· Pre-requisites
· Scope
o Use case 1: Log Collection within same AWS account (Where LCP and logging resource are in the same AWS account)
o Use case 2: Log Collection using cross AWS account (Where LCP is hosted in MDR SOC AWS account and logging resource is in Customer AWS account)
...
This quick start guide will help Accenture MDR customers configure Amazon Web Service (AWS) Role Based Access Control to allow log collection from the Log Collection Platform (LCP).
The document includes the following topics:
Table of Contents |
---|
Pre-requisites
AWS users should have access to create, modify the IAM role.
AWS users should have access to assign a role to EC2 instance (LCP).
Scope
Log Collection within same AWS account (Where LCP and logging resource(s) are in the same AWS account) (Mainly used for MDR self-monitoring)
Log Collection using cross AWS account (Where LCP is hosted in MDR SOC AWS account and logging resource is in Customer AWS account)
...
Note: Logging resources we support are S3 Bucket, SQS, and CloudWatch log
Use case 1: Log Collection within same AWS account (Where LCP and logging resource are in the same AWS account)
Sign in to the AWS Management Console.
Open the AWS Identity and Access Management (IAM) console.
In the navigation pane, choose Roles.
Select Create role
For Select type of trusted entity, choose AWS service and EC2 from Choose a use case
Click Next: Permissions at the bottom
Choose Create policy
Choose the JSON tab
Type or paste below JSON policy. Make sure you are replacing the resource name.
...
Property | Value | Description |
Secret Access Key | na | Configure it as ”na” |
Secret Access ID | na | Configure it as ”na” |
S3 Bucket/Log Group(s)/SQS Queue URL | <Resource Name> | Provide S3 bucket name, Log Group Name(s) or SQS URL based on logging source |
Region | <Region> | Enter region (E.g.: us-west-2) |
Logging Source | <Select logging Source> | Select logging Source from dropdown S3, CloudWatch or SQS |
Bucket Prefix Path(s) | <PrefixPath> | Incase of Logging Source as S3 example: /AWSLogs/Account-ID/CloudTrail/region, |
Use case 2: Log Collection using cross AWS account (Where LCP is hosted in MDR SOC AWS account and logging resource is in Customer AWS account)
Follow these steps:
Configure IAM role in customer AWS account (Account A) with appropriate permissions to the resource (customer side configuration)
Configure IAM role in MDR SOC AWS account (Account B) to access customer resource (MDR Side Configuration)
...
Below are the resource policies which will get attached to "ACNMSSCrossAccountRole" based on the logging resources selected in the template
Configure IAM role in MDR SOC AWS account (Account B) to access customer resource (MDR Side Configuration)
Sign in to the AWS Management Console with Account B
Open the IAM console.
From the navigation pane, choose Roles.
Choose to Create role.
For Select type of trusted entity, choose AWS service.
For Choose the service that will use this role, choose EC2
Choose Next: Permissions.
Choose Next: Tags.
You can add optional tags to the role. Or, you can leave the fields blank, and then choose Next: Review.
For the Role name, enter a name for the role.
Choose to Create role.
From the list of roles, choose the role that you just created.
Choose to Add inline policy, and then choose the JSON view.
...