Skip to content

DOCS-107 - CIS for AWS CloudQuery - onboarding improvements #4209

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 53 commits into from
Oct 21, 2024
Merged
Show file tree
Hide file tree
Changes from 16 commits
Commits
Show all changes
53 commits
Select commit Hold shift + click to select a range
4e30380
CloudQuery GA
jpipkin1 Jun 13, 2024
a240136
Change release note date to Aug 1 2024
jpipkin1 Jun 13, 2024
149dcfa
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Jun 20, 2024
d2600c8
Update blog-service/2024-08-01-apps.md
jpipkin1 Jul 1, 2024
0aed81a
Update docs/security/cloud-infrastructure-security/cloud-infrastructu…
jpipkin1 Jul 1, 2024
5d4c956
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Jul 18, 2024
6e82514
Remove CloudQuery from CIS for AWS
jpipkin1 Aug 13, 2024
abe706b
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Aug 13, 2024
2e67bef
Remove CloudQuery source articles
jpipkin1 Aug 14, 2024
a84a162
Change redirects
jpipkin1 Aug 14, 2024
0244cb9
Remove downloadable files for CloudQuery sources
jpipkin1 Aug 15, 2024
f18bf08
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Aug 16, 2024
53914f7
Update installation steps
jpipkin1 Aug 16, 2024
e4deea9
Fix spelling mistake
jpipkin1 Aug 16, 2024
5fa3e2e
Add back the release note
jpipkin1 Aug 16, 2024
9f49961
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Aug 21, 2024
476fee4
Updates from meeting with Arpit
jpipkin1 Aug 21, 2024
b451384
Update blog-service/2024-08-23-apps.md
jpipkin1 Aug 21, 2024
0116f74
Update docs/security/cloud-infrastructure-security/cloud-infrastructu…
jpipkin1 Aug 21, 2024
a2fb700
Fix broken links
jpipkin1 Aug 21, 2024
73eba97
Minor updates
jpipkin1 Aug 26, 2024
4915f2b
Change release note date to Sept 6 2024
jpipkin1 Aug 28, 2024
58ccd9a
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Aug 28, 2024
2fcec29
Add multi-region enablement section
jpipkin1 Aug 29, 2024
2375814
Removed extra heading
jpipkin1 Aug 29, 2024
53d4ec8
Add missing word
jpipkin1 Aug 29, 2024
3fe06e5
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Sep 4, 2024
bf68279
Cleanup per Ankit Goel review
jpipkin1 Sep 5, 2024
a02b58b
New screenshots
jpipkin1 Sep 5, 2024
75144ca
Add monitors
jpipkin1 Sep 5, 2024
0e62801
Add saved searches
jpipkin1 Sep 6, 2024
ca2b7cd
Remove note about automated playbooks
jpipkin1 Sep 6, 2024
242c718
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Sep 10, 2024
bb46711
Change release note date to Sept 12 2024
jpipkin1 Sep 10, 2024
5370c4a
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Sep 11, 2024
a60be08
Fix RSS icon
jpipkin1 Sep 11, 2024
fe2bda8
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Sep 17, 2024
c160f9e
Updates per SME review
jpipkin1 Sep 18, 2024
51f7879
Fix GuardDuty images
jpipkin1 Sep 24, 2024
c25d2ab
Remove cloudquery-source.md and clouodquery-gcp-source.md files
jpipkin1 Sep 24, 2024
0bde3ca
Fix broken anchor links
jpipkin1 Sep 24, 2024
2a1d100
Fix another broken anchor link
jpipkin1 Sep 24, 2024
0906aa4
Updates for CONN-3530
jpipkin1 Sep 24, 2024
269074f
Change release note date to Oct 3 2024
jpipkin1 Oct 1, 2024
0ef69e2
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Oct 2, 2024
3f5ddf3
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Oct 14, 2024
3090d1c
Change release note date to October 14 2024
jpipkin1 Oct 14, 2024
174644a
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Oct 15, 2024
6b4d570
Change release note date
jpipkin1 Oct 15, 2024
fc294bb
Change release note date to Oct 18 2024
jpipkin1 Oct 18, 2024
db51f59
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Oct 18, 2024
dd9f59d
Change release note date to Oct 21 2024
jpipkin1 Oct 21, 2024
9432d24
Merge branch 'main' into docs-107-cloudquery-ga
jpipkin1 Oct 21, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
31 changes: 31 additions & 0 deletions blog-service/2024-08-23-apps.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
---
title: Enhancements to Cloud Infrastructure Security for AWS (Apps)
image: https://help.sumologic.com/img/sumo-square.png
keywords:
- apps
- app catalog
- aws
- cloud infrastructure security
hide_table_of_contents: true
authors:
- url: https://help.sumologic.com/release-notes-service/rss.xml
image_url: /img/release-notes/rss-orange.png
---

