You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/faq/faq.md
+21-15Lines changed: 21 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@
47
47
-[1.6.12. I've noticed CloudTrail logs and in certain situation VPC flow logs are stored in the centralized log-archive account logging bucket twice?](#1612-ive-noticed-cloudtrail-logs-and-in-certain-situation-vpc-flow-logs-are-stored-in-the-centralized-log-archive-account-logging-bucket-twice)
48
48
-[1.6.13. I need a Route53 Private Hosted Zone in my workload account. How shall I proceed?](#1613-i-need-a-route53-private-hosted-zone-in-my-workload-account-how-shall-i-proceed)
49
49
-[1.6.14. How do I create a role which has read access to the log-archive bucket to enabling log forwarding to my favorite SIEM solution?](#1614-how-do-i-create-a-role-which-has-read-access-to-the-log-archive-bucket-to-enabling-log-forwarding-to-my-favorite-siem-solution)
50
-
-[1.6.15. How do I create a role for use by Azure Sentinel?](#1615-how-do-i-create-a-role-for-use-by-azure-sentinel)
50
+
-[1.6.15. How do I create a role for use by Azure Sentinel using the new S3 Connector method?](#1615-how-do-i-create-a-role-for-use-by-azure-sentinel-using-the-new-s3-connector-method)
51
51
-[1.6.16. Does the ASEA include a full SIEM solution?](#1616-does-the-asea-include-a-full-siem-solution)
-[1.7.1. We want to securely connect our on-premises networks/datacenters to our AWS Cloud PBMM tenancy, what does AWS you recommend?](#171-we-want-to-securely-connect-our-on-premises-networksdatacenters-to-our-aws-cloud-pbmm-tenancy-what-does-aws-you-recommend)
@@ -612,12 +612,13 @@ Side note: CloudTrail S3 data plane logs are enabled at the Organizational level
612
612
613
613
### 1.6.13. I need a Route53 Private Hosted Zone in my workload account. How shall I proceed?
614
614
615
-
The workload account requires a temporary local VPC in order to create the Private Hosted Zone (PHZ)
615
+
The workload account requires creating a temporary local VPC before creating the Private Hosted Zone (PHZ). Creating a PHZ in Route53 requires assocciation with a VPC. You cannot specify a shared VPC when creating the PHZ, hence the need for this workaround.
616
616
617
-
<u>**Create in workload account VPC**</u>
617
+
<u>**Create the temporary workload account VPC**</u>
618
618
619
-
You can create the temporary VPC at account creation via ASEA config (prefered way) by adding a config similar to this one on the workload account definition.
620
-
If you don't use the ASEA config you will need to assume the proper ASEA elevated role in the workload account in order to create the VPC.
619
+
You can create the temporary VPC during AWS account creation via the ASEA config (prefered way). Insert the "vpc" JSON object like shown below when using the ASEA config to create an AWS account.
620
+
621
+
If you don't use the ASEA config you will need to assume the proper ASEA elevated IAM role in the workload account in order to create the VPC manually.
621
622
622
623
```
623
624
"mydevacct": {
@@ -642,9 +643,9 @@ If you don't use the ASEA config you will need to assume the proper ASEA elevate
642
643
}
643
644
```
644
645
645
-
<u>**Create in workload account Private Hosted Zone**</u>
646
+
<u>**Create in the workload account a Private Hosted Zone**</u>
646
647
647
-
From the workload account:
648
+
Using an IAM role assumed in the workload account:
648
649
649
650
List the VPCs.
650
651
@@ -673,7 +674,7 @@ For example, the value is `Z0123456NWOWQ4HNN40U` from `"Id": "/hostedzone/Z01234
673
674
674
675
<u>**Create an authorization to associate with this new zone**</u>
675
676
676
-
Still in the workload account; create an association request authorization to allow the shared VPC to associate with this new zone.
677
+
While still in the workload account; you need to create an association request authorization to allow the shared VPC to associate with this newly created Route53 PHZ.
In the workload account, validate the association using the below command. You should see two VPCs attache. The local vpc and the shared vpc.
705
+
Back in the workload account and assuming its IAM role, validate the association using the below command. You should see two VPCs attache. The local vpc and the shared vpc.
705
706
706
707
```
707
708
aws route53 get-hosted-zone --id <ZONE_ID>
@@ -759,7 +760,7 @@ As we generally recommend the SIEM be deployed into the Operations account, add
759
760
}
760
761
```
761
762
762
-
### 1.6.15. How do I create a role for use by Azure Sentinel?
763
+
### 1.6.15. How do I create a role for use by Azure Sentinel using the new S3 Connector method?
763
764
764
765
This process is very similar to FAQ #1.6.14, except we need to allow for a cross-cloud role assumption. This will be done in the Log Archive account, instead of the Operations account.
765
766
@@ -808,15 +809,16 @@ The above role uses a custom trust policy, and also requires a file of the name
808
809
809
810
- The IAM account number listed above is a value provided by Microsoft in their documentation (hard-coded to the same value for all customers).
810
811
- The value of `sts:ExternalId`, shown as `{CUSTOMER-VALUE-HERE}` above, must be replaced with the ID of the Log Analytics Workspace in your Azure tenant.
812
+
- This information is based on the requirements published [here](https://docs.microsoft.com/en-us/azure/sentinel/connect-aws?tabs=s3#create-an-aws-assumed-role-and-grant-access-to-the-aws-sentinel-account) as of 2022-03-10.
811
813
812
814
### 1.6.16. Does the ASEA include a full SIEM solution?
813
815
814
-
We've found a diverse set of needs and requirements across our customer base. The ASEA:
816
+
We've found a diverse set of differing customer needs and requirements across our customer base. The ASEA:
815
817
816
818
- enables AWS security services like Amazon GuardDuty (a Cloud native IDS solution) and centralizes the consoles of these tools in the Security account;
817
819
- audits the entire environment for compliance and consolidates findings from AWS security services in the Security Hub console in the Security account;
818
-
- sends prioritized email alerts for Security Hub Findingsand defined CloudWatch Alarms;
819
-
- centralizes logs in a central bucket in the Log Archive account;
820
+
- sends prioritized email alerts for Security Hub Findings, Firewall Manager alerts and customizable CloudWatch Alarms;
821
+
- centralizes logs across the environment in a central bucket in the Log Archive account;
820
822
- in addition, retains logs locally in CloudWatch Logs for simple query using CloudWatch Insights.
821
823
822
824
This makes it extremely simple to layer a customers preferred SIEM solution on top of the ASEA, enabling easy consumption of the comprehensive set of collected logs and security findings.
@@ -827,6 +829,10 @@ While not a part of the ASEA, we've made the [SIEM on Amazon OpenSearch Service]
827
829
828
830
This independent solution can easily and quickly be deployed on top of the ASEA by following the documentation and using the scripts available [here](https://github.com/aws-samples/aws-secure-environment-accelerator/tree/main/reference-artifacts/Add-ons/opensiem). This process takes less than an hour.
829
831
832
+
The overall logging architecture is represented in this diagram:
0 commit comments