Accenture MDR Quick Start Guide for Amazon Web Services (AWS) Web Application Firewall (WAF)

This quick start guide will help Accenture MDR customers configure AWS WAF to send logs to the Log collection Platform (LCP).

This document includes the following topics:

Supported Versions

A list of supported versions is available in the Accenture MDR Supported Products List document (Accenture_MDR_Supported_Products_List.xlsx) which can be found in Accenture MDR Portal.

Port Requirements

Table 1-1: Port requirements for LCP communication.Ā 

Ā  Ā  Ā  Ā  Ā  Ā  Ā Source

Ā  Ā  Ā Destination

Ā  Ā  Ā  Port

Ā  Ā  Description

LCP

SQS

443 (TCP)

Default port

Configuring AWS WAF

MxDR supports log collection using S3 via SQS.

Prerequisite:

Ā 

Device Configuration Steps:

Ā 1. Enable Logging for WEB ACL to S3 Bucket.

  • Log in to the AWS Console.

  • Navigate to AWS WAF and select Web ACL from side pane.

  • Select the Web ACL's from the list and click Enable Logging button.

Ā Note : Admin access required for perform the Logging changes

  • If Kinesis Firehose stream is already created then select the Amazon Kinesis Firehose stream which is configured as the desired S3 Bucket for log storage.Ā 

  • If it is not created, follow steps from Creating Amazon Kinesis Firehose

  • In order to send the logs to S3 Bucket, we need to create an Amazon Kinesis Data Firehose.Ā 

2. Creating Amazon Kinesis Firehose

  • Navigate to Kinesis Dashboard and click on Create Delivery stream.

  • Provide the New delivery stream name

  • Select Direct PUT or other SourcesĀ from Source.

  • Click Next.

  • Keep Record Transformation and Record format conversion as Disabled and click Next.

  • Select Destination as Amazon S3.

  • Select the S3 Destination bucket name from drop-down.

Note: Leave the S3 Prefix and Error Prefix configuration textbox as unchanged.

  • Use the default preset for Buffer Condition Settings.

  • Set S3 Compression and S3 Encryption as Disabled

  • Select Enabled for Error logging.

  • Add the IAM role inorder to enable the Firehose to Stream logs to S3.

a. Click Create new or choose.ā€‹

b. Select Create a new IAM Role fromĀ IAM role drop-down menu.

c. Add theĀ Role Name as firehose_delivery_role.

d. Keep the Policy name to Create a new Role policy and click Allow.

Note: It will automatically create a Policy and enable it. The policy name will be appear similar to oneClick_firehose_delivery_role_12312342123

e. Click Next and review the configurations on the Review page.

f. Click Create Delivery Stream to create the Kinesis Firehose Delivery Stream.ā€‹

3. Select the createdĀ Firehose Data Stream fromĀ Amazon Kinesis Data Firehose drop-down menu and click Create.

4. Logging will be enabled once it is created.

To create SQS and attach it with S3 please refer https://mdrkb.atlassian.net/wiki/x/AQCeEQ

Note: Please refer below page to check required IAM user and KMS Key policies for S3, SQS and KMS

https://mdrkb.atlassian.net/wiki/x/hoCdEQ

Ā 

Note: Below are the URL details which we need to allow for connectivity (Please identify URLs by referring AWS document according to your services and regions):

IAM: For any logging source IAM URL should be allowed

https://docs.aws.amazon.com/general/latest/gr/iam-service.html

S3: For S3 or SQS logging source, S3 URL should be allowed.

https://docs.aws.amazon.com/general/latest/gr/s3.html

SQS: For SQS logging source, SQS URL should be allowed.

Ā 

LCP Configuration Parameters

MxDR supports log collection using role based access control (RBAC) or access key ID and secret method.

  • To create access key ID and secret please refer

  • To support log collection using RBAC please refer

Ā 

Table 1-2: The AWS WAF event collector (API - 3896) properties to be configured by MDR are given in table.

Property

Access Key and Secret

RBAC

Property

Access Key and Secret

RBAC

Region

Enter region (Eg: us-west-2)

Enter region (Eg: us-west-2)

AWS Access Key ID Or Role ARN

Enter Access Key

Provide Role ARN

AWS Secret Access Key Or External ID

Enter Secret

Enter external ID

Logging Source

SQS

SQS

S3 Bucket/Log Group(s)/SQS Queue URL

Provide SQS URL

Provide SQS URL

Bucket Prefix Path(s)

Leave Empty

Leave Empty

Ā 

Legal Notice

Copyright Ā© 2021 Accenture. All rights reserved.

Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.

The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.