We're excited to announce enhancements to Cloud Infrastructure for AWS. These capabilities were [previously only available in a preview form](/release-notes-service/2024/05/13/apps/). They are now available for general use.

You now have increased visibility into your AWS Cloud environment with the following new features:

### Streamlined installation

You can now more easily configure sources on a simplified screen allowing you to use existing sources or create new sources.

### Out-of-the-box security policy checks

Sumo Logic Cloud Infrastructure Security is now configured by default to use the out-of-the box policy checks. You can now choose to leverage the out-of-the-box policy checks instead of, or in conjunction with, the policy checks provided by AWS Security Hub.

### AI-powered remediation plans

You can now use automated remediation playbooks in monitors built specifically for Cloud Infrastructure Security for AWS.

[Learn more](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/).
6 changes: 3 additions & 3 deletions cid-redirects.json
Original file line number Diff line number Diff line change
Expand Up @@ -2612,9 +2612,9 @@
"/cid/19901": "/docs/metrics/metrics-operators/topk",
"/cid/19902": "/docs/metrics/metrics-operators/where",
"/cid/15631": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/citrix-cloud-source",
"/cid/15634": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-gcp-source",
"/cid/15632": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-azure-plugin-source",
"/cid/15633": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-source",
"/cid/15634": "/docs/c2c/info/",
"/cid/15632": "/docs/c2c/info/",
"/cid/15633": "/docs/c2c/info/",
"/cid/14323": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/docusign-source",
"/cid/14326": "/docs/integrations/global-intelligence/kubernetes-devops",
"/cid/30001": "/docs/integrations/microsoft-azure/azure-batch",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -187,7 +187,11 @@ In the sections of the CloudFormation template that relate to creating Sumo Logi
You can install Cloud Infrastructure Security for AWS from the App Catalog to use the pre-configured dashboards that provide visibility into your environment for real-time analysis of usage.

1. From the **App Catalog**, search for and select **Cloud Infrastructure Security for AWS**.
1. Click **Install App**. The following screen is displayed. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-install-1.png')} alt="Deploy Cloud Infrastructure for AWS screen" style={{border: '1px solid gray'}} width="700"/>
1. Click **Install App**. The following screen is displayed. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-install-0.png')} alt="Configure Sources screen" style={{border: '1px solid gray'}} width="700"/>
1. For each of the data source types listed, select whether to use an existing source, create a new source, or do not collect data for that source type.
* If you select **Use Existing Source**, select the source from the dropdown. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-install-0a.png')} alt="Use Existing Source selection" style={{border: '1px solid gray'}} width="400"/>
* If you select **Create New Source**, type the name you want to use for the source. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-install-0b.png')} alt="Create New Source selection" style={{border: '1px solid gray'}} width="400"/>
1. Click **Next**. The following screen is displayed. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-install-1.png')} alt="Deploy Cloud Infrastructure for AWS screen" style={{border: '1px solid gray'}} width="700"/>

Perform the steps in the following sections:
* [Step 1: Select region](#step-1-select-region)
Expand Down Expand Up @@ -246,12 +250,16 @@ In the **Check AWS Role Permission** section, you can ensure the user performing

### Step 3: Deploy AWS

In this step, you perform the steps needed to deploy the Cloud Infrastructure Security for AWS solution.
In this step, you perform the configuration needed to deploy the Cloud Infrastructure Security for AWS solution.

