Skip to content

Commit 61fb150

Browse files
(docs)tweak faq (#943)
* improve faq 1.6.15 * Update faq.md Co-authored-by: James Kierstead <archikierstead@users.noreply.github.com>
1 parent 1cc60b2 commit 61fb150

File tree

3 files changed

+27
-16
lines changed

3 files changed

+27
-16
lines changed
352 KB
Loading

docs/architectures/pbmm/log-file-locations.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
1-
# AWS SEA Central Logging Structures
1+
# AWS SEA Central Logging Implementation and File Structures
2+
3+
The following diagram details the ASEA central logging implementation:
4+
5+
![Logging](../images/ASEA-Logging-Arch.png)
6+
27

38
## Accelerator Central Logging Buckets:
49

docs/faq/faq.md

Lines changed: 21 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@
4747
- [1.6.12. I've noticed CloudTrail logs and in certain situation VPC flow logs are stored in the centralized log-archive account logging bucket twice?](#1612-ive-noticed-cloudtrail-logs-and-in-certain-situation-vpc-flow-logs-are-stored-in-the-centralized-log-archive-account-logging-bucket-twice)
4848
- [1.6.13. I need a Route53 Private Hosted Zone in my workload account. How shall I proceed?](#1613-i-need-a-route53-private-hosted-zone-in-my-workload-account-how-shall-i-proceed)
4949
- [1.6.14. How do I create a role which has read access to the log-archive bucket to enabling log forwarding to my favorite SIEM solution?](#1614-how-do-i-create-a-role-which-has-read-access-to-the-log-archive-bucket-to-enabling-log-forwarding-to-my-favorite-siem-solution)
50-
- [1.6.15. How do I create a role for use by Azure Sentinel?](#1615-how-do-i-create-a-role-for-use-by-azure-sentinel)
50+
- [1.6.15. How do I create a role for use by Azure Sentinel using the new S3 Connector method?](#1615-how-do-i-create-a-role-for-use-by-azure-sentinel-using-the-new-s3-connector-method)
5151
- [1.6.16. Does the ASEA include a full SIEM solution?](#1616-does-the-asea-include-a-full-siem-solution)
5252
- [1.7. Network Architecture](#17-network-architecture)
5353
- [1.7.1. We want to securely connect our on-premises networks/datacenters to our AWS Cloud PBMM tenancy, what does AWS you recommend?](#171-we-want-to-securely-connect-our-on-premises-networksdatacenters-to-our-aws-cloud-pbmm-tenancy-what-does-aws-you-recommend)
@@ -612,12 +612,13 @@ Side note: CloudTrail S3 data plane logs are enabled at the Organizational level
612612

613613
### 1.6.13. I need a Route53 Private Hosted Zone in my workload account. How shall I proceed?
614614

615-
The workload account requires a temporary local VPC in order to create the Private Hosted Zone (PHZ)
615+
The workload account requires creating a temporary local VPC before creating the Private Hosted Zone (PHZ). Creating a PHZ in Route53 requires assocciation with a VPC. You cannot specify a shared VPC when creating the PHZ, hence the need for this workaround.
616616

617-
<u>**Create in workload account VPC**</u>
617+
<u>**Create the temporary workload account VPC**</u>
618618

619-
You can create the temporary VPC at account creation via ASEA config (prefered way) by adding a config similar to this one on the workload account definition.
620-
If you don't use the ASEA config you will need to assume the proper ASEA elevated role in the workload account in order to create the VPC.
619+
You can create the temporary VPC during AWS account creation via the ASEA config (prefered way). Insert the "vpc" JSON object like shown below when using the ASEA config to create an AWS account.
620+
621+
If you don't use the ASEA config you will need to assume the proper ASEA elevated IAM role in the workload account in order to create the VPC manually.
621622

622623
```
623624
"mydevacct": {
@@ -642,9 +643,9 @@ If you don't use the ASEA config you will need to assume the proper ASEA elevate
642643
}
643644
```
644645

645-
<u>**Create in workload account Private Hosted Zone**</u>
646+
<u>**Create in the workload account a Private Hosted Zone**</u>
646647

647-
From the workload account:
648+
Using an IAM role assumed in the workload account:
648649

649650
List the VPCs.
650651

@@ -673,7 +674,7 @@ For example, the value is `Z0123456NWOWQ4HNN40U` from `"Id": "/hostedzone/Z01234
673674

674675
<u>**Create an authorization to associate with this new zone**</u>
675676

676-
Still in the workload account; create an association request authorization to allow the shared VPC to associate with this new zone.
677+
While still in the workload account; you need to create an association request authorization to allow the shared VPC to associate with this newly created Route53 PHZ.
677678

