Accenture MDR Quick Start Guide for Amazon Web Services (AWS) GuardDuty Generic
This quick start guide will help Accenture MDR customers configure Amazon Web Services (AWS) GuardDuty to allow log collection from the Log Collection Platform (LCP).
The document includes the following topics:
Supported Versions
A list of supported versions is available in the Accenture MDR Supported Products List document (Accenture_MDR_Supported_Products_List.xlsx) which can be found in Accenture MDR Portal.
Port Requirements
Table 1-1: Port requirements for LCP communication.
Source | Destination | Port | Description |
LCP | SQS | TCP/443 | Default Port |
Configuring AWS GuardDuty
MxDR supports log collection using S3 via SQS.
Prerequisite:
S3 bucket is created.Ā Please refer the following page to create a S3 bucket.Ā https://docs.aws.amazon.com/AmazonS3/latest/userguide/creating-bucket.html
KMS Key is created. Please refer the following page to create a KMS Key. https://docs.aws.amazon.com/kms/latest/developerguide/asymm-create-key.html
GuardDuty encrypts the findings data in your bucket by using an AWS KMS key. GuardDuty should have permission to access KMS key.
Please refer the following page to grant KMS key permission to GuardDuty:Ā https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_exportfindings.html
Sample KMS Policy
{
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā "Sid": "Allow GuardDuty to encrypt findings",
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā "Effect": "Allow",
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā "Principal": {
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā "Service": "guardduty.<AWS_REGION>.amazonaws.com"
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā },
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā "Action": [
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā "kms:Encrypt",
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā "kms:GenerateDataKey"
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā ],
Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā "Resource": "<KEY_ARN>"
Ā Ā Ā Ā Ā Ā Ā Ā } |
Note: Please replace <AWS_REGION>, <KEY_ARN> placeholders with actual values.
Ā
Configuration Steps:
Please follow below steps to configure AWS GuardDuty:
Log in to the AWS console.
2. Search for GuardDuty.
Ā
3. Select Settings.
Ā
4. In finding export optionĀ
a. select the frequency from the drop down for update finding: Update CWE and S3 every 15 minutes (Note: this frequency selection is for updated findings only, new findings will be exported in 5 minutes from the creation time. )
b. Select the S3 bucket in which you want to export GuardDuty findings. You can select existing bucket which was created as per pre-requisite.
c. Provide the log file prefix if you wish to give any.Ā
d. Select KMS encryption and select key from dropdown.
e. Click on Save button to save the settings
5. Once logs are being stored in log files in S3, we have to create SQS queue.Ā
6. To create SQS and attach it with S3 please refer https://mdrkb.atlassian.net/wiki/x/AQCeEQ
Ā
Note: Please refer below page to check required IAM user and KMS Key policies for S3, SQS and KMS
https://mdrkb.atlassian.net/wiki/x/hoCdEQ
Ā
Note: Below are the URL details which we need to allow for connectivity (Please identify URLs by referring AWS document according to your services and regions):
IAM: For any logging source IAM URL should be allowed
S3: For S3 or SQS logging source, S3 URL should be allowed.
SQS: For SQS logging source, SQS URL should be allowed.
LCP Configuration ParametersĀ
MxDR supports log collection using role based access control (RBAC) or access key ID and secret method.
To create access key ID and secret please refer
To support log collection using RBAC please refer
Table 1-2: The AWS GuardDuty Generic event collector (API - 3911) properties to be configured by MDR are shown in the table.
Property | Access Key and Secret Access | RBAC |
Region | Enter region (Eg: us-west-2) | Enter region (Eg: us-west-2) |
AWS Access Key ID Or Role ARN | Enter Access Key | Provide Role ARN |
AWS Secret Access Key Or External ID | Enter Secret | Enter external ID |
Logging Source | SQS | SQS |
S3 Bucket/Log Group(s)/SQS Queue URL | Provide SQS URL | Provide SQS URL |
Bucket Prefix Path(s) | Leave Empty | Leave Empty |
Ā
Legal Notice
Copyright Ā© 2021 Accenture. All rights reserved.
Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.