Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
95 changes: 93 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,93 @@
# tailpipe-mod-aws-vpc-flow-log-detections-
Run detections and view dashboards for your AWS VPC Flow logs to monitor and analyze activity across your AWS accounts using Powerpipe and Tailpipe.
# AWS VPC Flow Log Detections Mod for Powerpipe

[Tailpipe](https://tailpipe.io) is an open-source CLI tool that allows you to collect logs and query them with SQL.

[AWS VPC Flow Logs](https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html) provide visibility into network traffic that traverses your VPC. Flow logs capture information about the IP traffic going to and from network interfaces in your VPC.

The AWS VPC Flow Log Detections Mod contains pre-built dashboards and detections, which can be used to monitor and analyze network activity across your AWS accounts. The detections cover a wide range of security scenarios including:

- Unusual port activity
- Large data transfers
- Port and service scanning
- Access to sensitive internal services from public IPs
- Suspicious outbound traffic
- Communication with known bad IPs
- And more...

Run detection benchmarks:
![image](https://turbot.com/images/product-screenshots/tailpipe-vpc-flow-log-detections-terminal.png)

View insights in dashboards:
![image](https://turbot.com/images/product-screenshots/tailpipe-vpc-flow-log-detections-dashboard.png)

## Documentation

- **[Benchmarks and Detections →](https://hub.powerpipe.io/mods/turbot/aws-vpc-flow-log-detections/benchmarks)**

## Getting Started

Install Powerpipe from the [downloads page](https://powerpipe.io/downloads):

```bash
# macOS
brew install turbot/tap/powerpipe

# Linux or Windows (WSL)
sudo /bin/sh -c "$(curl -fsSL https://powerpipe.io/install/powerpipe.sh)"
```

This mod also requires AWS VPC Flow Logs to be collected using Tailpipe with the AWS plugin:

- [Get started with the AWS plugin for Tailpipe →](https://tailpipe.io/plugins/turbot/aws)

Install the mod:

```bash
mkdir dashboards
cd dashboards
powerpipe mod install github.com/turbot/tailpipe-mod-aws-vpc-flow-log-detections
```

### Browsing Dashboards

Start the dashboard server:

```bash
powerpipe server
```

Browse and view your dashboards at **http://localhost:9033**.

### Running Benchmarks in Your Terminal

Instead of running benchmarks in a dashboard, you can also run them within your terminal with the `powerpipe benchmark` command:

List available benchmarks:

```bash
powerpipe benchmark list
```

Run a benchmark:

```bash
powerpipe benchmark run aws_vpc_flow_log_detections.benchmark.mitre_attack_v161
```

Different output formats are also available, for more information please see [Output Formats](https://powerpipe.io/docs/reference/cli/benchmark#output-formats).

## Open Source & Contributing

This repository is published under the [Apache 2.0 license](LICENSE). Please see our [code of conduct](https://github.com/turbot/.github/blob/main/CODE_OF_CONDUCT.md). We look forward to collaborating with you!

[Tailpipe](https://tailpipe.io) and [Powerpipe](https://powerpipe.io) are products produced from this open source software, exclusively by [Turbot HQ, Inc](https://turbot.com). They are distributed under our commercial terms. Others are allowed to make their own distribution of the software, but cannot use any of the Turbot trademarks, cloud services, etc. You can learn more in our [Open Source FAQ](https://turbot.com/open-source).

## Get Involved

**[Join #tailpipe and #powerpipe on Slack →](https://turbot.com/community/join)**

Want to help but don't know where to start? Pick up one of the `help wanted` issues:

- [Powerpipe](https://github.com/turbot/powerpipe/labels/help%20wanted)
- [Tailpipe](https://github.com/turbot/tailpipe/labels/help%20wanted)
- [AWS VPC Flow Log Detections Mod](https://github.com/turbot/tailpipe-mod-aws-vpc-flow-log-detections/labels/help%20wanted)
Loading