diff --git a/blog-service/2024-05-13-apps.md b/blog-service/2024-05-13-apps.md index 748683bab7..80df9c2a0d 100644 --- a/blog-service/2024-05-13-apps.md +++ b/blog-service/2024-05-13-apps.md @@ -16,9 +16,9 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; We're excited to announce increased visibility into your AWS Cloud environment with the following new features: * **Out-of-the-box security policy checks**. Sumo Logic Cloud Infrastructure Security is now configured by default to use the out-of-the box policy checks. You can now choose to leverage the out-of-the-box policy checks instead of, or in conjunction with, the policy checks provided by AWS Security Hub. * **Additional investigation capabilities**. The update includes the addition of three new dashboards: - * [**Infrastructure Overview**](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#infrastructure-overview). Get deep visibility into your cloud infrastructure to understand how many cloud resources are running and their configurations. - * [**Security Control Failures Overview**](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#security-control-failures-overview). See misconfigurations in your environment that may leave you vulnerable to attackers. - * [**Security Control Failures Investigation**](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#security-control-failures-investigation). Navigate and prioritize the most important misconfigurations in your environment. + * **Infrastructure Overview**. Get deep visibility into your cloud infrastructure to understand how many cloud resources are running and their configurations. + * **Security Control Failures Overview**. See misconfigurations in your environment that may leave you vulnerable to attackers. + * **Security Control Failures Investigation**. Navigate and prioritize the most important misconfigurations in your environment. * **AI-powered remediation plans**. You can now use automated remediation playbooks built specifically for Cloud Infrastructure Security for AWS. This functionality is in preview. To participate, reach out to your Sumo Logic account executive. @@ -26,5 +26,5 @@ This functionality is in preview. To participate, reach out to your Sumo Logic a [Learn more](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). :::note -As part of the preview, you can use CloudQuery logs with Cloud Infrastructure Security for AWS. To use the logs, configure the CloudQuery source when you [deploy the solution](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#step-3-deploy-aws). +As part of the preview, you can use CloudQuery logs with Cloud Infrastructure Security for AWS. To use the logs, configure the CloudQuery source when you deploy the solution. ::: diff --git a/blog-service/2024-10-21-apps.md b/blog-service/2024-10-21-apps.md new file mode 100644 index 0000000000..15a240999f --- /dev/null +++ b/blog-service/2024-10-21-apps.md @@ -0,0 +1,22 @@ +--- +title: Enhancements to Cloud Infrastructure Security for AWS (Apps) +image: https://help.sumologic.com/img/sumo-square.png +keywords: + - apps + - app catalog + - aws + - cloud infrastructure security +hide_table_of_contents: true +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +icon + +We're happy to announce enhancements to Cloud Infrastructure for AWS. These capabilities were [previously only available in a preview form](/release-notes-service/2024/05/13/apps/). They are now available for general use. + +You can now more easily configure sources on a simplified screen, allowing you to use existing sources or create new sources. + +Configure Sources screen + +[Learn more](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). \ No newline at end of file diff --git a/cid-redirects.json b/cid-redirects.json index 964465abdb..634eb663b4 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -2646,9 +2646,9 @@ "/cid/19901": "/docs/metrics/metrics-operators/topk", "/cid/19902": "/docs/metrics/metrics-operators/where", "/cid/15631": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/citrix-cloud-source", - "/cid/15634": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-gcp-source", - "/cid/15632": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-azure-plugin-source", - "/cid/15633": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-source", + "/cid/15634": "/docs/c2c/info/", + "/cid/15632": "/docs/c2c/info/", + "/cid/15633": "/docs/c2c/info/", "/cid/14323": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/docusign-source", "/cid/14324": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zendesk-source", "/cid/14326": "/docs/integrations/global-intelligence/kubernetes-devops", diff --git a/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md b/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md index 2cfdb19f8f..3b1344e50c 100644 --- a/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md +++ b/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md @@ -120,7 +120,6 @@ This section describes prerequisites and guidelines for deploying Sumo Logic’s ### Prerequisites -* **AWS Organizations**. You must be using [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html). * **AWS data**. You must have access to data from the following AWS products, since Cloud Infrastructure Security for AWS uses data from these sources in its dashboards: * [Amazon CloudTrail](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-getting-started.html) * [Amazon GuardDuty](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_findings.html) @@ -133,13 +132,14 @@ This section describes prerequisites and guidelines for deploying Sumo Logic’s * View Collectors * Manage Collectors * Manage Content + * Manage Apps * Security * Create access keys * Alerting * View Monitors * Manage Monitors * **Sumo Logic Access ID and Key**. When you deploy the solution, you’ll need to supply a Sumo Logic [Access ID and Access Key](/docs/manage/security/access-keys/), which enable you to use Sumo Logic APIs. Make sure you have the role capabilities listed above before generating the Access ID and Key. -* **AWS credentials**. To deploy the solution, you will need to log onto the [AWS Console](https://console.aws.amazon.com/console). For the CloudFormation template deployment, your AWS role must have the permissions described by [this JSON file](https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/AWSCISCFTemplatePermissions.json). As necessary, you may add JSON text to an existing or a new policy associated with an AWS IAM role as described in the [AWS documentation](https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-create-and-attach-iam-policy.html). You can set this up during installation. For more information, see [Step 2: Check AWS role permission](#step-2-check-aws-role-permission). +* **AWS credentials**. To deploy the solution, you will need to log onto the [AWS Console](https://console.aws.amazon.com/console). For the CloudFormation template deployment, your AWS role must have the permissions described by [this JSON file](https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/AWSCISCFTemplatePermissions.json). As necessary, you may add JSON text to an existing or a new policy associated with an AWS IAM role as described in the [AWS documentation](https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-create-and-attach-iam-policy.html). You can set this up during installation. For more information, see [Create new source: Check AWS role permission](#create-new-source-check-aws-role-permission). * **Monitors**. The Cloud Infrastructure Security for AWS solution comes with pre-packaged alerts in the form of Sumo Logic Monitors. To learn more about their capabilities, visit the [Monitors](/docs/alerts/monitors/) page. ### AWS regions supported @@ -172,7 +172,7 @@ When you deploy the solution, consider the following. #### Do you already have the required sources?  -When you deploy, you are given the option to create the Sumo Logic sources that the solution applications rely upon. If you have already configured those sources, you do not have to create new ones. You can just provide the URLs of the relevant Sumo Logic sources as part of the configuration. +When you deploy, you are given the option to create the Sumo Logic sources that the solution applications rely upon. If you have already configured those sources, you do not have to create new ones. You can just provide the URLs of the relevant Sumo Logic sources as part of the configuration. See [Install Cloud Infrastructure Security for AWS](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#install-cloud-infrastructure-security-for-aws) below. :::note If you use existing sources rather than create new ones, it is not necessary to modify the existing metadata and source categories associated with the sources. The metadata that the solution depends on will be added to the sources at deployment time.  @@ -180,48 +180,115 @@ If you use existing sources rather than create new ones, it is not necessary to #### Bucket considerations -In the sections of the CloudFormation template that relate to creating Sumo Logic sources, you can specify an existing S3 bucket to store the logs that the source collects. If you don’t supply a bucket name, the template will create a new one. We recommend you use an existing bucket if possible.  +In the sections of the CloudFormation template that relate to creating Sumo Logic sources, you can specify an existing S3 bucket to store the logs that the source collects. If you don’t supply a bucket name, the template will create a new one. We recommend you use an existing bucket if possible. See [Create new source: Deploy AWS](#create-new-source-deploy-aws) below. + +#### Account or organization deployment + +You can deploy Cloud Infrastructure Security to a single account or all accounts in your AWS organization. See [Create new source: Deploy AWS](#create-new-source-deploy-aws) below. + +#### Multi-region enablement + +Cloud Infrastructure Security supports collecting data from multiple regions if you have any of the following services running in multiple regions in your AWS infrastructure. You can enable multiple regions when you perform the steps in the [Create new source: Deploy AWS](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#create-new-source-deploy-aws) section below. + +##### GuardDuty + +While deploying, enter comma-separated values for regions in the following section: + +GuardDuty regions + +##### SecurityHub + +While deploying, enter comma-separated values for regions in the following section: + +Security Hub regions + +##### CloudTrail + +On the AWS side, [configure CloudTrail](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-log-files-from-multiple-regions.html) to deliver log files from multiple regions to a single S3 bucket for a single account, and use that S3 bucket in the following section: + +CloudTrail S3 bucket configuration + +:::note +If an S3 bucket is created by the Cloud Infrastructure Security solution, then make sure on the AWS side that it is a central bucket for CloudTrail logs for all regions from the AWS side. +::: + +##### AWS Firewall Manager + +On the AWS side, [configure Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/logging-s3.html) to deliver log files from multiple regions to a single S3 bucket for a single account, and use that S3 bucket in the following section: + +Network Firewall S3 bucket configuration + +:::note +If the S3 bucket is created by the Cloud Infrastructure Security solution, then make sure on the AWS side that it is a central bucket for Network Firewall for all regions. +::: + +##### AWS WAF + +Configure WAF in each region to send logs to [Kinesis data firehose destination](https://docs.aws.amazon.com/waf/latest/developerguide/logging-destinations.html), and from there, use the same [Sumo Logic’s Kinesis HTTP URL](/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-logs-source/) in Firehose configuration to send logs to Sumo Logic. + +Firehose destination settings + +Sumo Logic destination settings in Firehose + +:::note +If Sumo Logic’s Kinesis Firehose source is created by the Cloud Infrastructure Security solution, then make sure on the AWS side that the same Sumo Logic Kinesis HTTP URL is used while configuring the WAF Logging Kinesis destination. +::: + +Network Firewall S3 bucket configuration ## Install Cloud Infrastructure Security for AWS You can install Cloud Infrastructure Security for AWS from the App Catalog to use the pre-configured dashboards that provide visibility into your environment for real-time analysis of usage. 1. From the **App Catalog**, search for and select **Cloud Infrastructure Security for AWS**. -1. Click **Install App**. The following screen is displayed.
Deploy Cloud Infrastructure for AWS screen +1. Click **Install App**.
The **Configure Sources** screen is displayed:
Configure Sources screen +1. For each of the data source types listed, select whether to use an existing source, create a new source, or do not collect data for that source type: + * **Use Existing Source**. Select this option if collection is already set up for that particular service and data is coming into Sumo Logic under a specific _sourceCategory. Select the _sourceCategory from the dropdown menu.
Use Existing Source selection + * **Create New Source**. Select this option when you want to set up Sumo Logic collection for that particular service. Type the name you want to use for the source.
Create New Source selection + * **Do Not Collect**. Select this option if you do not want to collect data from that particular service. If you choose this option, then collection for the service will not be set up and the corresponding dashboards in the Cloud Infrastructure Security solution will not contain data. +1. Click **Next**.
