Skip to content

v-sreddyt/AWS_Networkfirewall

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

Overview

This guide explains how to integrate AWS Network Firewall logs with Microsoft Sentinel using an AWS CloudFormation template. The template automates the deployment of necessary resources to collect, process, and forward logs to Sentinel.

Prerequisites

Before deploying, ensure you have:

  • An AWS account with permissions to deploy CloudFormation stacks.
  • An existing AWS Network Firewall setup.
  • An active Microsoft Sentinel Log Analytics Workspace ID.
  • Required IAM permissions to configure AWS services.

CloudFormation Templates

Download Both the CloudFormation templates(Template 1: OpenID connect authentication deployment,Template 2: AWSCloudFront resources deployment) from connector UI page and deploy in your AWS environment.

  1. OpenID Connect

    The OIDC (OpenID Connect) Web Identity Provider allows AWS services to securely authenticate using an external identity provider without managing long-term credentials. The CloudFormation template configures OIDC as a trusted identity provider in AWS, enabling secure role-based access for forwarding AWS Network Firewall logs to Microsoft Sentinel.

  2. AWS Network Firewall Configuration

    The AWS Network Firewall Configuration template sets up logging for AWS Network Firewall by creating an S3 bucket, SQS queues, and event notifications. This ensures logs are captured and forwarded to Microsoft Sentinel for monitoring and threat detection.

CloudFormation Deployment

Deploying the Stack

ODIC Web Identity

  • Navigate to the AWS CloudFormation console
  • Choose create stack
  • Select upload a template file
  • Upload the ODIC Web identity template and select next
  • Provide the stack name and select next
  • Submit the stack

AWS Network Firewall Configuration

  • Navigate to the AWS CloudFormation console
  • Choose create stack
  • Select upload a template file
  • Upload the Aws NetworkFirewall Configuration template and select next
  • Enter the required parameters:
    • Provide the stack Name
    • Microsoft Sentinel Workspace ID where logs to be stored
  • Deploy the stack and wait for completion.
  • Go to Outputs Tab in the stacks and save the output for future purpose

Resources Created

The CloudFormation template will create:

  • One S3 bucket to store AWS Network Firewall logs.
  • Three SQS queues for log processing and forwarding.
  • S3 Event Notifications to trigger log forwarding.
  • IAM Roles & Policies with the necessary permissions.

Configuring AWS Network Firewall Logs

  • Go to the Firewall Service, navigate to the Logging tab, and enable the log types: FLOW, ALERT, and TLS.
  • Select S3 as the log destination and enter the S3 bucket name created by the CloudFormation stack.

Configuring Microsoft Sentinel

  • Navigate to microsoft sentinel
  • Go to Amazon Web Services NetworkFirewall data connector
  • Select Add New collector
  • Provide the Required Details - Role ARN, Queue URL, Datatype
  • Ensure that the ARN remains the same for all data types (Alert, Flow, and TLS), while each data type has its respective Queue URL.

Verifying Logs in Sentinel

  • Go to Log Analytics in Microsoft Sentinel.
  • Run the following Kusto Query Language (KQL) query:
    • For Flow Logs
      AWSNetworkFirewallFlow
      | where TimeGenerated > ago(1h)
      
    • For Alert Logs
      AWSNetworkFirewallAlert
      | where TimeGenerated > ago(1h)
      
    • For Tls Logs
      AWSNetworkFirewallTls
      | where TimeGenerated > ago(1h)
      
  • Ensure logs appear correctly.

Troubleshooting

  • No logs in Sentinel? Check Event Notifications in S3 Bucket to ensure the Prefix path matches the S3 bucket logs path.

  • Event Notification Path

    AWS S3 Bucket -> Properties -> Event Notifications -> Select Event Notification -> Edit -> General configuration Make sure S3 bucket path and prefix path should be the same
    
  • IAM permission errors? Ensure CloudFormation created the correct policies.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors