Cloud Connected

Panther Cloud Connected deployments

Overview

Under the Cloud Connected deployment model, your organization owns the Snowflake and AWS accounts in which your Panther instance is deployed, while Panther manages initial deployments and subsequent upgrades. To deploy a Cloud Connected instance of Panther, follow the instructions in Setting Up a Cloud Connected Panther Instance.

In the Cloud Connected model, Panther performs deployment and maintenance work by assuming an IAM role named PantherDeploymentRole. When a Cloud Connected instance is deployed, Panther will self-monitor by automatically ingesting audit logs produced by your AWS account. This allows you to monitor actions taken by the PantherDeploymentRole, as well as any other IAM role.

After your Panther deployment is complete, you can monitor your Panther-related AWS costs.

Learn about Panther's other deployment models on Panther Deployment Types.

Aside from the modifications in AWS you are asked to make as part of the Cloud Connected setup process, it is highly discouraged to make any additional changes to the AWS account your Panther infrastructure resides in, including creating additional resources (such as Data Transport sources) and/or updating any permissions. Such changes may interfere with Panther's automation software.

How to set up a Cloud Connected instance of Panther

Cloud Connected deployment monitoring

Monitoring your Panther AWS costs

You can monitor your Panther-related spend in AWS by using the AWS Cost Explorer.

  1. If you have not already, enable Cost Explorer.

  2. View the Cost Explorer chart to explore usage and cost amounts.

    • Use the Filter and Group by fields to narrow your search to certain services, tag names, and/or usage types.

    • Learn more about Panther and customer-defined AWS resource tags below.

How Panther monitors your Cloud Connected deployment

In order to provide a SaaS-like experience, Panther monitors Cloud Connected deployments using the following tools:

  • Datadog for metrics and system logs

  • Sentry for alerting on errors

  • Pendo for user and product analytics

Using AWS resource tags

Panther-defined tags on AWS resources

Panther defines tags on your AWS resources, which may be useful in cost analysis. In order for them to be used, you must first activate them.

Panther defines the following tags on your AWS resources:

  • panther:app

  • panther:resource

  • panther:subsystem

  • panther:version

Custom tags on AWS resources

It's possible to add custom tags to your AWS resources, if you would like. Doing so may aid in your billing analysis.

To add custom tags, reach out to your Panther support team with the list of tag keys and values.

(Optional) Creating read-only roles for Panther data tables

Panther maintains the pantheraccountadmin user credentials in a secure location.

If needed, you can create and maintain several users with read-only access to the Panther data lake tables. To do so, run the following commands (using the pantheraccountadmin user or another SECURITYADMIN-enabled user on your Snowflake account):

USE ROLE SECURITYADMIN;

# If needed, create a new user
CREATE USER IF NOT EXISTS my_readonly_user 
    PASSWORD = '<INITIAL PASSWORD>'
    MUST_CHANGE_PASSWORD = TRUE;

# Grant the PANTHER_READONLY_ROLE to the newly created user
GRANT ROLE PANTHER_READONLY_ROLE TO USER my_readonly_user;

It's recommended to authenticate users created this way using an identity provider (IdP).

Disabling the pantheraccountadmin user may prevent Panther from being able to:

  • Perform credential rotation

  • Enable certain functionality, such as Role-Based Access Control (RBAC)

  • Deploy new data lake features requiring ACCOUNTADMIN-level permissions

If you choose to disable the pantheraccountadmin user despite the implications above, you may do so using the following commands:

USE ROLE SECURITYADMIN;

ALTER USER pantheraccountadmin SET DISABLED = TRUE

If a Panther upgrade requires privileged access, the user can then be temporarily re-enabled:

USE ROLE SECURITYADMIN;

ALTER USER pantheraccountadmin SET DISABLED = FALSE

Decommissioning a Cloud Connected Panther deployment

If you need to decommission a Panther deployment, you can simply terminate the AWS and Snowflake accounts. If you'd like to retain you Snowflake data, you can preserve that account while terminating the AWS account.

Last updated

Was this helpful?