Depending on what you selected, one of the following occurs: + * If you selected only **Use Existing Source** or **Do Not Collect**, the solution is installed. Proceed to [Start using the solution](#start-using-the-solution). -Perform the steps in the following sections: -* [Step 1: Select region](#step-1-select-region) -* [Step 2: Check AWS role permission](#step-2-check-aws-role-permission) -* [Step 3: Deploy AWS](#step-3-deploy-aws) -* [Step 4: Start using the solution](#step-4-start-using-the-solution) + :::tip + Using only existing sources is the easiest way to install, since it means you don't have to create any new sources. + ::: -### Step 1: Select region + * If you selected **Create New Source** for *any* source, the following screen appears. You must perform the steps in the following sections: + * [Create new source: Select region](#create-new-source-select-region) + * [Create new source: Check AWS Role Permission](#create-new-source-check-aws-role-permission) + * [Create new source: Deploy AWS](#create-new-source-deploy-aws)
Deploy Cloud Infrastructure Security for AWS screen -In the **Select Region** section, select the [AWS region](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Concepts.RegionsAndAvailabilityZones.html#Concepts.RegionsAndAvailabilityZones.Regions) where you want to deploy the solution. For information about where your Sumo Logic data is stored in AWS, see [Where is My Data Stored?](/docs/get-started/faq/#where-is-my-data-stored) - :::info - This step is critical. If you do not select the correct region, you will deploy the solution in the wrong region. - ::: +### Create new source: Select region -Select region +If you selected **Create New Source** for any source on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws), in the **Select Region** section select the [AWS region](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Concepts.RegionsAndAvailabilityZones.html#Concepts.RegionsAndAvailabilityZones.Regions) where you want to deploy the solution. + +For information about where your Sumo Logic data is stored in AWS, see [Where is My Data Stored?](/docs/get-started/faq/#where-is-my-data-stored) + +To collect data from multiple regions, see [Multi-region enablement](#multi-region-enablement). + +:::info +This step is critical. If you do not select the correct region, you will deploy the solution in the wrong region. +::: -### Step 2: Check AWS role permission +Select region -In the **Check AWS Role Permission** section, you can ensure the user performing the installation has the proper permissions. Sumo Logic provides a CloudFormation template to perform a security policy check. +### Create new source: Check AWS role permission -Check AWS role permission +If you selected **Create New Source** for any source on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws), perform the steps below. 1. Follow the steps provided in the **Check AWS Role Permission** section of the screen: 1. Create and attach a policy to your user as described in the [AWS documentation](https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-create-and-attach-iam-policy.html). - 1. Click the JSON file link and add to your policy the permissions contained in the file. + 1. Click the JSON file link and add to your policy the permissions contained in the file.
Check AWS role permission 1. Click **Check AWS Role Permission**. This launches a CloudFormation Template that will verify your user has the correct permissions. 1. Sign in the [AWS Console](https://console.aws.amazon.com/console/). After you sign in, the following screen is displayed.
Create permissions stack -1. In **Stack Name**, enter a name for the stack. The stack name can include letters (A-Z and a-z), numbers (0-9), and dashes (-). +1. In **Provide a stack name**, enter a name for the stack. The stack name can include letters (A-Z and a-z), numbers (0-9), and dashes (-). 1. Scroll down to the **Parameters** section. -1. In **1. Sumo Logic Configuration**, you can accept the defaults.
If fields are missing, or you need to change them, do the following: +1. In **Deployment**, enter **No** if you want to install to only one account, or **Yes** if you want to install to all accounts in your organization. +1. In **1. Sumo Logic configuration**, you can accept the defaults.
If fields are missing, or you need to change them, do the following: * **Sumo Logic deployment location**. Choose the geographic location of the deployment: au, ca, de, eu, jp, us2, us1, in, kr, or fed. For information about Sumo Logic deployment locations, see [API Authentication, Endpoints, and Security](/docs/api/getting-started/). * **Sumo Logic access ID**. Enter the Sumo Logic console access ID, which you received when you created the [access key](/docs/manage/security/access-keys/). * **Sumo Logic access key**. Enter your Sumo Logic access key. Retrieve this from your Sumo Logic account. -1. In **2. AWS Organization configuration**, enter the following: +1. In **2. AWS Organization configuration**, enter the following. (This step is required only if you are installing the solution to all accounts in your AWS organization.) * **Security-tooling account ID**. Enter your Security Tooling account ID. This is used to set up the AWS CloudWatch, Lambda, Kinesis, S3 bucket, and SNS topic for collecting AWS GuardDuty, Security Hub, WAF, and Network Firewall data. * **Log-archiving account ID**. Enter your log-archiving account ID. This is used to set up an S3 bucket and SNS topic for collecting the AWS CloudTrail data. :::note @@ -243,21 +310,27 @@ In the **Check AWS Role Permission** section, you can ensure the user performing 1. If the AWS CloudFormation template has not executed successfully, identify and fix any permission errors until the stack completes with a `CREATE_COMPLETE` status.  1. Once the AWS CloudFormation stack has executed successfully, delete the AWS CloudFormation Stack. +### Create new source: Deploy AWS -### Step 3: Deploy AWS - -In this step, you perform the steps needed to deploy the Cloud Infrastructure Security for AWS solution. +If you selected **Create New Source** for any source on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws), perform the steps below. -1. Under **Deploy AWS**, click the **Deploy AWS Security** button.
Deploy AWS Security -1. A CloudFormation template screen is displayed. In **Stack Name**, enter a name for the stack. The stack name can include letters (A-Z and a-z), numbers (0-9), and dashes (-).
Create stack +1. Under **Deploy AWS**, click the **Deploy AWS Security** button and select from the dropdown: + * **Deploy to single account**. Deploy the solution only to the account of the user installing the application. + * **Deploy to all accounts**. Deploy the solution to all accounts in your AWS organization. All users in the organization will have access to the application.
Deploy AWS Security +1. Click **Next**. A CloudFormation template screen is displayed. + :::important + You can accept the defaults shown on this CloudFormation template screen. Fields have been autofilled based on your choices on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws). You only need to change values if any are missing or incorrect. Carefully review the values to ensure they are correct. + ::: +1. In **Stack Name**, enter a name for the stack. The stack name can include letters (A-Z and a-z), numbers (0-9), and dashes (-).