1. Under **Deploy AWS**, click the **Deploy AWS Security** button. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-install-step-3.png')} alt="Deploy AWS Security" style={{border: '1px solid gray'}} width="700"/>
1. A CloudFormation template screen is displayed. In **Stack Name**, enter a name for the stack. The stack name can include letters (A-Z and a-z), numbers (0-9), and dashes (-).<br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-quick-create-stack.png')} alt="Create stack" style={{border: '1px solid gray'}} width="700"/>
1. Under **Deploy AWS**, click the **Deploy AWS Security** button and select from the dropdown:
* **Deploy to single account**. Deploy the solution only to the account of the user installing the application.
* **Deploy to all accounts**. Deploy the solution to all accounts in your AWS organization. All users in the organization will have access to the application. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-install-step-3.png')} alt="Deploy AWS Security" style={{border: '1px solid gray'}} width="700"/>
1. Click **Next**. A CloudFormation template screen is displayed.
1. In **Stack Name**, enter a name for the stack. The stack name can include letters (A-Z and a-z), numbers (0-9), and dashes (-).<br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-quick-create-stack.png')} alt="Create stack" style={{border: '1px solid gray'}} width="700"/>
1. Scroll down to the **Parameters** section.
1. In **1. Sumo Logic Configuration**, you can accept the defaults. <br/>If fields are missing, or you need to change them, do the following:
* **Deploy to Organization (All Account)**. Select **Yes** to deploy to all accounts in your AWS organization, or select **No** to deploy only to your account.
* **Sumo Logic deployment location**. Choose the geographic location of the deployment: au, ca, de, eu, jp, us2, us1, in, or fed. For information about Sumo Logic deployment locations, see [API Authentication, Endpoints, and Security](/docs/api/getting-started/).
* **Sumo Logic access ID**. Enter the Sumo Logic console access ID, which you received when you created the [access key](/docs/manage/security/access-keys/).
* **Sumo Logic access key**. Enter your Sumo Logic access key. Retrieve this from your Sumo Logic account.
Expand All @@ -268,8 +276,8 @@ In this step, you perform the steps needed to deploy the Cloud Infrastructure Se
:::note
You can find the values for this dialog in the **Organizational structure** section of your [AWS accounts](https://console.aws.amazon.com/organizations/v2/home/accounts) page. Sign in to the AWS console, click on your profile in the top-right corner, select **Organization**, and in the left nav bar select **Policy management > AWS accounts**. You must have the correct permissions to view the account IDs. For more information about organizations, see [AWS documentation](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_org_details.html).<br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-organizations.png')} alt="AWS organizational structure" style={{border: '1px solid gray'}} width="700"/>
:::
1. In **3. AWS Service configuration**, select **Yes** for each of the following sources you want to install for Sumo Logic, or **No** if you already have the source installed:
* **Publish AWS GuardDuty data to Sumo**
1. In **3. AWS Service configuration**, select **Yes** for each of the following sources you want to install for Sumo Logic, or **No** if you already have the source installed. The values shown should match what you picked in [Configure Sources](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#install-cloud-infrastructure-security-for-aws) above.
* **Publish Amazon GuardDuty data to Sumo**
* **Publish AWS CloudTrail data to Sumo**
* **Publish AWS Security Hub data to Sumo**
* **Publish AWS WAF data to Sumo**
Expand Down Expand Up @@ -356,24 +364,6 @@ In this step, you perform the steps needed to deploy the Cloud Infrastructure Se
* **Name of existing S3 Bucket which contains the Network Firewall Logs**. If you selected **Yes** in the preceding field in this section for creating an S3 bucket, leave this blank. If you selected **No** in the preceding field for creating an S3 bucket, provide an existing S3 Bucket name which contains Network Firewall Logs. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-param-7a.png')} alt="Firewall configuration" style={{border: '1px solid gray'}} width="700"/>
</details>

