Skip to content

Commit 64fc224

Browse files
authored
Merge branch 'main' into SEO-optimization-(Pilot)
2 parents 3c727e8 + 3ecd144 commit 64fc224

File tree

18 files changed

+336
-150
lines changed

18 files changed

+336
-150
lines changed
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: AWS IAM Users Source (Collection)
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- c2c
6+
- aws-iam-users-source
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to announce the release of our new cloud-to-cloud source for AWS IAM Users. This source collects the IAM User Inventory logs from the AWS SDK and sends them to Sumo Logic for streamlined analysis. [Learn more](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/aws-iam-users-source).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2803,6 +2803,7 @@
28032803
"/cid/17343": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/automox-source",
28042804
"/cid/17344": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/smartsheet-source",
28052805
"/cid/20172": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cisco-vulnerability-management-source",
2806+
"/cid/20173": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/aws-iam-users-source",
28062807
"/cid/19880": "/docs/metrics/metrics-operators/predict",
28072808
"/cid/19881": "/docs/metrics/metrics-operators/accum",
28082809
"/cid/19882": "/docs/metrics/metrics-operators/along",

docs/integrations/amazon-aws/guardduty.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -178,12 +178,14 @@ _sourceCategory=aws/guardduty
178178

179179
## Collecting logs for the Amazon GuardDuty app
180180

181-
You can collect the Amazon GuardDuty logs using two methods:
181+
You can collect the Amazon GuardDuty logs using the following methods and send them to Sumo Logic via an HTTP endpoint:
182182

183-
- [Method 1: Collecting Amazon GuardDuty logs using EventBridge](#method-1-collecting-amazon-guardduty-logs-using-eventbridge)
184-
- [Method 2: Collecting Amazon GuardDuty logs using Sumo Logic HTTP endpoint](#method-2-collecting-amazon-guardduty-logs-using-sumo-logic-http-endpoint)
183+
- [Method 1: GuardDuty > EventBridge > Sumo Logic via HTTP](#method-1-guardduty--eventbridge--sumo-logic-via-http-preferred)
184+
- [Method 2: GuardDuty > Lambda Function > Sumo Logic via HTTP](#method-2-guardduty--lambda-function--sumo-logic-via-http-alternative)
185185

186-
### Method 1: Collecting Amazon GuardDuty logs using EventBridge
186+
For efficiency and seamless integration, Method 1 using AWS EventBridge is preferred, as it leverages native AWS services to reduce resource overhead and simplify the process.
187+
188+
### Method 1: GuardDuty > EventBridge > Sumo Logic via HTTP (Preferred)
187189

188190
This method leverages AWS EventBridge to streamline the logging process by sending data directly to Sumo Logic via an HTTP endpoint. By eliminating intermediary services such as Lambda, it offers a more straightforward and cost-effective solution.
189191

@@ -194,7 +196,7 @@ To create an HTTP source in Sumo Logic, see [HTTP Logs and Metrics Source](/docs
194196
#### Step 2: Configure EventBridge API destination
195197

196198
Follow the steps below to configure the EventBridge API destination:
197-
1. Sign in to your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
199+
1. Sign in to your [Amazon EventBridge Console](https://aws.amazon.com/eventbridge/).
198200
1. In the navigation bar, click **API destinations**.
199201
1. Click **Create destination**.
200202
1. Enter a name for the API Destination.
@@ -208,7 +210,7 @@ Follow the steps below to configure the EventBridge API destination:
208210
#### Step 3: Create the EventBridge rule
209211

210212
Follow the steps below to create the EventBridge rule:
211-
1. Sign in to your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
213+
1. Sign in to your [Amazon EventBridge Console](https://aws.amazon.com/eventbridge/).
212214
1. In the navigation bar, click **Rules**.
213215
1. Set the event source to **AWS services** and then select **Security Hub** as the AWS service.
214216
1. Select **All Events** in Event Type.
@@ -217,9 +219,9 @@ Follow the steps below to create the EventBridge rule:
217219
1. Select **Create a new role for this specific resource** in the **Execution role**.
218220
1. Click **Create** to activate the rule.
219221

220-
### Method 2: Collecting Amazon GuardDuty logs using Sumo Logic HTTP endpoint
222+
### Method 2: GuardDuty > Lambda Function > Sumo Logic via HTTP (Alternative)
221223

222-
This method uses an AWS Lambda function to process, store, and forward logs to Sumo Logic. While it offers a robust solution, it introduces additional AWS resources, such as Lambda, which can increase both cost and complexity.
224+
This method uses an AWS Lambda function to process, store, and forward logs to Sumo Logic via an HTTP endpoint. While it offers a robust solution, it introduces additional AWS resources, such as Lambda, which can increase both cost and complexity.
223225

224226
- Amazon GuardDuty sends notifications based on CloudWatch events when new findings, or new occurrences of existing findings, are generated.
225227
- A CloudWatch events rule enables CloudWatch to send events for the GuardDuty findings to the Sumo `CloudWatchEventFunction` Lambda function.

docs/integrations/amazon-aws/inspector.md

Lines changed: 70 additions & 66 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,75 @@ Amazon Inspector is an automated vulnerability management service that continual
1414
For information about integrating Amazon Inspector with Security Hub, see [Integration with AWS Security Hub](https://docs.aws.amazon.com/inspector/latest/user/securityhub-integration.html) in Amazon help.
1515
:::
1616

17-
## Collecting findings for the Amazon Inspector app
17+
## Log types
1818

19-
You can collect Security Hub logs using three methods:
19+
### Sample log messages
20+
21+
```json title="AWS Security Hub log"
22+
{
23+
"SchemaVersion": "2018-10-08",
24+
"ProductArn": "arn:aws:securityhub:us-west- 2:123456789012:provider:private/default",
25+
"AwsAccountId": "123456789012",
26+
"Id": "test_finding_123456",
27+
"GeneratorId": "TestDetector",
28+
"Types": [
29+
"Software and Configuration Checks/Vulnerabilities/CVE"
30+
],
31+
"CreatedAt": "2018-11- 06T13:22:13.933Z",
32+
"UpdatedAt": "2018-11-07T14:22:13.933Z",
33+
"Severity": {
34+
"Product": 10,
35+
"Normalized": 30
36+
},
37+
"Title": "Unprotected port 22 found on instance i-01234567890abcefb",
38+
"Description": "Test finding was found on instance i- 01234567890afbcefa",
39+
"Resources": [
40+
{
41+
"Type": "AwsEc2::Instance",
42+
"Id": "arn:aws:ec2:us-west-2: 123456789012:instance:i- 01234567890abcefa"
43+
}
44+
],
45+
"SourceUrl": "http://myfp.com/recommendations/dangerous_things_and_how_to_fix_them",
46+
"Process": {
47+
"Name": "My Process",
48+
"Path": "/Process/Path"
49+
},
50+
"RecordState": "ACTIVE",
51+
"Note": {
52+
"Text": "User1 will address this finding",
53+
"UpdatedBy": "User1",
54+
"UpdatedAt": "2018-11-03T13:22:13.933Z"
55+
}
56+
}
57+
```
58+
59+
### Sample queries
60+
61+
```sql title="Findings by resource type and severity query"
62+
(_sourceCategory="securityhub_findings" OR _sourceCategory="Labs/AWS/SecurityHub")
63+
| json "AwsAccountId", "Id", "GeneratorId", "ProductArn", "CreatedAt", "UpdatedAt", "Resources",
64+
"Severity.Normalized", "SourceUrl",
65+
"Types", "Compliance.Status" as aws_account_id, finding_id, generator_id, product_arn, created_at,
66+
updated_at, resources, severity_normalized, sourceurl, finding_types, compliance_status nodrop
67+
| parse regex field=finding_types "\"(?<finding_type>.*?)\"" multi
68+
| parse regex field=resources "\"Type\":\"(?<resource_type>.*?)\"" multi
69+
| parse regex field=resources "\"Id\":\"(?<resource_id>.*?)\"" multi
70+
| parse regex field=product_arn "product/(?<finding_provider>.*?)$"
71+
| min(severity_normalized), pct(severity_normalized,25), pct(severity_normalized,50), pct(severity_normalized,75),
72+
max(severity_normalized) by resource_type
73+
```
74+
75+
## Collecting logs for the Amazon Inspector app
76+
77+
You can collect the Amazon Inspector logs using the following methods:
2078

21-
- [Method 1: Collecting Security Hub logs using EventBridge](#method-1-collecting-security-hub-logs-using-eventbridge)
22-
- [Method 2: Collect Security Hub logs using Sumo Logic HTTP endpoint](#method-2-collect-security-hub-logs-using-sumo-logic-http-endpoint)
23-
-[Method 3: Collect Security Hub logs using Amazon S3 source](#method-3-collect-security-hub-logs-using-amazon-s3-source)
79+
- [Method 1: Inspector > EventBridge > Sumo Logic via HTTP](#method-1-inspector--eventbridge--sumo-logic-via-http-preferred)
80+
- [Method 2: Inspector > Lambda Function > Sumo Logic via HTTP](#method-2-inspector--eventbridge--sumo-logic-via-http-alternative)
81+
- [Method 3: Inspector > Lambda Function > Amazon S3 > Sumo Logic via S3 Source](#method-3-inspector--lambda-function--amazon-s3--sumo-logic-via-s3-source-alternative)
2482

25-
### Method 1: Collecting Security Hub logs using EventBridge
83+
For efficiency and seamless integration, Method 1 using AWS EventBridge is preferred, as it leverages native AWS services to reduce resource overhead and simplify the process.
84+
85+
### Method 1: Inspector > EventBridge > Sumo Logic via HTTP (Preferred)
2686

2787
This method leverages AWS EventBridge to streamline the logging process by sending data directly to Sumo Logic via an HTTP endpoint. By eliminating intermediary services such as Lambda, it offers a more straightforward and cost-effective solution.
2888

@@ -33,7 +93,7 @@ To create an HTTP source in Sumo Logic, see [HTTP Logs and Metrics Source](/docs
3393
#### Step 2: Configure EventBridge API destination
3494

3595
Follow the steps below to configure the EventBridge API destination:
36-
1. Sign in to your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
96+
1. Sign in to your [Amazon EventBridge Console](https://aws.amazon.com/eventbridge/).
3797
1. In the navigation bar, click **API destinations**.
3898
1. Click **Create destination**.
3999
1. Enter a name for the API Destination.
@@ -47,7 +107,7 @@ Follow the steps below to configure the EventBridge API destination:
47107
#### Step 3: Create the EventBridge rule
48108

49109
Follow the steps below to create the EventBridge rule:
50-
1. Sign in to your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
110+
1. Sign in to your [Amazon EventBridge Console](https://aws.amazon.com/eventbridge/).
51111
1. In the navigation bar, click **Rules**.
52112
1. Set the event source to **AWS services** and then select **Security Hub** as the AWS service.
53113
1. Select **All Events** in Event Type.
@@ -56,7 +116,7 @@ Follow the steps below to create the EventBridge rule:
56116
1. Select **Create a new role for this specific resource** in the **Execution role**.
57117
1. Click **Create** to activate the rule.
58118

59-
### Method 2: Collect Security Hub logs using Sumo Logic HTTP endpoint
119+
### Method 2: Inspector > EventBridge > Sumo Logic via HTTP (Alternative)
60120

61121
This method uses an AWS Lambda function to process, store, and forward logs to Sumo Logic. While it offers a robust solution, it introduces additional AWS resources, such as Lambda, which can increase both cost and complexity.
62122

