Skip to content

Commit 70e80ee

Browse files
authored
Merge pull request #28 from oracle-quickstart/MAP
Name change
2 parents d8b4b21 + 0a8ea92 commit 70e80ee

File tree

9 files changed

+20
-18
lines changed

9 files changed

+20
-18
lines changed

knowlege-content/MAP/security-analytics-dashboards/README.md renamed to knowlege-content/MAP/security-fundamentals-dashboards/README.md

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Security Analytics Dashboard for MAP
1+
# Security Fundamentals Dashboards for MAP
22

33
### Dashboards screenshots
44
* Identity Dashboard
@@ -10,32 +10,34 @@
1010
* Security Operations
1111
![Out-of-Box Dashboard for Security Operations](images/sad-security-operations-screenshot.png)
1212

13-
### Enable Security Analytics Dashboards
13+
### Enable Security Fundamentals Dashboards
1414

15-
![Enable Security Analytics Dashboards in 4 days](images/sad_full_workflow_diagram_square.png)
15+
![Enable Security Fundamentals Dashboards in 4 days](images/sad_full_workflow_diagram_square.png)
1616

17-
### Security Analytics Dashboards Onboarding
17+
### Security Fundamentals Dashboards Onboarding
1818
* Logging Analytics should be set up in your tenancy
1919
* [Logging Analytics](https://docs.oracle.com/en-us/iaas/logging-analytics/index.html)
2020
* Configure Logging Analytics
2121
* [Configure Your Service](https://docs.oracle.com/en-us/iaas/logging-analytics/doc/configure-your-service.html)
2222
* [Prerequisite IAM Policies](https://docs.oracle.com/en-us/iaas/logging-analytics/doc/prerequisite-iam-policies.html)
2323
* [Enable Access to Logging Analytics and Its Resources](https://docs.oracle.com/en-us/iaas/logging-analytics/doc/enable-access-logging-analytics-and-its-resources.html)
24-
* Security Analytics Dashboards Log Ingestion
24+
25+
### Security Fundamentals Dashboards Log Ingestion
2526
* [Ingest OCI VCN Flow Logs into OCI Logging Analytics](https://blogs.oracle.com/observability/post/how-to-ingest-oci-vcn-flow-logs-into-oci-logging-analytics)
2627
* [Ingest OCI Audit logs into OCI Logging Analytics](https://redthunder.blog/2021/06/01/getting-insights-with-oci-audit-log-with-logging-analytics-via-service-connector/)
2728

28-
### Enable Threat Intelligence Integration
29-
Logging Analytics is integrated with Oracle Threat Intelligence to automatically receive the threat feed as the logs are ingested. The feature is available for all the log sources in the regions where both Logging Analytics and Oracle Threat Intelligence services are enabled. The Threat IPs widget makes use of this feature, which is not enabled by default.
30-
To enable:
31-
1. In OCI console, Navigate to Observability and Management -> Logging Analytics->Administration
32-
2. Click on “Sources”. in search box in the top right, search for “vcn”. You should get 2 sources: “OCI VCN Flow Unified Schema Logs” and “OCI VCN Flow Logs”
33-
3. Edit each source. On the Edit screen, click the “Field Enrichment” tab. Ensure the "Enabled" checkbox is checked for the "Geo location" function
34-
4. Edit the "Geo location" function by clicking the three dots, and check "Threat Intelligence enrichment" checkbox.
35-
5. If it is not, check the checkbox and click "Save Changes"
36-
6. Repeat above 5 steps for "OCI Audit Logs" Log Source.
37-
38-
### Security Analytics Dashboards Deployment
29+
* Enable Threat Intelligence Integration
30+
Logging Analytics is integrated with Oracle Threat Intelligence to automatically receive the threat feed as the logs are ingested. The feature is available for all the log sources in the regions where both Logging Analytics and Oracle Threat Intelligence services are enabled. The Threat IPs widget makes use of this feature, which is not enabled by default.
31+
To enable:
32+
33+
1. In OCI console, Navigate to Observability and Management -> Logging Analytics->Administration
34+
2. Click on “Sources”. in search box in the top right, search for “vcn”. You should get 2 sources: “OCI VCN Flow Unified Schema Logs” and “OCI VCN Flow Logs”
35+
3. Edit each source. On the Edit screen, click the “Field Enrichment” tab. Ensure the "Enabled" checkbox is checked for the "Geo location" function
36+
4. Edit the "Geo location" function by clicking the three dots, and check "Threat Intelligence enrichment" checkbox.
37+
5. If it is not, check the checkbox and click "Save Changes"
38+
6. Repeat above 5 steps for "OCI Audit Logs" Log Source.
39+
40+
### Security Fundamentals Dashboards Deployment
3941
Download the files to your local workstation. There are 3 files with “.json” extension corresponding to the 3 security dashboards
4042
1. Identity Security: Identity Security.json
4143
2. Network Security: Network Security.json
@@ -54,8 +56,8 @@ Follow these steps to import the JSON files:
5456

5557
It may take some time for the data to start flowing into the dashboard. You will not see any data unless there are activities on the target system(s) that would be picked up by the corresponding widget/query.
5658

57-
### Security Analytics Dashboards Visulization
58-
You can now use Security Analytics Dashboards to detect security threats and issues in OCI tenany. For example, Threat IPs detected in VCN Flow Logs accessing OCI cloud resources or spikes detected in Network Ingress Traffic from Public IPs need further investigation from the security teams to mitigate security risks across your tenancy.
59+
### Security Fundamentals Dashboards Visulization
60+
You can now use Security Fundamentals Dashboards to detect security threats and issues in OCI tenany. For example, Threat IPs detected in VCN Flow Logs accessing OCI cloud resources or spikes detected in Network Ingress Traffic from Public IPs need further investigation from the security teams to mitigate security risks across your tenancy.
5961

6062
<p align="center">
6163
<img src="images/sad-threat-ips.png" width="400"/>

0 commit comments

Comments
 (0)