Accenture MDR Quick Start Guide in Configuring IAM User and KMS Key Policies

This quick start guide will help Accenture MDR customers in Configuring IAM User and KMS Key Policies required for AWS collectors.

The document includes the following topics:

Note: If using role-based access control(RBAC), no need to configure IAM user policies. That is taken care of by cloud formation template. Configure only KMS Key Policies if the SQS queue is encrypted.

Note: Please replace placeholders<.> with the actual values.

IAM User Policies

Following IAM user policies are required for S3 and SQS if using SQS(S3 via SQS) as a log collection method.

IAM User Permission for S3:

{ "Effect": "Allow", "Action": ["s3:ListBucket","s3:GetObject"], "Resource": ["arn:aws:s3:::<bucketname>", "arn:aws:s3:::<bucketname>/*"], "Condition": {} }

IAM User Permission for SQS:

{ “Action”: [ “sqs:GetQueueAttributes”, “sqs:GetQueueUrl”, “sqs:ReceiveMessage”, “sqs:DeleteMessage”, “sqs:ListQueues" ], “Effect”: “Allow”, “Resource”: “arn:aws:sqs:<region>:<accountID>:<SQSName>” }

Following IAM user policy is required for cloudwatch logs if using CloudWatchLog as a log collection method:

IAM User Permission for cloudwatch:

{ "Effect": "Allow", "Action": [ "logs:describeLogGroups", "logs:describeLogStreams", "logs:filterLogEvents", "logs:getLogEvents" ], "Resource": [ "arn:aws:logs:<region>:<accountID>:<log-group>:<specificLogGroupName>" ] }

 

Following IAM user policy is required when S3 or/and SQS is encrypted.

Note: If separate keys are used to encrypt S3 and SQS, add the below policy twice with the separate key resources. If the same key is used to encrypt S3 and SQS, add the below policy only once.

IAM User Permission for KMS:

 

KMS Key Policies:

Following KMS key policy is required when SQS is encrypted.

Note: Replace <KEY_ARN> placeholder in the below policy with the actual key ARN used to encrypt the SQS.

KMS Key Permission for S3 to access encrypted SQS:

 

Legal Notice

Copyright © 2021 Accenture. All rights reserved.

Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.

The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.