Create stack 1. Scroll down to the **Parameters** section. 1. In **1. Sumo Logic Configuration**, you can accept the defaults.
If fields are missing, or you need to change them, do the following: + * **Deploy to Organization (All Accounts)**. Select **Yes** to deploy to all accounts in your AWS organization, or select **No** to deploy only to your account. * **Sumo Logic deployment location**. Choose the geographic location of the deployment: au, ca, de, eu, jp, us2, us1, in, kr, or fed. For information about Sumo Logic deployment locations, see [API Authentication, Endpoints, and Security](/docs/api/getting-started/). * **Sumo Logic access ID**. Enter the Sumo Logic console access ID, which you received when you created the [access key](/docs/manage/security/access-keys/). * **Sumo Logic access key**. Enter your Sumo Logic access key. Retrieve this from your Sumo Logic account. * **Sumo Logic organization ID**. Enter your Sumo Logic organization ID, which you can find in the Sumo Logic console, under [Account](/docs/get-started/account-settings-preferences). * **Delete Sumo Logic resources when stack is deleted**. Choose **false** if you do not want to remove the collector and sources when the stack is deleted.
Sumo Logic configuration -1. In **2. AWS Organization configuration**, enter the following: +1. In **2. AWS Organization configuration**, enter the following. (This step is required only if you are installing the solution to all accounts in your AWS organization.) * **Security-tooling account ID**. Enter your Security Tooling account ID. This is used to set up the AWS CloudWatch, Lambda, Kinesis, S3 bucket, and SNS topic for collecting AWS GuardDuty, Security Hub, WAF, and Network Firewall data. * **Log-archiving account ID**. Enter your log-archiving account ID. This is used to set up an S3 bucket and SNS topic for collecting the AWS CloudTrail data. :::note @@ -268,8 +341,8 @@ In this step, you perform the steps needed to deploy the Cloud Infrastructure Se :::note You can find the values for this dialog in the **Organizational structure** section of your [AWS accounts](https://console.aws.amazon.com/organizations/v2/home/accounts) page. Sign in to the AWS console, click on your profile in the top-right corner, select **Organization**, and in the left nav bar select **Policy management > AWS accounts**. You must have the correct permissions to view the account IDs. For more information about organizations, see [AWS documentation](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_org_details.html).
AWS organizational structure ::: -1. In **3. AWS Service configuration**, select **Yes** for each of the following sources you want to install for Sumo Logic, or **No** if you already have the source installed: - * **Publish AWS GuardDuty data to Sumo** +1. In **3. AWS Service configuration**, fields have been autofilled based on your choices on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws). You only need to change values if any are missing or incorrect. Carefully review the values to ensure they are correct. + * **Publish Amazon GuardDuty data to Sumo** * **Publish AWS CloudTrail data to Sumo** * **Publish AWS Security Hub data to Sumo** * **Publish AWS WAF data to Sumo** @@ -280,12 +353,14 @@ In this step, you perform the steps needed to deploy the Cloud Infrastructure Se
GuardDuty - In this section, you configure Amazon GuardDuty. If fields are missing, or you need to change them, do the following: - * **4.1 GuardDuty service configuration** - * **GuardDuty Regions**. The regions from which GuardDuty Data should be sent. - * **4.2 GuardDuty Sumo log source configuration** + In this section, you configure Amazon GuardDuty. Fields have been autofilled based on your choices on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws). You only need to change values if any are missing or incorrect. Carefully review the values to ensure they are correct. + + If fields are missing, or you need to change them, do the following: + * **4.1 GuardDuty Sumo log source configuration** * **Create Sumo Logic HTTP logs source**. **Yes** is the default. Select **No** if you already have a source. * **Sumo Logic HTTP logs source category name**. The source category name to be created. If you selected **No** in the previous field, enter your existing source category name for the GuardDuty logs. + * **4.2 GuardDuty service configuration** + * **GuardDuty Regions**. The regions from which GuardDuty Data should be sent. To enable multiple regions, enter regions in a comma-separated list. See [Multi-region enablement](#multi-region-enablement) above.
