How exactly to use AWS Safety Amazon and Hub OpenSearch Services for SIEM
AWS Security Hub offers you a consolidated view of one's security posture in Amazon Web Services (AWS) and can help you check your environment against security standards and current AWS security recommendations . Although Security Hub has some similarities to security information and event management (SIEM) tools, it isn't designed as standalone a SIEM replacement. For instance, Security Hub only ingests AWS-related security findings and will not ingest higher volume event logs directly, such as for example AWS CloudTrail logs. When you have use cases to consolidate AWS findings with other styles of findings from on-premises or other non-AWS workloads, or if you want to ingest higher volume event logs, we advise that you utilize Security Hub together with a SIEM tool.
There’s also other advantages to using Security Hub and a SIEM tool together. Included in these are having the ability to store findings for longer intervals than Security Hub, aggregating findings across multiple administrator accounts, and additional correlating Security Hub findings with one another along with other log sources. In this website post, we shall demonstrate ways to use Amazon OpenSearch Service (successor to Amazon Elasticsearch Service) as a SIEM and integrate Security Hub with it to perform these three use cases. Amazon OpenSearch Service is really a managed service that means it is better to deploy fully, manage, and scale Kibana and Elasticsearch. OpenSearch Service is really a distributed, RESTful analytics and internet search engine that is with the capacity of addressing an increasing number of use cases. It is possible to expand OpenSearch Service with AWS services like Kinesis or kinesis Data Firehose, by integrating with other AWS services, or through the use of traditional agents like Logstash and Beats for log ingestion, and Kibana for data visualization. Even though OpenSearch Service isn’t a SIEM out-of-the-box tool also, with some customization, it could be utilized by you for SIEM tool use cases.
Security SIEM plus Hub use cases
By enabling Security Hub inside your AWS Organizations account structure, you immediately start receiving the advantages of viewing all your security findings from across various AWS and partner services about the same screen. Some organizations desire to go a step further and use Security Hub together with a SIEM tool for the next reasons:
- Correlate Security Hub findings with one another along with other log sources – This is actually the hottest reason customers elect to implement this solution. When you have various log sources beyond Security Hub findings (such as for example application logs, database logs, partner logs, and security tooling logs), then it seems sensible to consolidate these log sources right into a single SIEM solution. You’ll be able to view both your Security Hub findings and miscellaneous logs in exactly the same place and create alerts predicated on interesting correlations.
- Store findings for longer than 3 months following the last update date – Some organizations want or have to store Security Hub findings for longer than 3 months following the last update date. They could wish to accomplish this for historical investigation, or for compliance and audit needs. Either way, you’re provided by this solution the capability to store Security Hub findings in an exclusive Amazon Simple Storage Service (Amazon S3) bucket, that is consumed by Amazon OpenSearch Service then.
- Aggregate findings across multiple administrator accounts – Security Hub includes a feature customers may use to designate an administrator account should they have enabled Security Hub in multiple accounts. A Security Hub administrator account can view data from and manage configuration because of its member accounts. This enables customers to see and manage almost all their findings from multiple member accounts in a single place. Customers have multiple Security Hub administrator accounts sometimes, since they have multiple organizations in AWS Organizations. In this example, you should use this treatment for consolidate all the Security Hub administrator accounts right into a single OpenSearch Service with Kibana SIEM implementation to truly have a single view across your environments. This related post walks through this use case in greater detail, and shows how exactly to centralize Security Hub findings across multiple AWS administrators and Regions. However, this website post takes this process by introducing OpenSearch Service with Kibana to the utilization case further, for a complete SIEM experience.
