AWS VPC Flow

About the Device

A virtual private cloud (VPC) is a virtual network dedicated to your AWS account. You can launch your AWS resources, such as Amazon EC2 instances, into your VPC. Amazon VPC provides features like Security groups, Network access control lists (ACLs) and Flow logs. "VPC Flow Logs" is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC.

Device Information

 Entity

Particulars

 Entity

Particulars

Vendor Name

Amazon Web Services

Product Name

VPC Flow 

Type of Device

Cloud

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log Collection Method

Data Source

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log Collection Method

Data Source

AWS VPC Flow

AWS_VPC_FLOW

(Raw log telemetry)

API Pull

C2C - Storage

C2C - Push

Feed management API  |  Google Security Operations  |  Google Cloud

Device Configuration

Please follow the steps below to enable raw log telemetry.

Prerequisite:

Creation of flow logs for network interface, subnets and VPCs

After you have created and configured your Amazon S3 bucket, you can create flow logs for your network interfaces, subnets, and VPCs.

  1. To create a flow log for a network interface: 

    1. Open the Amazon EC2 console

    2. In the navigation pane, choose Network Interfaces

    3. Select one or more network interfaces

    4. Choose ActionsCreate flow log

    5. Configure the flow log settings [Please see, Step 4]

  2. To create a flow log for a subnet: 

    1. Open the Amazon VPC console

    2. In the navigation pane, choose Subnets.

    3. Select one or more subnets.

    4. Choose ActionsCreate flow log.

    5. Configure the flow log settings [Please see, Step 4]

  3. To create a flow log for a VPC: 

    1. Open the Amazon VPC console

    2. In the navigation pane, choose your VPCs.

    3. Select one or more VPCs.

    4. Choose ActionsCreate flow log.

    5. Configure the flow log settings [Please see, Step 4]

  4. To configure flow log settings: 

    1. Select All in Filter

image-20240322-092809.png

b. Select 1 minute for Maximum aggregation interval

image-20240322-092952 (1).png

c. Select Send to an S3 bucket or Send to Amazon Data Firehose for Destination.

d. Based on your selection, Provide S3 bucket ARN or select Amazon Firehose stream name from dropdown [Please see, prerequisites]

e. Select AWS default format

 

If you want to use Custom format, you can also use that, but the format should be in below mentioned sequential order. Both log formats are supported by Adaptive MxDR.

f. Select Text (default) in Log file format

g. Don’t enable Hive-compatible S3 prefixes

h. Select Every 1 hour (60 mins) in partition logs by time.

i. To add a tag to the flow log [optional config] - if you want to add a tag, select Add new tag and specify the tag key and value.

j. Click Create Flow Log

Create SQS and attach with S3

If you have selected S3 bucket as destination in above configuration, create SQS and attach with S3, please refer https://mdrkb.atlassian.net/wiki/spaces/AAMDARCQSG/pages/468746342

 Integration Parameter details: Please refer below page to get credentials for Chronicle feed.
Get Credentials for AWS Storage

IAM user policies: Please refer below page to check required IAM user policies:

IAM User and KMS Key Policies Required for AWS

Integration parameters

 SQS:

Property

Default value

Description

Property

Default value

Description

REGION

Yes

Select the region of your S3 bucket

QUEUE NAME

Yes

The SQS queue name.

ACCOUNT NUMBER

Yes

The account number for the SQS queue and S3 bucket.

QUEUE ACCESS KEY ID

Yes

This is the 20 character ID associated with your Amazon IAM account.

QUEUE SECRET ACCESS KEY

Yes

This is the 40 character access key associated with your Amazon IAM account.

SOURCE DELETION OPTION

Yes

Whether to delete source files after they have been transferred to Chronicle. This reduces storage costs. Valid values are:

  • SOURCE_DELETION_NEVER: Never delete files from the source.

  • SOURCE_DELETION_ON_SUCCESS:Delete files and empty directories from the source after successful ingestion.

  • SOURCE_DELETION_ON_SUCCESS_FILES_ONLY:Delete files from the source after successful ingestion.

S3 BUCKET ACCESS KEY ID

No

This is the 20 character ID associated with your Amazon IAM account. Only specify if using a different access key for the S3 bucket.

S3 BUCKET SECRET ACCESS KEY

No

This is the 40 character access key associated with your Amazon IAM account. Only specify if using a different access key for the S3 bucket.

ASSET NAMESPACE

No

To assign an asset namespace to all events that are ingested from a particular feed, set the "namespace" field within details. The namespace field is a string.

 Amazon Data Firehose:

Configure Amazon Data Firehose on Google Chronicle instance and copy a Endpoint URL & Secret key.

About Accenture:
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. These capabilities, together with our culture of shared success and commitment to creating 360° value, enable us to help our clients succeed and build trusted, lasting relationships. We measure our success by the 360° value we create for our clients, each other, our shareholders, partners and communities. Visit us at www.accenture.com.

About Accenture Security
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.

Legal notice: Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. This document is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.