You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-aws.md
+51-25Lines changed: 51 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,9 @@
2
2
title: Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service log data
3
3
description: Use the AWS connector to delegate Microsoft Sentinel access to AWS resource logs, creating a trust relationship between Amazon Web Services and Microsoft Sentinel.
4
4
author: yelevin
5
-
ms.topic: how-to
6
-
ms.date: 12/12/2022
7
5
ms.author: yelevin
6
+
ms.topic: how-to
7
+
ms.date: 01/31/2024
8
8
---
9
9
10
10
# Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service log data
@@ -52,7 +52,9 @@ This graphic and the following text show how the parts of this connector solutio
52
52
53
53
- The connector reads the message with the path, then fetches the files from the S3 bucket.
54
54
55
-
- To connect to the SQS queue and the S3 bucket, Microsoft Sentinel uses AWS credentials and connection information embedded in the AWS S3 connector's configuration. The AWS credentials are configured with a role and a permissions policy giving them access to those resources. Similarly, the Microsoft Sentinel workspace ID is embedded in the AWS configuration, so there is in effect two-way authentication. For Fairfax, we utilize Entra ID for authenticating with AWS through AWS Single Sign-On, establishing an Identity Provider with OpenID Connect and an assumed role.
55
+
- To connect to the SQS queue and the S3 bucket, Microsoft Sentinel uses AWS credentials and connection information embedded in the AWS S3 connector's configuration. The AWS credentials are configured with a role and a permissions policy giving them access to those resources. Similarly, the Microsoft Sentinel workspace ID is embedded in the AWS configuration, so there is in effect two-way authentication.
56
+
57
+
For customers in **Azure Government clouds**, Microsoft Sentinel uses a federated web identity provider (Microsoft Entra ID) for authenticating with AWS through OpenID Connect (OIDC), and assuming an AWS IAM role.
56
58
57
59
## Connect the S3 connector
58
60
@@ -70,7 +72,7 @@ This graphic and the following text show how the parts of this connector solutio
70
72
71
73
-**In Microsoft Sentinel:**
72
74
73
-
- Enable and configure the **AWS S3 Connector** in the Microsoft Sentinel portal. See the instructions below.
75
+
- Enable and configure the **AWS S3 Connector** in the Microsoft Sentinel portal. [See the instructions below]().
74
76
75
77
## Automatic setup
76
78
@@ -173,19 +175,23 @@ The following instructions apply for public **Azure Commercial clouds** only. Fo
173
175
174
176
1. In a different browser window or tab, open the AWS console.
175
177
176
-
1. Follow these instructions in the AWS documentation:<br>[Creating a role to delegate permissions to an IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html).
178
+
1. Create an **IAM assumed role**. Follow these instructions in the AWS documentation:<br>[Creating a role to delegate permissions to an IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html).
179
+
177
180
| Parameter | Selection/Value | Comments |
178
181
| - | - | - |
179
-
|**Account type**|*Another AWS account*| Instead of default *This account*.|
180
-
|**Account ID**|`197857026523`| Microsoft Sentinel's service account ID for AWS, identifying you as a Microsoft Sentinel user. |
182
+
|**Trusted entity type**|*AWS account*| Instead of default *AWS service*. |
183
+
|**Which account**|*Another AWS account*,<br>Account ID `197857026523`| Instead of the default *This account*,<br>Microsoft Sentinel's application service account.|
| **External ID** | Your Microsoft Sentinel *Workspace ID*,<br>pasted from your clipboard. | This identifies *your specific Microsoft Sentinel account* to AWS.
185
+
|**External ID**| Your Microsoft Sentinel *Workspace ID*,<br>pasted from your clipboard. | This identifies *your specific Microsoft Sentinel account* to AWS. |
186
+
|**Permissions to assign**| <ul><li>`AmazonSQSReadOnlyAccess`<li>`AWSLambdaSQSQueueExecutionRole`<li>`AmazonS3ReadOnlyAccess`<li>`ROSAKMSProviderPolicy`<li>Additional policies for ingesting the different types of AWS service logs. | For information on these policies, see the [AWS S3 connector permissions policies page](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AWS-S3/AwsRequiredPolicies.md) in the Microsoft Sentinel GitHub repository. |
187
+
188
+
1. Continue with [Add the AWS role and queue information to the S3 data connector](#add-the-aws-role-and-queue-information-to-the-s3-data-connector) below.
183
189
184
190
#### For Azure Government: Use identity federation
185
191
186
192
1. In a different browser window or tab, open the AWS console.
187
193
188
-
1. Follow these instructions in the AWS documentation:<br>[Creating OpenID Connect (OIDC) identity providers](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html).
194
+
1.Create a **web identity provider**. Follow these instructions in the AWS documentation:<br>[Creating OpenID Connect (OIDC) identity providers](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html).
189
195
190
196
| Parameter | Selection/Value | Comments |
191
197
| - | - | - |
@@ -195,22 +201,42 @@ The following instructions apply for public **Azure Commercial clouds** only. Fo
195
201
|**Thumbprint**|`626d44e704d1ceabe3bf0d53397464ac8080142c`| If created in the IAM console, selecting **Get thumbprint** should give you this result. |
- Assign the necessary permissions policies. These policies include:
205
-
-`AmazonSQSReadOnlyAccess`
206
-
-`AWSLambdaSQSQueueExecutionRole`
207
-
-`AmazonS3ReadOnlyAccess`
208
-
-`ROSAKMSProviderPolicy`
209
-
- Additional policies for ingesting the different types of AWS service logs.
210
-
- For information on these policies, see the [AWS S3 connector permissions policies page](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AWS-S3/AwsRequiredPolicies.md) in the Microsoft Sentinel GitHub repository.
211
-
212
-
- Name the role with a meaningful name that includes a reference to Microsoft Sentinel. Example: "*MicrosoftSentinelRole*".
213
-
- For FairFax, edit Trust policy and add another condition: "sts:RoleSessionName":"MicrosoftDefenderForClouds_<CustomerTenantID_OR_WorkSpaceID(Sentinel)>"
204
+
1. Create an **IAM assumed role**. Follow these instructions in the AWS documentation:<br>[Creating a role for web identity or OpenID Connect Federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html#idp_oidc_Create).
205
+
206
+
| Parameter | Selection/Value | Comments |
207
+
| - | - | - |
208
+
|**Trusted entity type**|*Web identity*| Instead of default *AWS service*. |
209
+
|**Identity provider**|`sts.windows.net/cab8a31a-1906-4287-a0d8-4eef66b95f6e/`| The provider you created in the previous step. |
210
+
|**Audience**|`api://d4230588-5f84-4281-a9c7-2c15194b28f7`| The audience you defined for the identity provider in the previous step. |
211
+
|**Permissions to assign**| <ul><li>`AmazonSQSReadOnlyAccess`<li>`AWSLambdaSQSQueueExecutionRole`<li>`AmazonS3ReadOnlyAccess`<li>`ROSAKMSProviderPolicy`<li>Additional policies for ingesting the different types of AWS service logs. | For information on these policies, see the [AWS S3 connector permissions policies page](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AWS-S3/AwsRequiredPolicies.md) in the Microsoft Sentinel GitHub repository. |
212
+
|**Name**| Example: "*MicrosoftSentinelRole*". | Choose a meaningful name that includes a reference to Microsoft Sentinel. |
213
+
214
+
215
+
1. Edit the new role's trust policy and add another condition: `"sts:RoleSessionName": "MicrosoftSentinel_{WORKSPACE_ID)"`
0 commit comments