GuardDuty configuration
@@ -293,16 +368,18 @@ In this step, you perform the steps needed to deploy the Cloud Infrastructure Se
CloudTrail - In this section, you configure AWS CloudTrail. If fields are missing, or you need to change them, do the following: - * **5.1 CloudTrail service configuration** - * **CloudTrail Regions**. The region from which CloudTrail Data should be sent. - :::note - If you have multiple regions, on the AWS side [configure CloudTrail](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-log-files-from-multiple-regions.html) to deliver log files from the regions to a single S3 bucket for a single account, and use that S3 bucket in **5.3 CloudTrail S3 bucket configuration** below. - ::: - * **5.2 CloudTrail Sumo log source configuration**. + In this section, you configure AWS CloudTrail. Fields have been autofilled based on your choices on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws). You only need to change values if any are missing or incorrect. Carefully review the values to ensure they are correct. + + If fields are missing, or you need to change them, do the following: + * **5.1 CloudTrail Sumo log source configuration**. * **Create Sumo Logic S3 logs source for CloudTrail**. **Yes** is the default value. Select **No** if you already have a source. * **Path expression for logs**. The path expression must match the folder structure for CloudTrail logs (for example, `AWSLogs/*/CloudTrail/*`). * **Sumo Logic CloudTrail logs source category name**. The source category name to be created. If you selected **No** in the preceding field for creating an S3 log source, enter the name of an existing Sumo Logic source category that's collecting CloudTrail logs. + * **5.2 CloudTrail service configuration** + * **CloudTrail Regions**. The region from which CloudTrail Data should be sent. + :::note + If you have multiple regions, on the AWS side [configure CloudTrail](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-log-files-from-multiple-regions.html) to deliver log files from the regions to a single S3 bucket for a single account, and use that S3 bucket in **5.3 CloudTrail S3 bucket configuration** below. For more information, see [Multi-region enablement](#multi-region-enablement) above. + ::: * **5.3 CloudTrail S3 bucket configuration**. * **Create an S3 bucket for CloudTrail logs**. **Yes** is the default value. Select **No** if you already have a bucket. (We recommend you use an existing bucket if possible.) * **Name of existing S3 bucket that contains the CloudTrail logs**. If you selected **Yes** in the previous field, leave this blank. If you selected **No** in the previous field, enter the name of the existing S3 bucket. @@ -312,22 +389,26 @@ In this step, you perform the steps needed to deploy the Cloud Infrastructure Se
Security Hub - In this section, you configure AWS Security Hub. If fields are missing, or you need to change them, do the following: - * **6.1 Security Hub Service Configuration**. - * **Security Hub Regions**. The regions from which Security Hub data should be sent. - * **6.2 Security Hub Sumo Log Source configuration**. + In this section, you configure AWS Security Hub. Fields have been autofilled based on your choices on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws). You only need to change values if any are missing or incorrect. Carefully review the values to ensure they are correct. + + If fields are missing, or you need to change them, do the following: + * **6.1 Security Hub Sumo Log Source configuration**. * **Create Sumo Logic HTTP logs source**. **Yes** is the default value. Select **No** if you already have a logs source. - * **Sumo Logic HTTP logs source category name**. The source category name to be created. If you selected **No** in the previous field, provide an existing source category name from the Security Hub logs.
Security Hub configuration + * **Sumo Logic HTTP logs source category name**. The source category name to be created. If you selected **No** in the previous field, provide an existing source category name from the Security Hub logs. + * **6.2 Security Hub Service Configuration**. + * **Security Hub Regions**. The regions from which Security Hub data should be sent. To enable multiple regions, enter regions in a comma-separated list. See [Multi-region enablement](#multi-region-enablement) above.
Security Hub configuration
WAF - In this section, you configure the AWS Web Application Firewall (WAF). If fields are missing, or you need to change them, do the following: + In this section, you configure the AWS Web Application Firewall (WAF). Fields have been autofilled based on your choices on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws). You only need to change values if any are missing or incorrect. Carefully review the values to ensure they are correct. + + If fields are missing, or you need to change them, do the following: * **7.1 AWS Firewall Manager Policy Regions Configuration**. * **AWS WAF Policy Regions**. The region from which AWS WAF data should be sent. :::note - If you have multiple regions, on the AWS side [configure Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/logging-s3.html) to deliver log files from multiple Regions to a single S3 bucket for a single account, and use that S3 bucket in section **7.4 Firewall Manager - S3 Bucket Configuration** above. + If you have multiple regions, on the AWS side [configure Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/logging-s3.html) to deliver log files from multiple Regions to a single S3 bucket for a single account, and use that S3 bucket in section **7.4 Firewall Manager - S3 Bucket Configuration** above. For more information, see [Multi-region enablement](#multi-region-enablement) above. ::: * **AWS Network Firewall Policy Regions**. The regions from which AWS Network Firewall data should be sent. * **7.2 Firewall Manager Details - Kinesis Firehose Delivery Stream Source WAF Configuration**. @@ -343,49 +424,32 @@ In this step, you perform the steps needed to deploy the Cloud Infrastructure Se
Network Firewall - In this section, you configure AWS Network Firewall. If fields are missing, or you need to change them, do the following: + In this section, you configure AWS Network Firewall. Fields have been autofilled based on your choices on the [**Configure Sources** screen](#install-cloud-infrastructure-security-for-aws). You only need to change values if any are missing or incorrect. Carefully review the values to ensure they are correct. + + If fields are missing, or you need to change them, do the following: * **7.3 Firewall Manager Details - S3 Source Network Firewall Configuration**. * **Create Sumo Logic Amazon S3 Logs Source for Network Firewall**. **Yes** is the default. Select **No** if you already have a source. * **Sumo Logic Amazon S3 Logs Source Category Name for Network Firewall**. The source category name to be created. If you selected **No** in the previous field, enter an existing source category name. * **7.4 Firewall Manager - S3 Bucket Configuration**. - * **Create AWS S3 Bucket**. **Yes** is the default value. Select **No** to use an existing S3 bucket from AWS S3 which has Network Firewall Logs. + * **Create AWS S3 Bucket**. **Yes** is the default value. Select **No** to use an existing S3 bucket from AWS S3 which has Network Firewall Logs. :::note - If the S3 bucket is created by the Cloud Infrastructure Security solution, then make sure on the AWS side that it's a central [S3 bucket for Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/logging-s3.html) for all regions. + If the S3 bucket is created by the Cloud Infrastructure Security solution, then make sure on the AWS side that it's a central [S3 bucket for Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/logging-s3.html) for all regions. For more information, see [Multi-region enablement](#multi-region-enablement) above. ::: * **Network Firewall Delivery Bucket Prefix**. The Network Firewall Log Delivery S3 bucket prefix. * **Name of existing S3 Bucket which contains the Network Firewall Logs**. If you selected **Yes** in the preceding field in this section for creating an S3 bucket, leave this blank. If you selected **No** in the preceding field for creating an S3 bucket, provide an existing S3 Bucket name which contains Network Firewall Logs.
