CybeDefend Configuration
| Field | Description | Example |
|---|---|---|
| AWS Account ID (12 digits) | Your 12-digit AWS account ID | 123456789012 |
| AWS Region | AWS region where your ECR is located | US East (N. Virginia) (us-east-1) |
| Access Key ID | AWS IAM access key ID | AKIAIOSFODNN7EXAMPLE |
| Secret Access Key | AWS IAM secret access key | wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY |
| Description | Optional description for the registry | Production ECR registry |
How to Create IAM Credentials for ECR
1
Access AWS Console
Go to AWS Console → IAM → Users → Create user
2
Attach Policy
Attach the policy
AmazonEC2ContainerRegistryReadOnly (or AmazonEC2ContainerRegistryFullAccess for write access)3
Create Access Key
Go to Security credentials → Create access key → Select Application running outside AWS
4
Copy Credentials
Copy the Access Key ID and Secret Access Key and paste them in CybeDefend
Security Best Practices
Use IAM Policies
Use
AmazonEC2ContainerRegistryReadOnly for minimal permissions required.Rotate Keys Regularly
Rotate access keys every 90 days as recommended by AWS security best practices.
Never Commit Keys
Store credentials in environment variables or AWS Secrets Manager.
Use IAM Roles
Prefer IAM roles over access keys when running in AWS environments.
Troubleshooting
Authentication Failed
Authentication Failed
- Verify Access Key ID and Secret Access Key are correct
- Check if the credentials have expired or been deactivated
- Ensure the IAM user has the required permissions
Region Mismatch
Region Mismatch
- Verify the selected region matches your ECR repository region
- ECR repositories are region-specific