678679
```
679680
aws route53 create-vpc-association-authorization --hosted-zone-id <ZONE_ID> --vpc VPCRegion=<SHARED_VPC_REGION>,VPCId=<SHARED_VPC_ID>
@@ -685,9 +686,9 @@ Insert the proper values for:
685686
- `<SHARED_VPC_REGiON>`
686687
- `<SHARED_VPC_ID>`
687688

688-
<u>**Associate Hosted zone**</u>
689+
<u>**Confirm the association request for the shared vpc**</u>
689690

690-
In the SharedNetwork account associate the Private Hosted Zone from the workload account.
691+
After switching to an IAM role in the SharedNetwork account associate the Private Hosted Zone from the workload account.
691692

692693
```
693694
aws route53 associate-vpc-with-hosted-zone --hosted-zone-id <ZONE_ID> --vpc VPCRegion=<SHARED_VPC_REGION>,VPCId=<SHARED_VPC_ID>
@@ -701,7 +702,7 @@ Insert the proper values for:
701702

702703
<u>**Validate Association and clean-up**</u>
703704

704-
In the workload account, validate the association using the below command. You should see two VPCs attache. The local vpc and the shared vpc.
705+
Back in the workload account and assuming its IAM role, validate the association using the below command. You should see two VPCs attache. The local vpc and the shared vpc.
705706

706707
```
707708
aws route53 get-hosted-zone --id <ZONE_ID>
@@ -759,7 +760,7 @@ As we generally recommend the SIEM be deployed into the Operations account, add
759760
}
760761
```
761762

762-
### 1.6.15. How do I create a role for use by Azure Sentinel?
763+
### 1.6.15. How do I create a role for use by Azure Sentinel using the new S3 Connector method?
763764

764765
This process is very similar to FAQ #1.6.14, except we need to allow for a cross-cloud role assumption. This will be done in the Log Archive account, instead of the Operations account.
765766

@@ -808,15 +809,16 @@ The above role uses a custom trust policy, and also requires a file of the name
808809

809810
- The IAM account number listed above is a value provided by Microsoft in their documentation (hard-coded to the same value for all customers).
810811
- The value of `sts:ExternalId`, shown as `{CUSTOMER-VALUE-HERE}` above, must be replaced with the ID of the Log Analytics Workspace in your Azure tenant.
812+
- This information is based on the requirements published [here](https://docs.microsoft.com/en-us/azure/sentinel/connect-aws?tabs=s3#create-an-aws-assumed-role-and-grant-access-to-the-aws-sentinel-account) as of 2022-03-10.
811813

812814
### 1.6.16. Does the ASEA include a full SIEM solution?
813815

814-
We've found a diverse set of needs and requirements across our customer base. The ASEA:
816+
We've found a diverse set of differing customer needs and requirements across our customer base. The ASEA:
815817

816818
- enables AWS security services like Amazon GuardDuty (a Cloud native IDS solution) and centralizes the consoles of these tools in the Security account;
817819
- audits the entire environment for compliance and consolidates findings from AWS security services in the Security Hub console in the Security account;
818-
- sends prioritized email alerts for Security Hub Findings and defined CloudWatch Alarms;
819-
- centralizes logs in a central bucket in the Log Archive account;
820+
- sends prioritized email alerts for Security Hub Findings, Firewall Manager alerts and customizable CloudWatch Alarms;
821+
- centralizes logs across the environment in a central bucket in the Log Archive account;
820822
- in addition, retains logs locally in CloudWatch Logs for simple query using CloudWatch Insights.
821823

822824
This makes it extremely simple to layer a customers preferred SIEM solution on top of the ASEA, enabling easy consumption of the comprehensive set of collected logs and security findings.
@@ -827,6 +829,10 @@ While not a part of the ASEA, we've made the [SIEM on Amazon OpenSearch Service]
827829

828830
This independent solution can easily and quickly be deployed on top of the ASEA by following the documentation and using the scripts available [here](https://github.com/aws-samples/aws-secure-environment-accelerator/tree/main/reference-artifacts/Add-ons/opensiem). This process takes less than an hour.
829831

832+
The overall logging architecture is represented in this diagram:
833+
834+
![Logging](../architectures/images/ASEA-Logging-Arch.png)
835+
830836
## 1.7. Network Architecture
831837

832838
### 1.7.1. We want to securely connect our on-premises networks/datacenters to our AWS Cloud PBMM tenancy, what does AWS you recommend?

0 commit comments

Comments
 (0)