Update AWS CloudFormation Stacks
You can update the CloudFormation stacks that Arctic Wolf® provides in an Amazon Web Services (AWS) account.
These actions are required:
- Verify that the AWS user or IAM role that you are using includes the AdministratorAccess or an equivalent IAM policy, and permissions to access the AWS Management Console. This user or role must have permissions to create, update, and delete these stacks and dependent resources:
- CloudFormation stacks
- CloudTrail trails
- Amazon CloudWatch Logs log groups
- IAM roles and managed policies
- Lambda functions and custom resources
- Kinesis Firehose delivery streams
- S3 buckets
- SNS topics and topic policies
- Delete the
ArcticWolf-GuardDutystack, if you previously created it. - Remove these deprecated stacks:
Note:
If you previously configured Amazon GuardDuty using an Arctic Wolf stack, delete this stack from each of the configured regions. Then, complete Configure Amazon GuardDuty for Arctic Wolf monitoring to enable Amazon GuardDuty across multiple regions.
- ArcticWolf-CloudWatchLogs
- ArcticWolf-SystemsManagerLogs
- ArcticWolf-GuardDuty
- AWS monitoring in additional regions
- Occasionally, Arctic Wolf offers service enhancements to our AWS log collection that require you to update the CloudFormation stacks in your account to the latest version. Your Concierge Security® Team (CST) advises you when you need to follow this process.
- In December 2021, the CloudFormation template used for CloudTrail and Amazon GuardDuty implementations was updated to automatically block public access during Simple Storage Service (S3) bucket creation. If you did not manually configure your implementation to block public access during S3 bucket creation, Arctic Wolf recommends this process to update your CloudFormation stack.
Access CloudFormation in the AWS Management Console
Select your preferred region
- In the navigation menu, click Region.
- Select your preferred region.
Update CloudFormation stacks
When there are configuration enhancements, complete these steps to update each CloudFormation stack.
Configuration enhancements could include a Python 3 Lambda upgrade that affects the CloudFormation stack for S3 bucket log monitoring.
Verify the GuardDuty KMS key
For each region that you have Amazon GuardDuty monitoring configured, complete these steps: