Skip to content

Commit 920f993

Browse files
authored
Merge pull request #1 from yelevin/patch-2
Yechiel's edits
2 parents d579fb1 + 34f6fc4 commit 920f993

File tree

1 file changed

+13
-15
lines changed

1 file changed

+13
-15
lines changed

articles/sentinel/connect-aws.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,6 @@ This connector is available in two versions: the legacy connector for CloudTrail
1818
- [AWS CloudTrail](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-user-guide.html) - [Management](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html) and [data](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html) events
1919
- [AWS CloudWatch](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/WhatIsCloudWatch.html) - [CloudWatch logs](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/WhatIsCloudWatchLogs.html)
2020

21-
> [!IMPORTANT]
22-
>
23-
> - The Amazon Web Services S3 connector is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
24-
2521
# [S3 connector (new)](#tab/s3)
2622

2723
This tab explains how to configure the AWS S3 connector. The process of setting it up has two parts: the AWS side and the Microsoft Sentinel side. Each side's process produces information used by the other side. This two-way authentication creates secure communication.
@@ -52,9 +48,7 @@ This graphic and the following text show how the parts of this connector solutio
5248

5349
- The connector reads the message with the path, then fetches the files from the S3 bucket.
5450

55-
- To connect to the SQS queue and the S3 bucket, Microsoft Sentinel uses AWS credentials and connection information embedded in the AWS S3 connector's configuration. The AWS credentials are configured with a role and a permissions policy giving them access to those resources. Similarly, the Microsoft Sentinel workspace ID is embedded in the AWS configuration, so there is in effect two-way authentication.
56-
57-
For customers in **Azure Government clouds**, Microsoft Sentinel uses a federated web identity provider (Microsoft Entra ID) for authenticating with AWS through OpenID Connect (OIDC), and assuming an AWS IAM role.
51+
- To connect to the SQS queue and the S3 bucket, Microsoft Sentinel uses a federated web identity provider (Microsoft Entra ID) for authenticating with AWS through OpenID Connect (OIDC), and assuming an AWS IAM role. The role is configured with a permissions policy giving it access to those resources.
5852

5953
## Connect the S3 connector
6054

@@ -64,9 +58,11 @@ This graphic and the following text show how the parts of this connector solutio
6458

6559
- Create a **Simple Queue Service (SQS) queue** to provide notification.
6660

67-
- Create an **assumed role** to grant permissions to your Microsoft Sentinel account (external ID) to access your AWS resources.
61+
- Create a **web identity provider** to authenticate users to AWS through OpenID Connect (OIDC).
6862

69-
- Attach the appropriate **IAM permissions policies** to grant Microsoft Sentinel access to the appropriate resources (S3 bucket, SQS).
63+
- Create an **assumed role** to grant permissions to users authenticated by the OIDC web identity provider to access your AWS resources.
64+
65+
- Attach the appropriate **IAM permissions policies** to grant the assumed role access to the appropriate resources (S3 bucket, SQS).
7066

7167
We have made available, in our GitHub repository, a script that **automates the AWS side of this process**. See the instructions for [automatic setup](#automatic-setup) later in this document.
7268

@@ -80,15 +76,17 @@ To simplify the onboarding process, Microsoft Sentinel has provided a [PowerShel
8076

8177
The script takes the following actions:
8278

83-
- Creates an *IAM assumed role* with the minimal necessary permissions, to grant Microsoft Sentinel access to your logs in a given S3 bucket and SQS queue.
79+
- Creates an OIDC web identity provider, to authenticate Microsoft Entra ID users to AWS.
80+
81+
- Creates an *IAM assumed role* with the minimal necessary permissions, to grant OIDC-authenticated users access to your logs in a given S3 bucket and SQS queue.
8482

8583
- Enables specified AWS services to send logs to that S3 bucket, and notification messages to that SQS queue.
8684

8785
- If necessary, creates that S3 bucket and that SQS queue for this purpose.
8886

8987
- Configures any necessary IAM permissions policies and applies them to the IAM role created above.
9088

91-
For Azure Government clouds, a specialized script first creates an OIDC identity provider, to which it assigns the IAM assumed role. It then performs all the other steps above.
89+
For Azure Government clouds, a specialized script creates a different OIDC web identity provider, to which it assigns the IAM assumed role.
9290

9391
### Prerequisites for automatic setup
9492

@@ -169,19 +167,19 @@ Microsoft recommends using the automatic setup script to deploy this connector.
169167

170168
1. Under **Configuration**, expand **Setup with PowerShell script (recommended)**, then copy the **External ID (Workspace ID)** to your clipboard.
171169

172-
### Create an AWS assumed role and an Open ID Connect (OIDC) web identity provider
170+
### Create an Open ID Connect (OIDC) web identity provider and an AWS assumed role
173171

174172
1. In a different browser window or tab, open the AWS console.
175173

176174
1. Create a **web identity provider**. Follow these instructions in the AWS documentation:<br>[Creating OpenID Connect (OIDC) identity providers](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html).
177175

178176
| Parameter | Selection/Value | Comments |
179177
| - | - | - |
180-
| **Client ID** | Ignore this, you already have it. See **Audience** line below. | |
178+
| **Client ID** | - | Ignore this, you already have it. See **Audience** line below. |
181179
| **Provider type** | *OpenID Connect* | Instead of default *SAML*.|
182-
| **Provider URL** | `https://sts.windows.net/cab8a31a-1906-4287-a0d8-4eef66b95f6e/` | |
180+
| **Provider URL** | Commercial:<br>`sts.windows.net/33e01921-4d64-4f8c-a055-5bdaffd5e33d/`<br><br>Government:<br>`sts.windows.net/cab8a31a-1906-4287-a0d8-4eef66b95f6e/` | |
183181
| **Thumbprint** | `626d44e704d1ceabe3bf0d53397464ac8080142c` | If created in the IAM console, selecting **Get thumbprint** should give you this result. |
184-
| **Audience** | `api://d4230588-5f84-4281-a9c7-2c15194b28f7` | |
182+
| **Audience** | Commercial:<br>`api://1462b192-27f7-4cb9-8523-0f4ecb54b47e`<br><br>Government:<br>`api://d4230588-5f84-4281-a9c7-2c15194b28f7` | |
185183

186184
3. Create an **IAM assumed role**. Follow these instructions in the AWS documentation:<br>[Creating a role for web identity or OpenID Connect Federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html#idp_oidc_Create).
187185

0 commit comments

Comments
 (0)