Skip to content

Commit 8d42ef4

Browse files
amee-sumoJV0812kimsauceankitgoelcmujpipkin1
authored
Update Configuration part for AWS security apps (#5625)
* Update Configuration part for AWS security apps * Update docs/integrations/amazon-aws/guardduty.md Co-authored-by: Jagadisha V <[email protected]> * Update docs/integrations/amazon-aws/guardduty.md Co-authored-by: Jagadisha V <[email protected]> * Update docs/integrations/amazon-aws/guardduty.md Co-authored-by: Jagadisha V <[email protected]> * Update docs/integrations/amazon-aws/guardduty.md Co-authored-by: Jagadisha V <[email protected]> * Update docs/integrations/amazon-aws/guardduty.md Co-authored-by: Jagadisha V <[email protected]> * Update docs/integrations/amazon-aws/guardduty.md Co-authored-by: Jagadisha V <[email protected]> * Update docs/integrations/amazon-aws/guardduty.md Co-authored-by: Jagadisha V <[email protected]> * Update guardduty.md * Update inspector.md * Update security-hub.md * Update guardduty.md * Update guardduty.md * Update inspector.md * Update security-hub.md * Update docs/integrations/amazon-aws/guardduty.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update docs/integrations/amazon-aws/inspector.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update docs/integrations/amazon-aws/security-hub.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Fix broken link --------- Co-authored-by: Jagadisha V <[email protected]> Co-authored-by: Kim (Sumo Logic) <[email protected]> Co-authored-by: Ankit Goel <[email protected]> Co-authored-by: John Pipkin <[email protected]>
1 parent ad04914 commit 8d42ef4

File tree

4 files changed

+142
-35
lines changed

4 files changed

+142
-35
lines changed

docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-guardduty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ To ingest AWS GuardDuty data into Cloud SIEM:
1111
1. [Configure an HTTP source for GuardDuty](/docs/integrations/amazon-aws/guardduty/#step-1-configure-an-http-source) on a collector. When you configure the source, do the following:
1212
1. Select the **Forward to SIEM** option in the source configuration UI. This will ensure all logs for this source are forwarded to Cloud SIEM.
1313
1. Click the **+Add** link to add a field whose name is `_parser` with value */Parsers/System/AWS/GuardDuty*. This ensures that the GuardDuty logs are parsed and normalized into structured records in Cloud SIEM.
14-
1. [Deploy the Sumo Logic GuardDuty events processor](/docs/integrations/amazon-aws/guardduty/#step-2-deploy-sumo-guardduty-events-processor).
14+
1. [Deploy the Sumo Logic GuardDuty events processor](/docs/integrations/amazon-aws/guardduty/#step-2-deploy-sumo-logic-guardduty-events-processor).
1515
1. To verify that your logs are successfully making it into Cloud SIEM:
1616
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
1717
1. On the **Log Mappings** tab search for "GuardDuty" and check the **Records** columns.

docs/integrations/amazon-aws/guardduty.md

Lines changed: 48 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -176,18 +176,58 @@ _sourceCategory=aws/guardduty
176176

177177
</details>
178178

179-
## Collecting logs for the Amazon GuardDuty App
179+
## Collecting logs for the Amazon GuardDuty app
180180

181-
This section has instructions for collecting logs for the Amazon GuardDuty App.
181+
You can collect the Amazon GuardDuty logs using two methods:
182182

183-
1. Amazon GuardDuty sends notifications based on CloudWatch events when new findings, or new occurrences of existing findings, are generated.
184-
2. A CloudWatch events rule enables CloudWatch to send events for the GuardDuty findings to the Sumo CloudWatchEventFunction Lambda function.
185-
3. The Lambda function sends the events to an HTTP source on a Sumo hosted collector.
183+
- [Method 1: Collecting Amazon GuardDuty logs using EventBridge](#method-1-collecting-amazon-guardduty-logs-using-eventbridge)
184+
- [Method 2: Collecting Amazon GuardDuty logs using Sumo Logic HTTP endpoint](#method-2-collecting-amazon-guardduty-logs-using-sumo-logic-http-endpoint)
186185

