VPC and Cloud trail logs for SIEM

0

The customer is capturing VPC and Cloud trail logs to their SIEM
The challenge: VPC flow log and cloud trail volume is huge and loading them "as is" SIEM will have lot of data with low value . The customer wants to filter VPC and Cloud trail from based on NIST standard.

Do you know what data should the customer should filter from VPC flow log and cloud trail to meet NIST standards

1回答
0
承認された回答

NIST alignment with logs is all about giving clarity and point blank info about the events. As you have mentioned, the volume of VPC flowlogs and cloud trail are huge for a SIEM system to consume. This dilutes the info and increases the cost of SIEM. In most cases (I assume same here) customers read data from the S3 buckets or cloudwatch via API which is huge and time consuming.

A suggestion here is to filter and upload only the significant events to SIEM. Can be a lambda which runs periodically and uploads the small delta to SIEM or colud also be athena that reads the VPC logs and exports the precise findings to SIEM for analysis.

Example filters for VPC flowlogs: REJECT logs Repeated repeated logs filter vulnerable port traffic

Example filters for CloudTrail Filter critical events like. SPOT fleet creation, user creation, resource creation in an unused region, key rotations etc.

Hope this helps.

AWS
回答済み 4年前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン