instances with automatic discovery and certificate-based authentication.

RDS Protection

Secure database access to RDS instances with protocol-aware proxying and credential rotation.

Secrets Manager

Integration with AWS Secrets Manager for centralized credential management and rotation.

Capabilities

Enterprise-Grade AWS Integration

AWS IAM role assumption
EC2 instance discovery
RDS database proxying
EKS cluster access
S3 audit log storage
CloudTrail integration
SSM Session Manager
Secrets Manager sync
Lambda function access
Auto Scaling group support
VPC endpoint integration
Organizations support
Setup

Get Started in Minutes

Follow these simple steps to integrate TigerAccess with your AWS infrastructure.

1

Configure IAM Role

Create an IAM role in your AWS account with permissions for TigerAccess to discover and manage access to resources.

{
  "Version": "2012-10-17",
  "Statement": [{
    "Effect": "Allow",
    "Action": [
      "ec2:Describe*",
      "rds:Describe*",
      "eks:Describe*"
    ],
    "Resource": "*"
  }]
}
2

Add Integration

Configure the AWS integration in TigerAccess with your account ID and IAM role ARN.

tacctl integrations add aws \
  --account-id=123456789012 \
  --role-arn=arn:aws:iam::123456789012:role/TigerAccessRole \
  --regions=us-east-1,us-west-2
3

Verify Discovery

Verify that TigerAccess has discovered your AWS resources and they are available for access.

tac ls
# Shows all discovered AWS resources:
# - EC2 instances
# - RDS databases
# - EKS clusters
Use Cases

Real-World AWS Scenarios

Developer Access to Production

Grant developers just-in-time access to production EC2 instances and RDS databases with automatic approval workflows and session recording.

Multi-Account Management

Manage access across multiple AWS accounts and organizations with centralized authentication and unified audit trails.

Compliance Automation

Automatically collect and store audit logs in S3 for compliance requirements like SOC 2, HIPAA, and PCI DSS.

Break-Glass Access

Provide emergency access to critical AWS resources with comprehensive audit trails and automatic session recording.

FAQ

Frequently Asked Questions

Does TigerAccess require agent installation on EC2 instances?

No. TigerAccess uses certificate-based SSH authentication and does not require agents on EC2 instances. For enhanced features like session recording, you can optionally deploy the TigerAccess agent.

How does TigerAccess integrate with AWS IAM?

TigerAccess can assume IAM roles to provide federated access. Users authenticate to TigerAccess using your identity provider (Okta, Azure AD, etc.), and TigerAccess issues short-lived AWS credentials by assuming the appropriate IAM role.

Can I use TigerAccess across multiple AWS accounts?

Yes. TigerAccess supports AWS Organizations and can manage access across multiple accounts. Configure cross-account IAM roles to enable discovery and access management across your entire AWS organization.

Where are session recordings stored?

Session recordings can be stored in your own S3 bucket with encryption at rest. TigerAccess supports server-side encryption with AWS KMS for additional security.

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available