<details>
<summary>CloudQuery</summary>

In this section, you have the choice to create a [CloudQuery source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-source) in Sumo Logic. (This functionality is in [preview](/release-notes-service/2024/05/13/apps/). If you would like to know more about the feature, reach out to your Sumo Logic Account Executive.)

If fields are missing, or you need to change them, do the following:
* **8.1 Configure CloudQuery C2C Source**
* **Setup CloudQuery Source at Org Level**. Select **Yes** to set up the CloudQuery source in the Sumo Logic platform at the organization level, which collects the data of multiple AWS services.
* **CloudQuery logs source category name**. The source category name to be created (for example, `aws/cis/cloudquery/logs`).
* **AWS Access Key**. Enter your AWS access key. Retrieve this from your AWS account. (See [Managing access keys for IAM users](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html).)
* **AWS Secret Key**. Enter your AWS secret key. Retrieve this from your AWS account. (See [Managing access keys for IAM users](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html).)
* **AWS Role ARN**. Enter the AWS Role ARN of the admin account. (See [CloudQuery documentation](https://www.cloudquery.io/blog/deploying-cloudquery-into-aws-org).)
* **AWS Member Role Name**. Enter AWS Member Role name created in all org accounts. (See [CloudQuery documentation](https://www.cloudquery.io/blog/deploying-cloudquery-into-aws-org).)
* **CloudQuery Regions**. Select the AWS regions to collect data from in a comma-separated list. The source will collect data from *all* regions by default, or you can enter the list of required AWS regions as follows: `eu-north-1,eu-west-3,eu-west-2,eu-west-1,ap-northeast-2,ap-northeast-1,sa-east-1,ca-central-1,ap-southeast-1,ap-southeast-2,eu-central-1,us-east-1,us-east-2,us-west-1,us-west-2`.
* **CloudQuery Services**. Select the AWS services to collect data from in a comma-separated list. The source will collect data from *all* regions by default, or you can enter the list of required AWS services as follows: `apigateway,ecs,ec2,lambda,autoscaling,s3,elb,rds,dynamodb,elasticache,redshift,sns,sqs,cloudfront,elasticbeanstalk,eks,accessanalyzer,account,acm,backup,cloudtrail,cloudwatch,codebuild,config,directconnect,dms,ecr,efs,elasticsearch,emr,guardduty,iam,kms,lightsail,route53,sagemaker,secretsmanager,securityhub,ssm,waf,wafv2`.
* **How Frequently to Poll AWS Service(s)**. Set how frequently to poll AWS Services inventory in hours. The default is **12**. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-cloud-query-config.png')} alt="CloudQuery configuration" style={{border: '1px solid gray'}} width="700"/>
</details>

1. Under **Permissions**, in **IAM role - optional**, choose the IAM role for CloudFormation to use for all operations performed on the stack. The role must have permissions to set up the necessary Lambdas, S3 buckets, Kenesis streams, and other objects needed in the CloudFormation template, as well as access to the appropriate logs. If your AWS role does not have the necessary permissions, see [Step 2: Check AWS role permission](#step-2-check-aws-role-permission). <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-permissions.png')} alt="Create Stack button" style={{border: '1px solid gray'}} width="700"/>
1. Under **Capabilities and transforms**, select the acknowledgement boxes.
1. Click **Create Stack**. The stack is created, and the solution is installed.
Expand All @@ -382,10 +372,9 @@ If any errors occur, see [Troubleshoot installation](#troubleshoot-installation)

### Step 4: Start using the solution

After the solution is installed, a new step is displayed at the bottom of the **Deploy Cloud Infrastructure Security** screen.
After the solution is installed, you can view monitors, dashboards, and saved searches.

