Configure AWS CloudTrail events for Arctic Wolf monitoring
You can configure AWS CloudTrail® to send the necessary logs to Arctic Wolf® for monitoring security information.
The AWS CloudTrail service monitors all API calls within an AWS account. You cannot monitor individual AWS instances or assets. When Arctic Wolf monitors an AWS account using the CloudTrail service, we do not ignore cross-organization, shared, or private information.
If you have multiple AWS accounts you want Arctic Wolf to monitor, consider using AWS Organizations® or AWS Control Tower® to aggregate all logs to one logging account. Then, you only need to configure one logging account to connect to the Arctic Wolf cloud monitoring service. Otherwise, you must repeat this configuration process for each AWS account you want Arctic Wolf to monitor. For more information, see AWS Organizations documentation and AWS Control Tower documentation.
This configuration uses AWS Management Console and AWS CloudFormation to create and manage the resources required to send logs. For more information, see AWS permissions granted to Arctic Wolf, AWS Management Console documentation, and AWS CloudFormation documentation.
Deploying these CloudFormation templates creates resources in your AWS account, and AWS charges you based on resource run time and usage. There is a baseline cost for enabling the service and storing CloudTrail logs in a Simple Storage Service (S3) bucket. For example, an AWS account with multiple active users can generate approximately 250,000 CloudTrail events or more each day. With the single free trail, this level of use adds approximately 10 USD for each AWS account each month in incremental costs.
You can change the CloudFormation settings to reduce AWS costs, such as setting a lower retention period for logs or integrating with a pre-existing trail. For more information, contact your Concierge Security® Team (CST).
These resources are required:
-
Access to the AWS Management Console
-
An Amazon Web Services (AWS)® user or AWS Identity and Access Management (IAM) role with administrator permissions or an equivalent IAM policy. This user must have permissions to create, update, and delete these stacks and dependent resources:
-
CloudFormation stacks
-
CloudTrail trails
-
Amazon CloudWatch Logs log groups
-
IAM roles and managed policies
-
Lambda functions and custom resources
-
Amazon Kinesis Data Firehose delivery streams
-
S3 buckets
-
SNS topics and topic policies
-
These actions are required:
- Complete Provide AWS credentials to Arctic Wolf.
- Obtain the links from the Amazon Web Services (AWS) Monitoring section of the Arctic Wolf Unified Portal.
- Select a preferred region for AWS monitoring.
Note:
Arctic Wolf recommends that you use US West (Oregon) or US East (N. Virginia), known as us-west-2 and us-east-1 respectively, to make sure that all recommended AWS services are available. For more information, see Supported AWS regions.
-
Provide your AWS account numbers in the Arctic Wolf Unified Portal and verify that Arctic Wolf has authorized the accounts for monitoring.
For more information, see Provide AWS credentials to Arctic Wolf.
Determine your AWS deployment scenario and configure CloudTrail
Configure your AWS CloudTrail monitoring based on your deployment scenario. If you have:
- A single account:
-
With an existing trail — Configure CloudTrail monitoring with an existing trail.
-
With no existing trails — Configure CloudTrail monitoring with no existing trails.
-
- Multiple accounts:
-
Including AWS Organizations and AWS Control Tower — Configure CloudTrail monitoring with AWS Control Tower.
-
Including AWS Organizations, but not AWS Control Tower or an existing trail — Configure CloudTrail monitoring with AWS Organizations and no existing trails.
-
Including AWS Organizations and an existing organization-wide trail, but not AWS Control Tower — Configure CloudTrail monitoring with AWS Organizations and an existing trail.
-
Not including AWS Organizations or AWS Control Tower — Configure CloudTrail monitoring with no existing trails.
-
Configure CloudTrail monitoring with no existing trails
Configure CloudTrail monitoring with an existing trail
Configure CloudTrail monitoring with AWS Organizations and no existing trails
Configure CloudTrail monitoring with AWS Organizations and an existing trail
These resources are required:
-
An organization trail to use as the existing trail. For more information, see AWS CloudTrail documentation.
Configure CloudTrail monitoring with AWS Control Tower
These resources are required:
-
An existing trail to configure CloudTrail monitoring with AWS Control Tower. For more information, see AWS Control Tower documentation.
Confirm subscription to the Arctic Wolf SNS topic
The CloudFormation stacks create a Simple Notification Service (SNS) topic in your AWS account. Arctic Wolf uses this SNS topic to identify changes to your CloudTrail account. Make sure that the Arctic Wolf Simple Queue Service (SQS) endpoint is subscribed to your AWNSNSTopic.