This action will be described in a later step. |
To learn more about permissions in AMP, see Roles and Permissions. |
|
Armor does not provide support for using AWS CloudFormation to set up AWS GuardDuty resources in AWS GovCloud (US). |
According to AWS, "An IAM user is a resource in IAM that has associated credentials and permissions. An IAM user can represent a person or an application that uses its credentials to make AWS requests. This is typically referred to as a service account." |
{ "Version": "2012-10-17", "Statement": [ { "Action": [ "logs:Describe*", "logs:Get*", "logs:List*", "logs:StartQuery", "logs:StopQuery", "logs:TestMetricFilter", "logs:FilterLogEvents" ], "Resource": [ "arn:aws:logs:*:*:log-group:Armor_GuardDuty_Log_Group", "arn:aws:logs:*:*:log-group:Armor_GuardDuty_Log_Group:*", "arn:aws:logs:*:*:log-group:Armor_GuardDuty_Log_Group:*:*" ], "Effect": "Allow" } ] } |
AWS is in the process of updating the screens in their AWS console. As a result, there are two versions of the AWS CloudFormation screen; however, this step is compatible with both views. |
In a later step, you will add this information to your Armor Management Portal (AMP) account. |
To learn more about your keys, especially how to create a key, please visit AWS's documentation site. |
In the window that appears, click the link to directly access your AWS account with Armor's CloudFormation stackset or stack template already imported.
Multiple regions | To collect and send logs from multiple regions, click this link. Afterwards, see Step 4. Armor and AWS recommend that you configure your account to send logs from all regions. | |
---|---|---|
Single region | To collect and send logs from a single region, click this link. Afterwards, see Step 5. | https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=guard-duty-forwarding&templateURL=https:%2F%2Fs3-us-west-2.amazonaws.com%2Flogs.armor.com%2Fguard-duty-forwarding%2Fsetup-guard-duty-forwarding.yml |
If you only want to send logs from one region, then see (Optional) Step 5: Configure the AWS GuardDuty CloudFormation Stack Template. |
AWS is in the process of updating the screens in their AWS console. As a result, there are two versions of the AWS CloudFormation screen. Review the following table to understand your particular view, and then review the appropriate option.
Option 1: Old View
|
TroubleshootingIf you are having issues adding a remote collector to an AWS GuardDuty remote device, consider that:
|
This section only applies to single stacks, not stack sets. |
Comprehensive threat identification
Amazon GuardDuty identifies threats by continuously monitoring the network activity, data access patterns, and account behavior within the AWS environment. GuardDuty comes integrated with up-to-date threat intelligence feeds from AWS, CrowdStrike, and Proofpoint. Threat intelligence coupled with machine learning and behavior models help you detect activity such as crypto-currency mining, credential compromise behavior, unauthorized and unusual data access, communication with known command-and-control servers, or API calls from known malicious IPs.
Strengthens security through automation
In addition to detecting threats, Amazon GuardDuty also makes it easy to automate how you respond to threats, reducing your remediation and recovery time. GuardDuty can perform automated remediation actions by leveraging Amazon CloudWatch events and AWS Lambda. GuardDuty security findings are informative and actionable for security operations. The findings include the affected resource's details and attacker information, such as IP address and geo-location.
Enterprise scale and central management
Amazon GuardDuty provides multi-account support using AWS Organizations, so you can enable GuardDuty across all of your existing and new accounts. Your security team can aggregate your organization's findings across accounts into a single GuardDuty administrator account for easier management. The aggregated findings are also available through CloudWatch Events, making it easy to integrate with an existing enterprise event management system.