Firewall configuration
-
- CloudQuery - - In this section, you have the choice to create a [CloudQuery source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-source) in Sumo Logic. (This functionality is in [preview](/release-notes-service/2024/05/13/apps/). If you would like to know more about the feature, reach out to your Sumo Logic Account Executive.) - - If fields are missing, or you need to change them, do the following: - * **8.1 Configure CloudQuery C2C Source** - * **Setup CloudQuery Source at Org Level**. Select **Yes** to set up the CloudQuery source in the Sumo Logic platform at the organization level, which collects the data of multiple AWS services. - * **CloudQuery logs source category name**. The source category name to be created (for example, `aws/cis/cloudquery/logs`). - * **AWS Access Key**. Enter your AWS access key. Retrieve this from your AWS account. (See [Managing access keys for IAM users](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html).) - * **AWS Secret Key**. Enter your AWS secret key. Retrieve this from your AWS account. (See [Managing access keys for IAM users](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html).) - * **AWS Role ARN**. Enter the AWS Role ARN of the admin account. (See [CloudQuery documentation](https://www.cloudquery.io/blog/deploying-cloudquery-into-aws-org).) - * **AWS Member Role Name**. Enter AWS Member Role name created in all org accounts. (See [CloudQuery documentation](https://www.cloudquery.io/blog/deploying-cloudquery-into-aws-org).) - * **CloudQuery Regions**. Select the AWS regions to collect data from in a comma-separated list. The source will collect data from *all* regions by default, or you can enter the list of required AWS regions as follows: `eu-north-1,eu-west-3,eu-west-2,eu-west-1,ap-northeast-2,ap-northeast-1,sa-east-1,ca-central-1,ap-southeast-1,ap-southeast-2,eu-central-1,us-east-1,us-east-2,us-west-1,us-west-2`. - * **CloudQuery Services**. Select the AWS services to collect data from in a comma-separated list. The source will collect data from *all* regions by default, or you can enter the list of required AWS services as follows: `apigateway,ecs,ec2,lambda,autoscaling,s3,elb,rds,dynamodb,elasticache,redshift,sns,sqs,cloudfront,elasticbeanstalk,eks,accessanalyzer,account,acm,backup,cloudtrail,cloudwatch,codebuild,config,directconnect,dms,ecr,efs,elasticsearch,emr,guardduty,iam,kms,lightsail,route53,sagemaker,secretsmanager,securityhub,ssm,waf,wafv2`. - * **How Frequently to Poll AWS Service(s)**. Set how frequently to poll AWS Services inventory in hours. The default is **12**.
CloudQuery configuration -
- -1. Under **Permissions**, in **IAM role - optional**, choose the IAM role for CloudFormation to use for all operations performed on the stack. The role must have permissions to set up the necessary Lambdas, S3 buckets, Kenesis streams, and other objects needed in the CloudFormation template, as well as access to the appropriate logs. If your AWS role does not have the necessary permissions, see [Step 2: Check AWS role permission](#step-2-check-aws-role-permission).
Create Stack button +1. Under **Permissions**, in **IAM role - optional**, choose the IAM role for CloudFormation to use for all operations performed on the stack. The role must have permissions to set up the necessary Lambdas, S3 buckets, Kinesis streams, and other objects needed in the CloudFormation template, as well as access to the appropriate logs. If your AWS role does not have the necessary permissions, see [Create new source: Check AWS role permission](#create-new-source-check-aws-role-permission).
Create Stack button 1. Under **Capabilities and transforms**, select the acknowledgement boxes. 1. Click **Create Stack**. The stack is created, and the solution is installed. If any errors occur, see [Troubleshoot installation](#troubleshoot-installation). -### Step 4: Start using the solution +### Start using the solution -After the solution is installed, a new step is displayed at the bottom of the **Deploy Cloud Infrastructure Security** screen. +After the solution is installed, you can view its [monitors](#cloud-infrastructure-security-for-aws-monitors), [dashboards](#cloud-infrastructure-security-for-aws-dashboards), and saved searches. -1. Click **Start Using Sumo**.
Start Using Sumo button -1. Select an option to start using the solution.
App hub page +The screen of the installed solution ## Troubleshoot installation @@ -449,6 +513,44 @@ To uninstall the Cloud Infrastructure Security solution: 1. Select the main stack you want to delete. 1. Select **Delete**.
