-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Protective Monitoring: Replace Firehose logs with s3 #7607
Comments
From discussion with Leonardo I think we actually have almost everything in place. We already collate the logs required in S3 (VPC Flow logs, Route 53 Resolver logs, Firewall logs), so all that ought to be required is the SQS setup, notifications to SQS, and an appropriate user & policy for XSIAM |
Hi @dms1981. When I looked into this I could not see where the vpc flow logs output to s3 is set up so my impression was that we would need to add additional buckets & new flow logs to output to them. I was also considering the merit of keeping all of these buckets in core logging - so the same cross-account configuration that cloudtrail uses in its module - and having the accessible to the single IAM user account already set up.
Anyhow let me know what you think. Talk to you tomorrow. |
I've done some reading and agree with the approach of exporting the logs into our
I did originally think that we were putting our logs into S3 but on checking that's not the case - the logs in question are sent to CloudWatch. Reconfiguring our logging to send to S3 instead of CloudWatch doesn't feel like the right approach, but streaming the logs feels architecturally correct (and is supported by the documentation I reference above). |
I propose to take the following approach in solving this story:
|
This has been implemented in line with existing examples. There are some questions around behaviours seen with SQS queues and the Cortex application, but those will be handled separately to this issue. |
Logs are successfully being ingested directly from S3 for Route53 Resolver Query Logs, and VPC Flow Logs. Network Firewall Logs are being delivered directly from CloudWatch via AWS Data Firehose. |
To review this you can see the relevant IAM role used by Cortex in our You should be able to see that it has been used recently to retrieve logs. You can see logs being delivered for collection in the relevant buckets: You will be able to check the SQS queues to ensure there hasn't been a build-up of messages. You will also be able to check the Finally, the documentation is in our user-guide here. |
I guess this needs removing based on the iam role being used now? Also I like the points you've noted above about potential issues that could arise (SQS buildup/firehose-errors). Do we want to raise some tickets for monitoring that sort of thing in future (proactive vs reactive)? |
Updated the docs and also raised a ticket around monitoring to inform the SOC PM team they may need to take corrective action |
User Story
We currently provide a number of sets of logs to the XSIAM protective monitoring tool. However they are having issues with the info coming, via firehose, from the following:
VPC flow logs
Network firewall logs
Route 53 resolver logs
This ticket is to provide the same log information into new S3 buckets.
To then liaise with the security development team to confirm that they can now ingest these logs correctly
Value / Purpose
This will improve the security of the modernisation platform and enable the SOC to alert us of any issues
Useful Contacts
leonardo.marini@justice.gov.uk
Additional Information
This was originally done using firehose - the original ticket is here #6163
Definition of Done
source/runbooks/integration-with-protective-monitoring.html.md.erb
updated as requiredThe text was updated successfully, but these errors were encountered: