Best practices to deploy GuardDuty, Macie, Sec Hub and Config in a Multi-account environment?
In a multi-account environment w/ AWS Organizations enabled - what are the best practices for deploying/enabling GD, Macie, Sec Hub?
- how to enable the services (stacksets, pipeline, orgs)
- what roles/SRLs are optional (comply w/ least privilege)
- how to handle finding aggregation
- recommendations for upkeep of services
- gotcha's to look out for
hi, I'd strongly recommend 2 AWS whitepapers exactly providing answers to your various questions:
- AWS Security Reference Architecture: https://d1.awsstatic.com/APG/aws-security-reference-architecture.pdf
- Organizing Your AWS Environment UsingMultiple Accounts: https://docs.aws.amazon.com/whitepapers/latest/organizing-your-aws-environment/organizing-your-aws-environment.pdf#organizing-your-aws-environment
AWS released "Best practices for setting up your multi-account AWS environment." See: https://aws.amazon.com/blogs/mt/best-practices-for-organizational-units-with-aws-organizations/ . In addition, AWS recently released (11/18/2021) nested organization units (making account implementation of security controls easier). See: https://aws.amazon.com/about-aws/whats-new/2021/11/aws-control-tower-supports-nested-organizational-units/
This blog post also may be useful - it covers some key best practices for enabling and managing (inc. the management of access to) Security Hub and how to integrate with other services such as Guard Duty: https://aws.amazon.com/blogs/security/nine-aws-security-hub-best-practices/
In addition to all of the other comments (which you should definitely refer to the security architecture), there's two common principles that are recommended for all organizations. (1) Enable AWS security services at the organization level. This allows the services to view findings new accounts as they are added to your organization. (2) Set a single security account as the delegated administrator for your security services. This allows your security team access to findings across your org from all of the security services outside without needing to use the management account.
There's a lot packed in that question.
I would advise you to look into Control Tower to manage and govern your multi-account environment.
https://aws.amazon.com/controltower
To extend Control Tower with Pipelines, look at Customization for Control Tower.
https://aws.amazon.com/solutions/implementations/customizations-for-aws-control-tower/
Between these two solutions, you have a powerful way of governing and securing your mult-account environment.
With respect to GuardDuty, SecurityHub and Macie, enable them in Organization for all accounts.
Organizations should be set up in your Management (formerly Master) account.
Findings should be sent downstream to a SEIM solution.
With respect to what roles are "optional", it all depends what you have in mind for those roles. In general, the goal should be to keep the grubby, human fingers out of the environment, which can be achieved using pipelines.
Relevant questions
MWAA environment variables are not accessible in requirements.txt?
asked a year agoIAM as code - centralize the management of IAM roles and policies in a multi-account organization
Accepted Answerasked 2 years agoWhat are best practices for setting a test environment for RDS Aurora PostgreSQL
Accepted Answerasked 2 years agoAthena and Redshift Spectrum performance best practices
Accepted Answerasked 3 years agoBest method to send guardduty logs to opensearch
asked 5 months agoBest practices for securing service to service REST communication in a microservices architecture
Accepted Answerasked 2 years agoBest practices for AWS Panorama
Accepted Answerasked 2 months agoBest practices to deploy GuardDuty, Macie, Sec Hub and Config in a Multi-account environment?
asked 8 months agoSecurity Hub - AWS Foundational Security Best Practices
Accepted Answerasked 4 months agoBest practices for long-running API Gateway requests
Accepted Answerasked a year ago
Nested OUs were released for environments governed by AWS Control Tower in 11/2021, they have previously been available natively for all organizations.