@@ -94,7 +154,7 @@ To deploy an AWS Security Hub app collector:
94154
5. In the **AWS Lambda > Functions > Application Settings** panel, enter the endpoint **HTTP endpoint** of the source that you configured.
95155
6. Scroll to the bottom of the window and click **Deploy**.
96156

97-
### Method 3: Collect Security Hub logs using Amazon S3 source
157+
### Method 3: Inspector > Lambda Function > Amazon S3 > Sumo Logic via S3 Source (Alternative)
98158

99159
This method uses a Lambda function to process findings, store them in an S3 bucket, and retrieve them through Sumo Logic's S3 Source. It is ideal for scenarios that require data archiving.
100160

@@ -127,62 +187,6 @@ To deploy an AWS Security Hub app collector:
127187
5. In the **AWS Lambda > Functions > Application Settings** panel, enter the name of the **S3SourceBucketName** for the bucket you configured (when you defined the S3 source).
128188
6. Scroll to the bottom of the window and click **Deploy**.
129189

130-
### Sample log messages
131-
132-
```json title="AWS Security Hub log"
133-
{
134-
"SchemaVersion": "2018-10-08",
135-
"ProductArn": "arn:aws:securityhub:us-west- 2:123456789012:provider:private/default",
136-
"AwsAccountId": "123456789012",
137-
"Id": "test_finding_123456",
138-
"GeneratorId": "TestDetector",
139-
"Types": [
140-
"Software and Configuration Checks/Vulnerabilities/CVE"
141-
],
142-
"CreatedAt": "2018-11- 06T13:22:13.933Z",
143-
"UpdatedAt": "2018-11-07T14:22:13.933Z",
144-
"Severity": {
145-
"Product": 10,
146-
"Normalized": 30
147-
},
148-
"Title": "Unprotected port 22 found on instance i-01234567890abcefb",
149-
"Description": "Test finding was found on instance i- 01234567890afbcefa",
150-
"Resources": [
151-
{
152-
"Type": "AwsEc2::Instance",
153-
"Id": "arn:aws:ec2:us-west-2: 123456789012:instance:i- 01234567890abcefa"
154-
}
155-
],
156-
"SourceUrl": "http://myfp.com/recommendations/dangerous_things_and_how_to_fix_them",
157-
"Process": {
158-
"Name": "My Process",
159-
"Path": "/Process/Path"
160-
},
161-
"RecordState": "ACTIVE",
162-
"Note": {
163-
"Text": "User1 will address this finding",
164-
"UpdatedBy": "User1",
165-
"UpdatedAt": "2018-11-03T13:22:13.933Z"
166-
}
167-
}
168-
```
169-
170-
### Sample queries
171-
172-
```sql title="Findings by resource type and severity query"
173-
(_sourceCategory="securityhub_findings" OR _sourceCategory="Labs/AWS/SecurityHub")
174-
| json "AwsAccountId", "Id", "GeneratorId", "ProductArn", "CreatedAt", "UpdatedAt", "Resources",
175-
"Severity.Normalized", "SourceUrl",
176-
"Types", "Compliance.Status" as aws_account_id, finding_id, generator_id, product_arn, created_at,
177-
updated_at, resources, severity_normalized, sourceurl, finding_types, compliance_status nodrop
178-
| parse regex field=finding_types "\"(?<finding_type>.*?)\"" multi
179-
| parse regex field=resources "\"Type\":\"(?<resource_type>.*?)\"" multi
180-
| parse regex field=resources "\"Id\":\"(?<resource_id>.*?)\"" multi
181-
| parse regex field=product_arn "product/(?<finding_provider>.*?)$"
182-
| min(severity_normalized), pct(severity_normalized,25), pct(severity_normalized,50), pct(severity_normalized,75),
183-
max(severity_normalized) by resource_type
184-
```
185-
186190
## Installing the Amazon Inspector app
187191

188192
Once you've set up ingestion of findings from AWS Security Hub, you can install the Sumo Logic app for Amazon Inspector and use the pre-configured searches and dashboards.

0 commit comments

Comments
 (0)