- Trustero Support
- Trustero User Guide
- Receptors & Integrations
-
Trustero User Guide
-
The Why Behind the Phases: Big-Picture Strategy
-
Phase 1: Define Audit Scope & Risk Profile
-
Phase 2: Formalize Policies & Supporting Documents
-
Phase 3: Operationalize Controls
- Control Owners: Responsibilities & Evidence Gathering
- Executive Leadership: Oversight & Key Metrics
- People Team: HR Controls & Employee Management
- Asset Management: Protect & Track Company Devices
- Identity & Access Management: User Security & Reviews
- Secure Configurations: Hardening & Technology Setup
- Threat & Vulnerability Management: Monitoring & Response
-
Phase 4: Leverage Trustero AI
-
Phase 5: During the Audit
-
Phase 6: Stay Audit-Ready & Risk Aware
AWS Receptor Authentication Options
There are multiple ways to configure the AWS receptor's authentication method. Details on which option is best for you.
There are multiple ways to configure how the Trustero AWS Receptor authenticates to AWS.
Choose your option based on the below questions:
- Do you prefer to use assume role or IAM user authentication?
- Do you want to retrieve evidence from multiple accounts in an AWS Organization or retrieve evidence from a single account?
- Do you want to configure access in AWS using automation (e.g., CLI and CloudFormation) or manually (pointing and clicking in the console).
Once you decide which choice will work best for you, see the detailed instructions linked below. Each set of instructions includes both automated and manual setup options (when available):