Delete button in the upper right part of the screen +## Cloud Infrastructure Security for AWS monitors + +Following are monitors included with the solution: + +* **Admin Privileges Granted**. Detects when administrative privileges are granted to a user or role. This is crucial for monitoring and controlling access to sensitive resources and ensuring that only authorized personnel have administrative capabilities. +* **Amazon GuardDuty BruteForce finding**. Alerts on brute force attacks detected by Amazon GuardDuty. These attacks typically involve repeated attempts to gain unauthorized access to a system using various password combinations. +* **Amazon GuardDuty InstanceCredentialExfiltration finding**. Triggers when GuardDuty detects potential exfiltration of instance credentials. This could indicate that an attacker is attempting to steal and use the credentials outside of the AWS environment. +* **CloudTrail Changes**. Monitors changes in AWS CloudTrail configurations, which track API calls and activities in your AWS account. Changes to CloudTrail could indicate attempts to hide malicious activities. +* **Config Changes**. Tracks changes to AWS Config settings. AWS Config monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. +* **Critical GuardDuty Alerts**. Alerts on critical severity findings from Amazon GuardDuty. These findings typically indicate severe security threats that require immediate attention and remediation. +* **EC2 instance accessed from malicious IP**. Alerts when an EC2 instance is accessed from an IP address identified as malicious by threat intelligence feeds. This could signify a potential breach or unauthorized access attempt. +* **High Severity GuardDuty Alerts**. Triggers on high severity findings from Amazon GuardDuty, indicating significant security threats that need prompt investigation and action. +* **Important GuardDuty Alerts**. Alerts on important severity findings from Amazon GuardDuty. These findings are notable and should be investigated to ensure they do not escalate into more severe issues. +* **Landspeed Violations**. Detects landspeed violations, which generally refer to unusual and rapid movements of data or activities across different regions that could indicate data exfiltration or unauthorized operations. +* **Low Severity GuardDuty Alerts**. Monitors low severity findings from Amazon GuardDuty. While these findings may not require immediate action, they should be reviewed to ensure they do not evolve into more significant threats. +* **Medium Severity GuardDuty Alerts**. Alerts on medium severity findings from Amazon GuardDuty. These findings indicate moderate security threats that should be investigated and addressed appropriately. +* **Root Account Login**. Triggers when there is a login to the AWS root account. Root account access should be highly restricted and monitored due to its unrestricted access to all resources in the account. + +## Cloud Infrastructure Security for AWS saved searches + +Following are saved searches included with the solution: + +* **Admin Privileges Granted**. Detects when administrative privileges are granted to a user or role, helping to monitor and control access to sensitive resources. +* **Control Failure Findings Details by Severity**. Provides detailed information on control failures categorized by their severity levels, aiding in prioritizing remediation efforts. +* **Creation of IAM Role**. Monitors the creation of new IAM roles, which can grant permissions to users, applications, or services within AWS. +* **Deleted Resources Over Time**. Tracks resources that have been deleted over time, which can help in understanding changes to the environment and identifying potential issues. +* **Exposed S3 Bucket Created**. Alerts when an S3 bucket is created with permissions that make it publicly accessible, which can lead to data leaks. +* **Gateway Changes**. Monitors changes to internet gateways, NAT gateways, and other related configurations that can affect network traffic flow. +* **IAM Policy Changes**. Tracks changes to IAM policies, which define permissions for users and roles, helping to ensure security policies are enforced properly. +* **Least Common Out of Compliance Findings**. Identifies the least common compliance issues, which may highlight rare but potentially severe misconfigurations or vulnerabilities. +* **Most Common Out of Compliance Findings**. Identifies the most frequent compliance issues, helping to prioritize common problems that need attention. +* **Network ACL Changes**. Monitors changes to Network Access Control Lists (ACLs), which control inbound and outbound traffic at the subnet level. +* **New Admins Added**. Alerts when new administrative users are added, ensuring that administrative access is appropriately monitored and controlled. +* **Route Table Changes**. Tracks changes to route tables, which control the traffic routing in VPCs, ensuring network routes are configured as intended. +* **S3 Bucket Changes**. Monitors changes to S3 bucket configurations, which can affect data security and accessibility. +* **Security Group Changes**. Tracks changes to security groups, which act as virtual firewalls for controlling inbound and outbound traffic to AWS resources. +* **VPC Changes**. Monitors changes to Virtual Private Cloud (VPC) settings, which can impact the overall network architecture and security. + ## Cloud Infrastructure Security for AWS dashboards​ import FilterDashboards from '../../reuse/filter-dashboards.md'; @@ -460,7 +562,7 @@ import FilterDashboards from '../../reuse/filter-dashboards.md'; To most efficiently use the solution to address security concerns, we recommend using the dashboards in the following workflow: 1. Look at the [Risk Overview](#risk-overview) dashboard to get an overall picture of the security posture of your environment. Pivot or browse to other dashboards to see details in each area. 1. Look at activity displayed in the [Active Threats](#active-threats-dashboards) dashboards to find issues that need immediate attention. -1. View the [Security Control Failures](#security-control-failures-dashboards) dashboards to find areas that are identified as failing to meet compliance requirements, and therefore possibly pose a security risk. +1. View the [Security Control Failures](#security-control-failures---aws-security-hub) dashboard to find areas that are identified as failing to meet compliance requirements, and therefore possibly pose a security risk. 1. Review the [Suspicious Activity](#suspicious-activity-dashboards) dashboards to uncover suspicious activity that may need investigation. 