Configure GuardDuty with multiple accounts with AWS Organizations
You can configure GuardDuty for multiple accounts with AWS Organizations if you have a delegated GuardDuty administrator account and exporting to S3 is not configured.
These resources are required:
- An AWS user or Identity and Access Management (IAM) role with AdministratorAccess or an equivalent IAM policy
- Access to the AWS Management Console
- Access to the GuardDuty console
Create the base stack
Note: If the AWS CloudTrail stack exists on this account already, you do not need to create the base stack.
Create a dedicated S3 bucket for GuardDuty findings
Configure the delegated GuardDuty administrator account to export logs
Attach policies to the S3 bucket and KMS key
- Sign in to the AWS Management Console with the delegated GuardDuty administrator account.
- Navigate to the GuardDuty console.
- In the navigation menu, click Settings.
- In the Attach Policy section, copy the required policy and attach it to the selected S3 bucket that you specified in the previous step.
- Copy the required policy and attach it to the selected KMS Key that you specified in the previous step.
Enable S3 protection
- Sign in to the GuardDuty console.
- In the navigation menu, click .
- Select the S3 Protection is enabled on this account checkbox.
Enable EKS protection for multiple accounts
Complete these steps for each of the Amazon GuardDuty accounts that you want Arctic Wolf to monitor.
Note:
- Only GuardDuty delegated GuardDuty administrator accounts can configure EKS in multi-account environments.
- If you use AWS Organizations, this procedure automatically enables EKS protection for all new and existing accounts.
Tip:
- For more information about enabling EKS protection, see Kubernetes protection in GuardDuty.
- For more information about suggested EKS best practices in your organization, see EKS Best Practice Guides.
- Sign in to the GuardDuty console with administrator permissions.
- In the navigation menu, click .
- Click Enable all to enable automatic EKS protection for new and existing member accounts.
- Click Update Settings.
Launch the S3 CloudFormation stack
Generate sample findings
Generate a sample finding for each finding type to make sure that Arctic Wolf is receiving data.