Creating the Hava Read-Only IAM user, that uses the standard AWS ReadOnlyAccess Policy will ensure that your user doesn't have enough privileges to change anything in your environment.
If you feel that the default policy from AWS allows too much access you can create a custom policy to limit it to just what we need.
While we recommend the default Read-Only policy to account for future updates to our supported services you can follow these steps to create a minimum access read-only user that Hava can use to visualize your AWS infrastructure.
Before you start make sure you are logged in to the AWS console.
From the main console screen click on Identity & Access Management.
From the IAM dashboard select the Users section and then click the Create New Users button.
Enter a unique username for your new user, make sure Generate an access key is checked, and then click the Create button.
You should be notified that your user has been created. You can copy the details from this screen or just click Download to save them.
Now that you've created your user, you will need to create the customer policy that grants Hava the security it requires at a minimum.From the IAM dashboard select the Policy section and then click the Create New Policy button.
You will then need to select the Create Your Own Policy option.
You will need to provide the name of your policy such as "HAVA-RO-POLICY", a description of the policy such as "Just enough access to ensure Hava can work it's magic" and then enter in the custom policy seen here:
You can copy and paste the policy from here:
Once you have entered in all of the details and copy and pasted the policy contents into the Policy Document section, you can click Create Policy to complete the policy creation process.
Click your new user in the list and go to the Managed Policies header under Permissions. Click Attach Policy.
Scroll through the policy list until you find custom policy HAVA-RO-POLICY. Click the checkbox and then click Attach Policy.
This policy will allow you to import everything needed to create diagrams and basic reports. If you would like the full data available in your reports you can also add these policies to your user:
arn:aws:iam::aws:policy/SecurityAudit