187-
This configuration is defined in a [AWS Serverless Application Model (SAM) specification](https://docs.aws.amazon.com/lambda/latest/dg/serverless_app.html) published in the [AWS Serverless Application Repository](https://aws.amazon.com/serverless/serverlessrepo/). You do not need to manually create the necessary AWS resources. You simply deploy the configuration, as described in Step 2 below.
186+
### Method 1: Collecting Amazon GuardDuty logs using EventBridge
187+
188+
This method leverages AWS EventBridge to streamline the logging process by sending data directly to Sumo Logic via an HTTP endpoint. By eliminating intermediary services such as Lambda, it offers a more straightforward and cost-effective solution.
189+
190+
#### Step 1: Create an HTTP source in Sumo Logic
191+
192+
To create an HTTP source in Sumo Logic, see [HTTP Logs and Metrics Source](/docs/send-data/hosted-collectors/http-source/logs-metrics/#configure-an-httplogs-and-metrics-source).
193+
194+
#### Step 2: Configure EventBridge API destination
195+
196+
Follow the steps below to configure the EventBridge API destination:
197+
1. Sign in to your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
198+
1. In the navigation bar, click **API destinations**.
199+
1. Click **Create destination**.
200+
1. Enter a name for the API Destination.
201+
1. Provide the HTTP Source URL from Sumo Logic.
202+
1. Click **Create a new connection** to create a connection for the API destination.
203+
1. Provide a connection name.
204+
1. Keep the API Type as **Public**.
205+
1. Select **Basic (Username/Password)** in the **Authorization type**.
206+
1. Add any value of your choice for **Username** and **Password**.
207+
208+
#### Step 3: Create the EventBridge rule
188209

210+
Follow the steps below to create the EventBridge rule:
211+
1. Sign in to your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
212+
1. In the navigation bar, click **Rules**.
213+
1. Set the event source to **AWS services** and then select **Security Hub** as the AWS service.
214+
1. Select **All Events** in Event Type.
215+
1. Under **Select targets**, choose **EventBridge API destination**.
216+
1. Select the API Destination created in Step 2.
217+
1. Select **Create a new role for this specific resource** in the **Execution role**.
218+
1. Click **Create** to activate the rule.
189219

190-
### Step 1: Configure an HTTP source
220+
### Method 2: Collecting Amazon GuardDuty logs using Sumo Logic HTTP endpoint
221+
222+
This method uses an AWS Lambda function to process, store, and forward logs to Sumo Logic. While it offers a robust solution, it introduces additional AWS resources, such as Lambda, which can increase both cost and complexity.
223+
224+
- Amazon GuardDuty sends notifications based on CloudWatch events when new findings, or new occurrences of existing findings, are generated.
225+
- A CloudWatch events rule enables CloudWatch to send events for the GuardDuty findings to the Sumo `CloudWatchEventFunction` Lambda function.
226+
- The Lambda function sends the events to an HTTP source on a Sumo Logic hosted collector.
227+
228+
This configuration is defined in a [AWS Serverless Application Model (SAM) specification](https://docs.aws.amazon.com/lambda/latest/dg/serverless_app.html) published in the [AWS Serverless Application Repository](https://aws.amazon.com/serverless/serverlessrepo/). You do not need to manually create the necessary AWS resources. You simply deploy the configuration, as described in Step 2 below.
229+
230+
#### Step 1: Configure an HTTP source
191231

192232
1. In Sumo Logic, configure a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
193233
2. In Sumo Logic, configure an [HTTP Source](/docs/send-data/hosted-collectors/http-source/logs-metrics). When you configure the source:
@@ -198,8 +238,7 @@ This configuration is defined in a [AWS Serverless Application Model (SAM) speci
198238

199239
When you configure the HTTP Source, make a note of the HTTP Source Address URL. You will need it in the next step.
200240

201-
202-
### Step 2: Deploy Sumo GuardDuty events processor
241+
#### Step 2: Deploy Sumo Logic GuardDuty events processor
203242

204243
In this step, you deploy the events processor. This will create the AWS resources described in [Collection overview](#collecting-logs-for-the-amazon-guardduty-app).
205244

docs/integrations/amazon-aws/inspector.md

Lines changed: 48 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16,18 +16,55 @@ For information about integrating Amazon Inspector with Security Hub, see [Integ
1616

1717
## Collecting findings for the Amazon Inspector app
1818

19-
Sumo Logic provides a serverless solution for creating a CloudWatch events rule and a Lambda function (SecurityHubCollector) to extract findings from AWS Security Hub.
19+
You can collect Security Hub logs using three methods:
2020

21-
Findings from AWS services (AWS Security Hub) are delivered to CloudWatch Events as events in near real time. The Lambda function parses those events and sends them to an S3 bucket. Sumo Logic then collects the findings data using an S3 bucket source on a Sumo Logic hosted collector. The Lambda function setup is defined using Serverless Application Model (SAM) specifications and is published in AWS Serverless Application Repository.
21+
- [Method 1: Collecting Security Hub logs using EventBridge](#method-1-collecting-security-hub-logs-using-eventbridge)
22+
- [Method 2: Collect Security Hub logs using Sumo Logic HTTP endpoint](#method-2-collect-security-hub-logs-using-sumo-logic-http-endpoint)
23+
-[Method 3: Collect Security Hub logs using Amazon S3 source](#method-3-collect-security-hub-logs-using-amazon-s3-source)
2224

23-
You can collect Security Hub logs using two methods:
25+
### Method 1: Collecting Security Hub logs using EventBridge
2426

