Azure-Sentinel/DataConnectors/AWS-S3
stavbella 881439f1d1
update script aws gov to azure com (#10333)
* update template

* update template

* add gov to com
2024-04-18 19:15:01 +03:00
..
CloudFormation Add cloudFormation template 2022-06-02 17:05:45 +03:00
Enviornment update script aws gov to azure com (#10333) 2024-04-18 19:15:01 +03:00
Utils fix bucket bug + comtoffx 2024-03-14 14:15:16 +02:00
AwsRequiredPolicies.md fix (dataConnector AWS S3): remove redundant comma from json policies doc (#5313) 2022-06-15 09:56:52 +03:00
AwsRequiredPoliciesForGov.md changes for arn:aws-us-gov 2024-01-22 17:39:14 +02:00
CloudWatchLambdaFunction.py restored deleted file 2024-03-28 21:30:17 -07:00
CloudWatchLambdaFunction_V2.py Fixed PR review comments 2024-03-28 23:02:34 -07:00
ConfigAwsConnector.ps1 AWS aad script (#9759) 2024-01-22 11:00:14 +02:00
ConfigAwsS3DataConnectorScripts.zip update script aws gov to azure com (#10333) 2024-04-18 19:15:01 +03:00
ConfigAwsS3DataConnectorScriptsGov.zip fix zips 2024-03-18 11:02:36 +02:00
ConfigCloudTrailDataConnector.ps1 for prod users - OIDC 2024-03-03 17:02:56 +02:00
ConfigCloudWatchDataConnector.ps1 for prod users - OIDC 2024-03-03 17:02:56 +02:00
ConfigCustomLogDataConnector.ps1 for prod users - OIDC 2024-03-03 17:02:56 +02:00
ConfigGuardDutyDataConnector.ps1 for prod users - OIDC 2024-03-03 17:02:56 +02:00
ConfigVpcFlowDataConnector.ps1 for prod users - OIDC 2024-03-03 17:02:56 +02:00
ConfigVpcFlowLogs.ps1 changes for arn:aws-us-gov 2024-01-22 17:39:14 +02:00
README.md AWS aad script (#9759) 2024-01-22 11:00:14 +02:00

README.md

AWS S3 Microsoft Sentinel Connector

Introduction

AWS S3 Sentinel connector ingests many AWS service logs into Azure Sentinel. Currently supported logs include: AWS VPC Flow Logs, GuardDuty, Cloud Watch, Cloud Trail (management and data events).

This connector requires that each AWS service publish its logs to an S3 bucket in your account. In addition you must configure SQS notifications and permissions for the connector to retrieve the logs.

More information on the connector and configuration instructions can be found on the Azure Sentinel data connector page in the Azure portal.

Configuration process

This set of PowerShell scripts can be used to automatically configure the necessary resources.

At a high level, these scripts do the following:

  1. Create an AWS assumed role and grant access to the AWS Sentinel account.
  2. Configure the AWS service (VPC Flow Logs/GuardDuty) to export gzipped logs to an S3 bucket.
  3. Create a standard Simple Queue Service (SQS) in AWS.
  4. Enable SQS notification.
  5. Grant the Sentinel AWS account access to the S3 bucket & SQS.

Script prerequisites

You must have PowerShell and the AWS CLI installed before using these scripts.

Using the scripts

For Microsoft Azure, please download and extract the ConfigAwsS3DataConnectorScripts.zip file to your computer. For Microsoft Azure Government, please download and extract the ConfigAwsS3DataConnectorGOVScripts.zip file to your computer. Make sure that you have PowerShell and the AWS CLI installed.

IMPORTANT Downloaded PowerShell scripts must be marked safe to before being used. To mark the scripts safe, use the Unblock-File cmdlet or
right-click on the script file(s), then click Properties and then click Unblock.

Then run the following from PowerShell and follow the prompts to complete the configuration.


.\ConfigAwsConnector.ps1

When the script(s) complete, you must complete the Azure Sentinel data connector configuration in the Azure portal.

Troubleshooting

By default, a log is created in the directory where the script is executed.

Advanced usage

The ConfigAwsConnector.ps1 script has two parameters:

  • -LogPath specifies a custom path to create the script activity log file.
  • -AwsLogType specifies the AWS log type to configure. Valid options are: "VPC", "CloudTrail", "GuardDuty". If this parameter is specified, the user will not be prompted for this information.