This guide walks you through the complete process of installing CloudMapper from the AWS Marketplace using CloudFormation templates for secure, automated deployment.
Navigate to the AWS Marketplace and subscribe to CloudMapper to get access to the AMI and CloudFormation templates.
Select your deployment region and CloudFormation template version.
Click "Continue to Launch" after making your selections.
Deploy CloudMapper using the provided CloudFormation template.
Click "Launch" to proceed to CloudFormation.
Customize your CloudMapper deployment with the following parameters:
InstanceType: t3.medium # Recommended minimum
VpcId: vpc-xxxxxxxxx # Target VPC
SubnetId: subnet-xxxxxxxxx # Public or private subnet
AssociatePublicIpAddress: true # Optional - create public IP
AllowedCIDR: 10.0.0.0/8 # IP range for HTTPS web access
# Note: SSM access is ALWAYS enabled (non-negotiable)
EnableBackups: true # Automated daily backups (highly recommended)
# Backups include 30-day retention with 7-day cold storage transition
CloudMapperVersion: latest # AMI version to deploy
Review your configuration and deploy the stack.
Once the stack is created, access your CloudMapper instance via HTTPS.
# Public IP Access (if AssociatePublicIpAddress=true)
https://your-instance-public-ip
# Private IP Access (always available within VPC)
https://your-instance-private-ip
# Find your instance IPs from CloudFormation Outputs
aws cloudformation describe-stacks --stack-name your-stack-name \
--query 'Stacks[0].Outputs[?OutputKey==`CloudMapperPublicIP`].OutputValue' \
--output text
aws cloudformation describe-stacks --stack-name your-stack-name \
--query 'Stacks[0].Outputs[?OutputKey==`CloudMapperPrivateIP`].OutputValue' \
--output text
AssociatePublicIpAddress=true
during deployment. Private IP is always available for VPC-internal access.
https://your-instance-ip
# Connect via AWS Systems Manager Session Manager
aws ssm start-session --target i-1234567890abcdef0
# Alternative: Use AWS Console
# 1. Go to EC2 → Instances
# 2. Select your CloudMapper instance
# 3. Click "Connect" → "Session Manager" → "Connect"
# Note: SSH is completely disabled - SSM is the ONLY way to access the system
Broad read-only permissions across AWS services for comprehensive infrastructure discovery.
Enables AWS Systems Manager Session Manager for secure shell access without SSH keys.
Applied to backup service role when backups are enabled. Allows AWS Backup to create snapshots and backups of your CloudMapper instance.
Applied to backup service role when backups are enabled. Allows AWS Backup to restore instances and volumes from backup recovery points.
Status: ALWAYS ENABLED
ONLY access method. SSH is completely disabled. Access via AWS Console → Systems Manager → Session Manager.
Status: Enabled by Default
Automatic metrics and logs collection for monitoring instance health and application performance.
Status: Optional (Recommended)
Daily automated backups with 30-day retention and 7-day cold storage transition. EBS deletion protection always ON.
# List all stack outputs
aws cloudformation describe-stacks --stack-name your-cloudmapper-stack \
--query 'Stacks[0].Outputs' --output table
# Get specific output (e.g., SSM command)
aws cloudformation describe-stacks --stack-name your-cloudmapper-stack \
--query 'Stacks[0].Outputs[?OutputKey==`SSMSessionCommand`].OutputValue' \
--output text
Deploy an ALB with ACM certificate for production environments.
Setup Guide