Buckshot Technologies CloudMapper Documentation / Installation Guide

CloudMapper Installation Guide

This guide walks you through the complete process of installing CloudMapper from the AWS Marketplace using CloudFormation templates for secure, automated deployment.

1

Subscribe to CloudMapper on AWS Marketplace

Navigate to the AWS Marketplace and subscribe to CloudMapper to get access to the AMI and CloudFormation templates.

  1. Go to AWS Marketplace in your AWS Console
  2. Search for "CloudMapper by Buckshot Technologies"
  3. Click on the product listing
  4. Review pricing and terms
  5. Click "Continue to Subscribe"
  6. Accept the terms and conditions
  7. Click "Continue to Configuration"
2

Configure Product Options

Select your deployment region and CloudFormation template version.

Configuration Options:
  • Fulfillment Option: CloudFormation Template
  • Software Version: Latest (1.1.0)
  • Region: Select your preferred AWS region

Click "Continue to Launch" after making your selections.

3

Launch CloudFormation Stack

Deploy CloudMapper using the provided CloudFormation template.

Launch Options:
  • Action: Launch CloudFormation
  • Template: cloudmapper-standard.yaml
  • Access: VPC with internet access
Security Features:
  • FIPS 140-2 Compliant
  • OIDC SSO Integration
  • HTTPS-Only Access
  • Air-gapped Compatible

Click "Launch" to proceed to CloudFormation.

4

Configure CloudFormation Parameters

Customize your CloudMapper deployment with the following parameters:

Instance Configuration:
InstanceType: t3.medium              # Recommended minimum
VpcId: vpc-xxxxxxxxx                 # Target VPC
SubnetId: subnet-xxxxxxxxx           # Public or private subnet
AssociatePublicIpAddress: true       # Optional - create public IP
Security Configuration:
AllowedCIDR: 10.0.0.0/8             # IP range for HTTPS web access
# Note: SSM access is ALWAYS enabled (non-negotiable)
Backup Configuration:
EnableBackups: true                  # Automated daily backups (highly recommended)
# Backups include 30-day retention with 7-day cold storage transition
Application Configuration:
CloudMapperVersion: latest           # AMI version to deploy
5

Review and Deploy

Review your configuration and deploy the stack.

  1. Review all parameters and settings
  2. Check the "I acknowledge that AWS CloudFormation might create IAM resources" box
  3. Click "Create Stack"
  4. Monitor the stack creation process (typically 5-10 minutes)
6

Access CloudMapper

Once the stack is created, access your CloudMapper instance via HTTPS.

Web Access (HTTPS Only):
# Public IP Access (if AssociatePublicIpAddress=true)
https://your-instance-public-ip

# Private IP Access (always available within VPC)
https://your-instance-private-ip

# Find your instance IPs from CloudFormation Outputs
aws cloudformation describe-stacks --stack-name your-stack-name \
  --query 'Stacks[0].Outputs[?OutputKey==`CloudMapperPublicIP`].OutputValue' \
  --output text

aws cloudformation describe-stacks --stack-name your-stack-name \
  --query 'Stacks[0].Outputs[?OutputKey==`CloudMapperPrivateIP`].OutputValue' \
  --output text
Accepting Self-Signed Certificate in Browser
  1. Navigate to https://your-instance-ip
  2. Browser will show "Your connection is not private" or similar warning
  3. Chrome/Edge: Click "Advanced" → "Proceed to [IP] (unsafe)"
  4. Firefox: Click "Advanced" → "Accept the Risk and Continue"
  5. Safari: Click "Show Details" → "visit this website"
SSM Access (REQUIRED - Only Access Method):
# Connect via AWS Systems Manager Session Manager
aws ssm start-session --target i-1234567890abcdef0

# Alternative: Use AWS Console
# 1. Go to EC2 → Instances
# 2. Select your CloudMapper instance
# 3. Click "Connect" → "Session Manager" → "Connect"

# Note: SSH is completely disabled - SSM is the ONLY way to access the system

IAM Policies & Permissions

Applied IAM Policies
  • ReadOnlyAccess AWS Managed

    Broad read-only permissions across AWS services for comprehensive infrastructure discovery.

  • AmazonSSMManagedInstanceCore AWS Managed

    Enables AWS Systems Manager Session Manager for secure shell access without SSH keys.

  • AWSBackupServiceRolePolicyForBackup AWS Managed (Backup Service Only)

    Applied to backup service role when backups are enabled. Allows AWS Backup to create snapshots and backups of your CloudMapper instance.

  • AWSBackupServiceRolePolicyForRestores AWS Managed (Backup Service Only)

    Applied to backup service role when backups are enabled. Allows AWS Backup to restore instances and volumes from backup recovery points.

What This Means
  • Can Read: All AWS resource configurations, metadata, and relationships across your account.
  • Cannot Modify: No permissions to create, update, or delete any AWS resources.
  • SSM Access: Allows secure terminal access through AWS console without SSH keys.
  • CloudWatch: Can send metrics and logs for monitoring and troubleshooting.

Built-in Services

AWS Systems Manager

Status: ALWAYS ENABLED

ONLY access method. SSH is completely disabled. Access via AWS Console → Systems Manager → Session Manager.

CloudWatch Integration

Status: Enabled by Default

Automatic metrics and logs collection for monitoring instance health and application performance.

AWS Backup

Status: Optional (Recommended)

Daily automated backups with 30-day retention and 7-day cold storage transition. EBS deletion protection always ON.

CloudFormation Stack Outputs

Instance Information
  • CloudMapperInstanceId: EC2 instance ID
  • CloudMapperPrivateIP: Private IP (always available)
  • CloudMapperPublicIP: Public IP (if enabled)
  • CloudMapperURL: HTTPS web URL (if public IP enabled)
Access & Management
  • SSMSessionCommand: Ready-to-use SSM command
  • BackupVaultName: Backup vault (if enabled)
  • Version: Deployed CloudMapper version
View Stack Outputs:
# List all stack outputs
aws cloudformation describe-stacks --stack-name your-cloudmapper-stack \
  --query 'Stacks[0].Outputs' --output table

# Get specific output (e.g., SSM command)
aws cloudformation describe-stacks --stack-name your-cloudmapper-stack \
  --query 'Stacks[0].Outputs[?OutputKey==`SSMSessionCommand`].OutputValue' \
  --output text

Additional Configuration

Load Balancer with Trusted Certificate

Deploy an ALB with ACM certificate for production environments.

Setup Guide
OIDC SSO Setup

Configure single sign-on with your identity provider.

Learn More