25-
- [Method 1: Collect Security Hub logs using Sumo Logic HTTP endpoint](#method-1-collect-security-hub-logs-using-sumo-logic-http-endpoint)
26-
- [Method 2: Collect Security Hub logs using Amazon S3 source](#method-2-collect-security-hub-logs-using-amazon-s3-source)
27+
This method leverages AWS EventBridge to streamline the logging process by sending data directly to Sumo Logic via an HTTP endpoint. By eliminating intermediary services such as Lambda, it offers a more straightforward and cost-effective solution.
2728

28-
You do not have to manually create the AWS resources. Simply deploy the solution, as described in the [Step 2: Deploy an AWS Security Hub app collector](/docs/integrations/amazon-aws/inspector/#step-2-deploy-an-aws-security-hub-app-collector) for HTTP endpoint and [Step 2: Deploy an AWS Security Hub app collector](/docs/integrations/amazon-aws/inspector/#step-2-deploy-an-aws-security-hub-app-collector-1) for Amazon S3 source.
29+
#### Step 1: Create an HTTP source in Sumo Logic
30+
31+
To create an HTTP source in Sumo Logic, see [HTTP Logs and Metrics Source](/docs/send-data/hosted-collectors/http-source/logs-metrics/#configure-an-httplogs-and-metrics-source).
32+
33+
#### Step 2: Configure EventBridge API destination
34+
35+
Follow the steps below to configure the EventBridge API destination:
36+
1. Sign in to your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
37+
1. In the navigation bar, click **API destinations**.
38+
1. Click **Create destination**.
39+
1. Enter a name for the API Destination.
40+
1. Provide the HTTP Source URL from Sumo Logic.
41+
1. Click **Create a new connection** to create a connection for the API destination.
42+
1. Provide a connection name.
43+
1. Keep the API Type as **Public**.
44+
1. Select **Basic (Username/Password)** in the **Authorization type**.
45+
1. Add any value of your choice for **Username** and **Password**.
46+
47+
#### Step 3: Create the EventBridge rule
48+
49+
Follow the steps below to create the EventBridge rule:
50+
1. Sign in to your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
51+
1. In the navigation bar, click **Rules**.
52+
1. Set the event source to **AWS services** and then select **Security Hub** as the AWS service.
53+
1. Select **All Events** in Event Type.
54+
1. Under **Select targets**, choose **EventBridge API destination**.
55+
1. Select the API Destination created in Step 2.
56+
1. Select **Create a new role for this specific resource** in the **Execution role**.
57+
1. Click **Create** to activate the rule.
2958

30-
### Method 1: Collect Security Hub logs using Sumo Logic HTTP endpoint
59+
### Method 2: Collect Security Hub logs using Sumo Logic HTTP endpoint
60+
61+
This method uses an AWS Lambda function to process, store, and forward logs to Sumo Logic. While it offers a robust solution, it introduces additional AWS resources, such as Lambda, which can increase both cost and complexity.
62+
63+
Sumo Logic provides a serverless solution for creating a CloudWatch events rule and a Lambda function (SecurityHubCollector) to extract findings from AWS Security Hub.
64+
65+
Findings from AWS services (AWS Security Hub) are delivered to CloudWatch Events as events in near real time. The Lambda function parses those events and sends them to an S3 bucket. Sumo Logic then collects the findings data using an S3 bucket source on a Sumo Logic hosted collector. The Lambda function setup is defined using Serverless Application Model (SAM) specifications and is published in AWS Serverless Application Repository.
66+
67+
You do not have to manually create the AWS resources. Simply deploy the solution, as described in the [Step 2: Deploy an AWS Security Hub app collector](/docs/integrations/amazon-aws/inspector/#step-2-deploy-an-aws-security-hub-app-collector) for HTTP endpoint and [Step 2: Deploy an AWS Security Hub app collector](/docs/integrations/amazon-aws/inspector/#step-2-deploy-an-aws-security-hub-app-collector-1) for Amazon S3 source.
3168

3269
#### Step 1: Add a hosted collector and Sumo Logic HTTP source
3370

@@ -57,7 +94,9 @@ To deploy an AWS Security Hub app collector:
5794
5. In the **AWS Lambda > Functions > Application Settings** panel, enter the endpoint **HTTP endpoint** of the source that you configured.
5895
6. Scroll to the bottom of the window and click **Deploy**.
5996

60-
### Method 2: Collect Security Hub logs using Amazon S3 source
97+
### Method 3: Collect Security Hub logs using Amazon S3 source
98+
99+
This method uses a Lambda function to process findings, store them in an S3 bucket, and retrieve them through Sumo Logic's S3 Source. It is ideal for scenarios that require data archiving.
61100

62101
#### Step 1: Add a hosted collector and Amazon S3 source
63102

@@ -187,4 +226,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
187226

188227
import AppUninstall from '../../reuse/apps/app-uninstall.md';
189228

190-
<AppUninstall/>
229+
<AppUninstall/>

0 commit comments

Comments
 (0)