Anchor |
---|
| Pre-deployment considerations |
---|
| Pre-deployment considerations |
---|
|
Pre-Deployment Considerations
...
Update Your AWS Permissions
...
Note |
---|
According to AWS, "An IAM user is a resource in IAM that has associated credentials and permissions. An IAM user can represent a person or an application that uses its credentials to make AWS requests. This is typically referred to as aservice account." |
Option 1: For existing AWS service accounts
...
- In the AWS console, in Amazon S3 URL, verify that the displayed link is: https://s3-us-west-2.amazonaws.com/logs.armor.com/guard-duty-forwarding/setup-guard-duty-forwarding.yml
- Click Next.
- (Optional) In StackSet name, enter a descriptive name for the StackSet.
- This name must begin with a letter, and can only contain letters, numbers, and hyphens.
- (Optional) In Log Retention In Days, specify the number of days to maintain logs.
- By default, Armor has configured 3 days.
- Click Next.
- In Deploy stacks in accounts, enter the AWS account number for the AWS service account.
- This is the same AWS service account number that you previously entered in AMP.
- You must remove any dashes or hyphens ( - ).
- Under Specify regions, under Available regions, click Add all.
- Click Next.
- Click Next.
- At the bottom of the screen, mark the box to accept the terms, and then click Create.
- Skip Step 5, and proceed to Step 6.
...
Expand |
---|
AWS is in the process of updating the screens in their AWS console. As a result, there are two versions of the AWS CloudFormation screen. Review the following table to understand your particular view, and then review the appropriate option. View | Sample Image |
---|
Old View | | New View | |
Option 1: Old View- In the AWS console, in the top menu, on the right side, select the desired region.
- In Specify an Amazon S3 template URL, verify that the displayed link is: https://s3-us-west-2.amazonaws.com/logs.armor.com/guard-duty-forwarding/setup-guard-duty-forwarding.yml
- Click Next.
- (Optional) In Stack name, enter a descriptive name for the stack.
- This name must begin with a letter, and can only contain letters, numbers, and hyphens.
- (Optional) In Log Retention In Days, specify the number of days to maintain logs.
- Click Next.
- (Optional) If required by your organization, under Tags, add your organization's tags to the CloudFormation deployment.
- (Optional) If required by your organization, under Permissions, in the drop-down menu, select IAM role ARN, and then in the corresponding field, enter AWSCloudFormationStackSetExecutionRole.
- Click Next.
- At the bottom of the screen, mark the box to accept the terms, and then click Create.
Option 2: New View
- In the AWS console, in the top menu, on the right side, select the desired region for log collection.
- In Amazon S3 URL, verify that the displayed link is: https://s3-us-west-2.amazonaws.com/logs.armor.com/guard-duty-forwarding/setup-guard-duty-forwarding.yml
- Click Next.
- (Optional) In Stack name, enter a descriptive name.
- This name must begin with a letter, and can only contain letters, numbers, and hyphens.
- (Optional) In Number of days AWS GuardDuty Findings will be retained inside of AWS Log Group, specify the number of days to maintain logs.
- By default, Armor has configured 3 days.
- Click Next.
- Click Next.
- At the bottom of the screen, mark the box to accept the terms, and then click Create stack.
|
...