Skip to main content

AWS

Connect your AWS accounts to enable CloudThinker agents to analyze costs, optimize resources, audit security, and manage infrastructure.

Setup Methods

CloudThinker supports two authentication methods. Role-Based authentication is strongly recommended.

Required Permissions

Minimum (Read-Only Analysis)

ec2:Describe*
rds:Describe*
s3:GetBucket*, s3:List*
cloudwatch:GetMetric*, cloudwatch:List*
ce:GetCost*, ce:GetReservation*
iam:GetRole, iam:ListRoles
# All minimum permissions, plus:
elasticloadbalancing:Describe*
autoscaling:Describe*
lambda:List*, lambda:GetFunction*
ecs:Describe*, ecs:List*
eks:Describe*, eks:List*
securityhub:Get*, securityhub:List*
guardduty:Get*, guardduty:List*
config:Describe*, config:Get*
cloudtrail:Describe*, cloudtrail:Get*

Agent Capabilities

Once connected, agents can:
AgentAWS Capabilities
AlexCost analysis, EC2 right-sizing, Reserved Instance recommendations, resource optimization
OliverSecurity Hub findings, IAM audits, compliance checks, vulnerability assessment
TonyRDS performance analysis, Aurora optimization, DynamoDB tuning
KaiEKS cluster management, Fargate optimization, container analysis

Multi-Account Setup

For organizations with multiple AWS accounts:
1

Create Role in Each Account

Deploy the IAM role using CloudFormation StackSets
2

Use AWS Organizations

Connect management account for organization-wide visibility
3

Add Each Account

Add account connections individually in CloudThinker

Multi-Account Guide

Detailed guide for managing multiple AWS accounts

Troubleshooting

  • Verify IAM role has required permissions
  • Check trust policy includes CloudThinker’s account
  • Confirm External ID matches exactly
  • Ensure role ARN is correct
  • Enable Cost Explorer in AWS Console (takes 24h to activate)
  • Verify ce:GetCost* permissions are granted
  • Check billing preferences allow programmatic access
  • Verify CloudWatch metrics are being collected
  • Check region selection includes all relevant regions
  • Confirm services are running and generating data
  • Check network connectivity to AWS APIs
  • Verify no VPC endpoints blocking access
  • Try connecting from a different region

Security Best Practices

  • Use Role-Based auth - Avoid long-term access keys
  • Minimal permissions - Grant only what’s needed
  • Enable CloudTrail - Audit all API calls
  • Regular review - Audit permissions quarterly
  • External ID - Always use for cross-account roles