Solution architecture
The perfect solution is represented in Figure 1 shows the flexibleness of integrations which are possible when you develop a SIEM through the use of Amazon OpenSearch Service. You’re allowed by the answer to aggregate findings across multiple accounts, store findings within an S3 bucket indefinitely, and correlate multiple AWS and non-AWS services in a single place for visualization. This post targets Security Hub’s integration with the perfect solution is, however the following AWS services can also integrate:
Each one of these ongoing services has its dedicated dashboard within the OpenSearch SIEM solution. This allows for customers to see findings and data which are highly relevant to each service that the SIEM tool is ingesting. OpenSearch Service allows the client to generate aggregated dashboards also, consolidating multiple services inside a single dashboard, if needed.
Prerequisites
We advise that you enable Security < and Hub;a href=”http://aws.amazon.com/config” target=”_blank” rel=”noopener noreferrer”>AWS Config across all your Regions and accounts. For more information about how exactly to do this, start to see the documentation for Security Hub and AWS Config. We also advise that you utilize Security AWS and Hub Config integration with AWS Organizations to simplify the setup and automatically enable these ongoing services in every current and future accounts in your company.
Launch the solution
To be able to launch this solution inside your environment, it is possible to launch the solution through the use of an AWS CloudFormation template either, or by following a steps presented later in this article to customize the deployment to aid integrations with non-AWS services, multi-Organization deployments, or launch inside your existing OpenSearch Service environment.
To launch the answer, follow the instructions for SIEM on Amazon OpenSearch Service on GitHub.
Utilize the solution
Before you begin utilizing the solution, we’ll demonstrate how this solution appears in the Security Hub dashboard, as shown in Figure 2. Navigate by < here;a href=”https://github.com/aws-samples/siem-on-amazon-opensearch-service/#3-configuring-opensearch-dashboards” target=”_blank” rel=”noopener noreferrer”>following Step 3 from the GitHub README.
The Security Hub dashboard highlights all major the different parts of the ongoing service in a OpenSearch Service dashboard environment. This includes supporting every one of the service integrations that exist within Security Hub (such as for example GuardDuty, AWS Identity and Access Management (IAM) Access Analyzer, Amazon Inspector, Amazon Macie, and AWS Systems Manager Patch Manager). The dashboard displays both security and findings standards, and you may filter by AWS account, finding type, security standard, or service integration. Figure 3 shows a synopsis of the visual dashboard experience once you deploy the perfect solution is.
Use case 1: Correlate Security Hub findings with one another along with other log sources and create alerts
This solution uses OpenSearch Service and Kibana to help you to read through both Security Hub findings and logs from any AWS and non-AWS systems. After that you can create alerts within Kibana predicated on interesting correlations between Security Hub and any logged events. Although Security Hub supports ingesting a massive amount of findings and integrations, it cannot create correlation rules such as a SIEM tool can. However, it is possible to create such rules using SIEM on OpenSearch Service. It’s vital that you have a closer look when multiple AWS security services generate findings for an individual resource, because this means that elevated risk or multiple risk vectors potentially. Based on your environment, the original amount of findings in Security Hub may be high, so you might have to prioritize which findings require immediate action. Security Hub offers you the < natively;a href=”https://docs.aws.amazon.com/securityhub/latest/userguide/findings-filtering-grouping.html” target=”_blank” rel=”noopener noreferrer”>capability to filter findings by resource, account, severity, and several other details.
Within the findings, it is possible to send notifications through alerts which are generated by SIEM on OpenSearch Service in a number of ways: Amazon Simple Notification Service (Amazon SNS) by eating messages within an appropriate < or tool;a href=”https://docs.aws.amazon.com/sns/latest/dg/sns-email-notifications.html” target=”_blank” rel=”noopener noreferrer”>configuring recipient email addresses, Amazon Chime, Slack (using AWS Chatbot) or custom webhook to your organization’s ticketing system. It is possible to react to these new security incident-oriented findings through ticketing then, chat, or incident management systems.
Solution overview for use case 1
Figure 4 gives a synopsis of the answer for use case 1. This solution requires that you have Security GuardDuty and Hub enabled in your AWS account. Logs from AWS services, including Security Hub, are ingested into an S3 bucket, are automatically extracted then, transformed, and loaded (ETL) and populated in to the SIEM system that’s running on OpenSearch Service using AWS Lambda. After capturing the logs, you will be in a position to visualize them on the dashboard and analyze correlations of multiple logs. Within the SIEM on OpenSearch Service solution, you shall develop a rule to detect failures, such as for example CloudTrail authentication failures in logs. Then, you’ll configure the solution to create alerts to Amazon SNS and send emails when logs match rules.
Implement the perfect solution is for use case 1
You’ll now setup this workflow to alert you by email when logs in OpenSearch match certain rules that you create.
Step one 1: Create and visualize findings in OpenSearch Dashboards
Security Hub along with other AWS services export findings to Amazon S3 in a centralized log bucket. It is possible to ingest logs from CloudTrail, VPC Flow Logs, and GuardDuty, which are generally found in AWS security analytics. In this task, you import simulated security incident data in OpenSearch Dashboards, and utilize the dashboard to visualize the info in the logs.
To navigate OpenSearch Dashboards
- Generate pseudo-security incidents. It is possible to simulate the full total results by generating sample findings in GuardDuty.
- In OpenSearch Dashboards, go directly to the Discover screen. The Discover screen is split into three major sections: Search bar, index/display field list, and time-series display, as shown in Figure 5.
- In OpenSearch Dashboards, select log-aws-securityhub-* or log-aws-vpcflowlogs-* or log-aws-cloudtrail-* or any index patterns and add event.module to the display field. event.module is really a field that indicates where in fact the log originates from. If you’re collecting other threat information, such as for example Security Hub, @log-type is Security Hub, and event.module indicates where in fact the log comes from (either Amazon Inspector or Amazon Macie for instance). Once you’ve added event.module, filter the required Security Hub integrated service (for instance, Amazon Inspector) to show. When testing the surroundings covered in this website post outside a production context, you should use Kinesis Data Generator to create sample user traffic. Other tools can be found also.
- Choose the following on the dashboard to start to see the visualized information:
- CloudTrail Summary
- VpcFlowLogs Summary
- GuardDuty Summary
- All – Threat Hunting
Step two 2: Configure alerts to complement log criteria
Next, you shall configure alerts to complement log criteria. You need to create the destination for alerts first, and set what things to monitor then.
To configure alerts
- In OpenSearch Dashboards, in the left menu, choose Alerting.
- To include the facts of SNS, on the Destinations tab, choose Add destinations, and enter the next parameters:
- Name: aes-siem-alert-destination
- Type: Amazon SNS
- SNS Alert: arn:aws:sns::<111111111111>:aes-siem-alert
- Replace <111111111111> together with your AWS account ID and correct the spot name
- Replace with the spot you are using, for instance, eu-west-1
- IAM Role ARN: arn:aws:iam::<111111111111>:role/aes-siem-sns-role
- Replace &<111111111111> together with your AWS account ID
- Choose Create to perform setting the alert destination.
- In OpenSearch Dashboards, in the left menu, select Alerting. You’ll set what things to monitor now. You monitor a CloudTrail trail authentication failure here. You can find two normalized log times: @timestamp and event.ingested. The difference is between your log occurrence time (@timestamp) and the SIEM reception time (event.ingested). Use event.ingested for logs with a big time lag from occurrence to reception. It is possible to specify flexible conditions by selecting Define using extraction query for the filter definition.
- On the Monitors tab, choose Create monitor.
- Enter the next parameters. When there is no description, utilize the default value.
- Name: Authentication failed
- Approach to definition: Define using extraction query
- Indices: log-aws-cloudtrail-* (manual input, not pull-down)
- Define extraction query: Enter the next query.
- Enter the next remaining parameters of the monitor:
-
- Frequency: By interval
-
- Monitor schedule: Every 3 minutes
-
- Choose Create to generate the monitor.
You must be logged in to post a comment.