Skip to content

Latest commit

 

History

History
86 lines (57 loc) · 3.98 KB

securitylake.md

File metadata and controls

86 lines (57 loc) · 3.98 KB

Amazon Security Lake Integration

View this page in Japanese (日本語) | Back to README

Security Lake Architecture

Data from Amazon Security Lake can be loaded directly into SIEM on OpenSearch.

Ingest data

Deploying SIEM on OpenSearch Service

Deploy SIEM on OpenSearch with reference to README

The account can be the same as or different from the Amazon Security Lake account, but the recommended account is different from the Security Lake account.

The region must be the same as the region where Security Lake is enabled.

Ignore Security Lake related parameters when running CDK / CloudFormation.

Enabling and Configuring Security Lake

  1. Set delegated administrator if using AWS Organizations (optional) Doc
  2. Enable Security Lake Doc
  3. If you want to monitor multiple regions, configure rollup (Optional) Doc
  4. Set up subscribers in the region where you want to deploy SIEM on OpenSearch Doc
    • Data access method: S3
    • Subscriber credentials
      • Account Id: AWS account where SIEM was deployed
      • External ID: (any string)
    • Log and event sources
      • Select All log and event sources or make sure that the custom log sources you want to ingest are selected under Specific log and event sources
  5. [Required] Change the SQS of the created subscriber
    • Target SQS: AmazonSecurityLake-XXXXXXXX-XXXXXX-XXXXXX-XXXXXXXX-Main-Queue
    • Change visibility timeout from 5 minutes to 10 minutes.

Check the subscriber created.

resource type resource ARN
Subscription endpoint arn:aws:sqs:ap-northeast-1:888888888888:AmazonSecurityLake-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX-Main-Queue
AWS role ID arn:aws:iam::888888888888:role/AmazonSecurityLake-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX
External Id (any string)

Use this for the CloudFormation parameters in the next step.

Preparation with SIEM account

Update the CloudFormation aes-siem or siem stack and enter the Control Tower related parameters.

Example: Security Lake Integration Parameter

Parameter Value
SecurityLakeSubscriberSqs arn:aws:sqs:ap-northeast-1:888888888888:AmazonSecurityLake-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX-Main-Queue
SecurityLakeRoleArn arn:aws:iam::888888888888:role/AmazonSecurityLake-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX
SecurityLakeExternalId ( string of configured external ID )

Immediately after configuration, log ingestion may fail, but will succeed once a new instance of the Lambda function (es-loader) is created. Alternatively, manually deploying the es-loader and forcing it to launch a new instance will resolve the error.

This completes the log ingestion configuration for Security Lake

Custom Sources

You can collect data from custom sources in Security Lake's S3 buckets. Although it can be imported into SIEM on OpenSearch, additional settings are required in user.ini if the file name does not match the expected one

  • Expected file name: [0-9a-f]{32}\.gz\.parquet
  • Expected directory name: [Ss]ecurity[Ll]ake/

If neither matches, please set the following configuration in user.ini

user.ini

[securitylake]
s3_key = [0-9a-f]{32}\.gz\.parquet|[Ss]ecurity[Ll]ake/|file_name_of_parquet

Otherwise

[securitylake]
s3_key = [0-9a-f]{32}\.gz\.parquet|[Ss]ecurity[Ll]ake/|service_name_in_s3_path

Please set it to keep the existing s3_key parameters. If there is no need to change other than s3_key, so copy from aws.ini & paste is not necessary because the differential settings are inherited.