1. Click **Start Using Sumo**. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-start-using-sumo.png')} alt="Start Using Sumo button" style={{border: '1px solid gray'}} width="400"/>
1. Select an option to start using the solution. <br/><img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-finish-installation.png')} alt="App hub page" style={{border: '1px solid gray'}} width="800"/>
<img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-installed.png')} alt="The screen of the installed solution" style={{border: '1px solid gray'}} width="600"/>

## Troubleshoot installation

Expand Down Expand Up @@ -507,15 +496,6 @@ The **Cloud SIEM Insights Overview** dashboard runs advanced threat detection (C

<img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-cloud-siem-insights.png')} alt="Cloud SIEM Insights dashboard" style={{border: '1px solid gray'}} width="600"/>

### Infrastructure Overview

The **Infrastructure Overview** dashboard helps you identify all accounts, services, and resources within your cloud environment. It helps you get deep visibility into your cloud infrastructure to understand how many cloud resources are running and their configurations.

:::note
This dashboard is in [preview](/release-notes-service/2024/05/13/apps/). To see data in this dashboard, you must install the CloudQuery source in section 8.1 of the CloudFormation Template when you [deploy the solution](#step-3-deploy-aws). If you see only empty panels in the dashboard and would like to know more about the feature, reach out to your Sumo Logic Account Executive.
:::

<img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-infrastructure-overview.png')} alt="Infrastructure Overview dashboard" style={{border: '1px solid gray'}} width="600"/>

### Security Control Failures dashboards

Expand All @@ -527,26 +507,6 @@ The **Security Control Failures - AWS Security Hub** dashboard shows resources t

<img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-security-control-failures-aws-security-hub.png')} alt="Security Control Failures - AWS Security Hub dashboard" style={{border: '1px solid gray'}} width="600"/>

#### Security Control Failures Overview

The **Security Control Failures Overview** dashboard shows you misconfigurations in your environment that may leave you vulnerable to attackers. These checks are run natively by Sumo Logic to find blind spots in your AWS infrastructure.

:::note
This dashboard is in [preview](/release-notes-service/2024/05/13/apps/). To see data in this dashboard, you must install the CloudQuery source in section 8.1 of the CloudFormation Template when you [deploy the solution](#step-3-deploy-aws). If you see only empty panels in the dashboard and would like to know more about the feature, reach out to your Sumo Logic Account Executive.
:::

<img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-security-control-failures-overview.png')} alt="Security Control Failures Overview dashboard" style={{border: '1px solid gray'}} width="600"/>

#### Security Control Failures Investigation

The **Security Control Failures Investigation** dashboard provides a detailed view for the [**Security Control Failures Overview**](#security-control-failures-overview) dashboard and helps you navigate and prioritize the most important misconfigurations in your environment.

:::note
This dashboard is in [preview](/release-notes-service/2024/05/13/apps/). To see data in this dashboard, you must install the CloudQuery source in section 8.1 of the CloudFormation Template when you [deploy the solution](#step-3-deploy-aws). If you see only empty panels in the dashboard and would like to know more about the feature, reach out to your Sumo Logic Account Executive.
:::

<img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-security-control-failures-investigation.png')} alt="Security Control Failures Investigation dashboard" style={{border: '1px solid gray'}} width="600"/>

### Suspicious Activity dashboards

The Suspicious Activity dashboards show data on events identified by anomaly detection that indicate out-of-the ordinary patterns that may require attention. Review these dashboards to see activity identified in configurations, Identity and Access Management (IAM), networks, users, and on the Web. It prioritizes activity by z-score threshold, labeled `risk.calculated_level`, which measures how unusual it is.
Expand Down
Loading
Loading