Configure GuardDuty with a single account
You can configure Amazon GuardDuty® to send the necessary logs to Arctic Wolf® for security monitoring if you have a single account or multiple single accounts without AWS Organizations.
These resources are required:
- A single AWS account, or multiple single AWS accounts without AWS Organizations
- An AWS user or Identity and Access Management (IAM) role with AdministratorAccess or an equivalent IAM policy
- Access to the AWS Management Console
- Access to the GuardDuty console
Create the base stack
Note: If the AWS CloudTrail stack exists on this account already, you do not need to create the base stack.
Create a dedicated S3 bucket for GuardDuty findings
Configure findings for each region that has GuardDuty enabled
For each region that has GuardDuty monitoring enabled, complete these steps:
Enable S3 protection
- Sign in to the GuardDuty console.
- In the navigation menu, click .
- Select the S3 Protection is enabled on this account checkbox.
Enable EKS protection for a single account
Complete these steps for each of the Amazon GuardDuty accounts that you want Arctic Wolf to monitor.
Tip:
- For more information about enabling EKS protection, see Kubernetes protection in GuardDuty.
- For more information about suggested EKS best practices in your organization, see EKS Best Practice Guides.
- Sign in to the GuardDuty console with administrator permissions.
- In the navigation menu, click .
- If you see a notice similar to Kubernetes Audit Logs Monitoring is not enabled for this account, click Enable to enable EKS protection.
Launch the S3 CloudFormation stack
Generate sample findings
Generate a sample finding for each finding type to make sure that Arctic Wolf is receiving data.