View this page in Japanese (日本語) | Back to README
Data from Amazon Security Lake can be loaded directly into SIEM on OpenSearch.
Deploy SIEM on OpenSearch with reference to README
The account can be the same as or different from the Amazon Security Lake account, but the recommended account is different from the Security Lake account.
The region must be the same as the region where Security Lake is enabled.
Ignore Security Lake related parameters when running CDK / CloudFormation.
- Set delegated administrator if using AWS Organizations (optional) Doc
- Enable Security Lake Doc
- If you want to monitor multiple regions, configure rollup (Optional) Doc
- Set up subscribers in the region where you want to deploy SIEM on OpenSearch Doc
- Data access method:
S3
- Subscriber credentials
- Account Id:
AWS account where SIEM was deployed
- External ID:
(any string)
- Account Id:
- Log and event sources
- Select
All log and event sources
or make sure that the custom log sources you want to ingest are selected underSpecific log and event sources
- Select
- Data access method:
- [Required] Change the SQS of the created subscriber
- Target SQS: AmazonSecurityLake-XXXXXXXX-XXXXXX-XXXXXX-XXXXXXXX-Main-Queue
- Change visibility timeout from 5 minutes to
10 minutes
.
Check the subscriber created.
resource type | resource ARN |
---|---|
Subscription endpoint | arn:aws:sqs:ap-northeast-1:888888888888:AmazonSecurityLake-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX-Main-Queue |
AWS role ID | arn:aws:iam::888888888888:role/AmazonSecurityLake-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX |
External Id | (any string) |
Use this for the CloudFormation parameters in the next step.
Update the CloudFormation aes-siem or siem stack and enter the Control Tower related parameters.
Example: Security Lake Integration Parameter
Parameter | Value |
---|---|
SecurityLakeSubscriberSqs | arn:aws:sqs:ap-northeast-1:888888888888:AmazonSecurityLake-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX-Main-Queue |
SecurityLakeRoleArn | arn:aws:iam::888888888888:role/AmazonSecurityLake-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX |
SecurityLakeExternalId | ( string of configured external ID ) |
Immediately after configuration, log ingestion may fail, but will succeed once a new instance of the Lambda function (es-loader) is created. Alternatively, manually deploying the es-loader and forcing it to launch a new instance will resolve the error.
This completes the log ingestion configuration for Security Lake
You can collect data from custom sources in Security Lake's S3 buckets. Although it can be imported into SIEM on OpenSearch, additional settings are required in user.ini if the file name does not match the expected one
- Expected file name:
[0-9a-f]{32}\.gz\.parquet
- Expected directory name:
[Ss]ecurity[Ll]ake/
If neither matches, please set the following configuration in user.ini
user.ini
[securitylake]
s3_key = [0-9a-f]{32}\.gz\.parquet|[Ss]ecurity[Ll]ake/|file_name_of_parquet
Otherwise
[securitylake]
s3_key = [0-9a-f]{32}\.gz\.parquet|[Ss]ecurity[Ll]ake/|service_name_in_s3_path
Please set it to keep the existing s3_key parameters. If there is no need to change other than s3_key, so copy from aws.ini & paste is not necessary because the differential settings are inherited.