1. Pivot into the [Risk Overview](#risk-overview) dashboard for specific resources that have issues to see any related activity. Review the action plan presented at the bottom of the dashboard to work through the items identified as needing attention. @@ -507,46 +609,12 @@ The **Cloud SIEM Insights Overview** dashboard runs advanced threat detection (C Cloud SIEM Insights dashboard -### Infrastructure Overview - -The **Infrastructure Overview** dashboard helps you identify all accounts, services, and resources within your cloud environment. It helps you get deep visibility into your cloud infrastructure to understand how many cloud resources are running and their configurations. - -:::note -This dashboard is in [preview](/release-notes-service/2024/05/13/apps/). To see data in this dashboard, you must install the CloudQuery source in section 8.1 of the CloudFormation Template when you [deploy the solution](#step-3-deploy-aws). If you see only empty panels in the dashboard and would like to know more about the feature, reach out to your Sumo Logic Account Executive. -::: - -Infrastructure Overview dashboard - -### Security Control Failures dashboards - -The Security Control Failures dashboards identify misconfigurations in your environment that may leave you vulnerable to attackers. - -#### Security Control Failures - AWS Security Hub +### Security Control Failures - AWS Security Hub The **Security Control Failures - AWS Security Hub** dashboard shows resources that need to be addressed because they are vulnerable as reported by AWS Security Hub. It shows findings by resource, trend, type, and category. By default, the `compliance_status` filter at the top of the dashboard is set to **FAILED** to show resources that fail compliance. Set the `risk.calculated_level` filter to **high** or **critical** to see the most important failures. Security Control Failures - AWS Security Hub dashboard -#### Security Control Failures Overview - -The **Security Control Failures Overview** dashboard shows you misconfigurations in your environment that may leave you vulnerable to attackers. These checks are run natively by Sumo Logic to find blind spots in your AWS infrastructure. - -:::note -This dashboard is in [preview](/release-notes-service/2024/05/13/apps/). To see data in this dashboard, you must install the CloudQuery source in section 8.1 of the CloudFormation Template when you [deploy the solution](#step-3-deploy-aws). If you see only empty panels in the dashboard and would like to know more about the feature, reach out to your Sumo Logic Account Executive. -::: - -Security Control Failures Overview dashboard - -#### Security Control Failures Investigation - -The **Security Control Failures Investigation** dashboard provides a detailed view for the [**Security Control Failures Overview**](#security-control-failures-overview) dashboard and helps you navigate and prioritize the most important misconfigurations in your environment. - -:::note -This dashboard is in [preview](/release-notes-service/2024/05/13/apps/). To see data in this dashboard, you must install the CloudQuery source in section 8.1 of the CloudFormation Template when you [deploy the solution](#step-3-deploy-aws). If you see only empty panels in the dashboard and would like to know more about the feature, reach out to your Sumo Logic Account Executive. -::: - -Security Control Failures Investigation dashboard - ### Suspicious Activity dashboards The Suspicious Activity dashboards show data on events identified by anomaly detection that indicate out-of-the ordinary patterns that may require attention. Review these dashboards to see activity identified in configurations, Identity and Access Management (IAM), networks, users, and on the Web. It prioritizes activity by z-score threshold, labeled `risk.calculated_level`, which measures how unusual it is. diff --git a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-azure-plugin-source.md b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-azure-plugin-source.md deleted file mode 100644 index 1dec712f3c..0000000000 --- a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-azure-plugin-source.md +++ /dev/null @@ -1,82 +0,0 @@ ---- -id: cloudquery-azure-plugin-source -title: CloudQuery Azure Plugin Source -sidebar_label: CloudQuery -keywords: - - cloudquery - - azure -description: Learn how to collect inventory from the Azure APIs using CloudQuery SDK and send it to Sumo Logic. ---- - - - - - -

Beta

- -import CodeBlock from '@theme/CodeBlock'; -import ExampleJSON from '/files/c2c/cloudquery-azure-plugin/example.json'; -import MyComponentSource from '!!raw-loader!/files/c2c/cloudquery-azure-plugin/example.json'; -import useBaseUrl from '@docusaurus/useBaseUrl'; - -cloudquery-icon -azure-icon - -You can use the CloudQuery integration to pull inventory from Azure APIs using CloudQuery SDK and send it to Sumo Logic. - -## About Vendor - -CloudQuery is an open source CSPM vendor that allows the customer to analyze different vendors (for example, AWS, GCP, Azure) to see possible vulnerabilities. - -## Data sources - -The Azure Cloud inventory has the following list of tables supported: -https://hub.cloudquery.io/plugins/source/cloudquery/azure/v13.0.0/tables. - -Based on the services, we will collect data from the tables as mentioned above. - -## User configuration - -### JSON configuration - -Sources can be configured using UTF-8 encoded JSON files with the Collector Management API. See [Use JSON to configure Sources](/docs/send-data/use-json-configure-sources) for details.  - -| Parameter | Type | Required | Description | Access | -|:---|:---|:---|:---|:---| -| config | JSON object | Yes | It contains the configuration parameter for the source. | | -| schemaRef | JSON object | Yes | `{"type":"CloudQuery Azure Inventory"}` | Not modifiable | -| sourceType | string | Yes | Use universal for CloudQuery Azure Inventory. | Not modifiable | - - -### Configuration parameters - -| Parameter | Type | Required | Default | Description | Access | -|:---|:---|:---|:---|:---|:---| -| name | string | No | | Type the desired name of the Source. The name must be unique per Collector. This value is assigned to the metadata field `_source`. | Modifiable | -| description | string | No | | Type a description of the Source. | Modifiable | -| clientId | string | Yes | | It’s a unique identifier assigned to an application that is registered with Azure AD. | Modifiable | -| clientSecret | string | Yes | | It’s a secure password that an application uses to authenticate with Azure services. | Modifiable | -| tenantId | string | Yes | | It’s a unique identifier assigned that represents a specific instance of Azure AD. | Modifiable | -| subscriptionId | array | No | | It’s a unique identifier that ties Azure services to an Azure account. | Modifiable | -| services | array | Yes | | List of services for which the data has to be fetched. Available Options: compute, storage. | Modifiable | -| pollingInterval | string | Yes | 12h | The time interval after the source will check for new data. | Modifiable | - -## Config JSON example - -:::note -If the subscription ID is not specified, it will use all visible subscriptions. -::: - -{MyComponentSource} - -Download example - -:::note -If you have over 75,000 Azure products/resources, you might experience crashes due to limitations in the Azure SDK plugin. If this happens, we may need to increase your memory. [Contact our support team](https://support.sumologic.com/support/s/) for assistance. -::: - -## FAQ - -:::info -Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources. -::: diff --git a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-gcp-source.md b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-gcp-source.md deleted file mode 100644 index 3254ce7b78..0000000000 --- a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-gcp-source.md +++ /dev/null @@ -1,120 +0,0 @@ ---- -id: cloudquery-gcp-source -title: CloudQuery GCP (Beta) -sidebar_label: CloudQuery GCP -tags: - - cloud-to-cloud - - cloudquery - - gcp - - google cloud platform -description: Learn how to collect inventory from GCP APIs using the CloudQuery Plugin SDK and send it to Sumo Logic. ---- - - - - - -

Beta

- -import CodeBlock from '@theme/CodeBlock'; -import useBaseUrl from '@docusaurus/useBaseUrl'; -import ExampleJSON from '/files/c2c/cloudquery-gcp/example.json'; -import MyComponentSource from '!!raw-loader!/files/c2c/cloudquery-gcp/example.json'; -import TerraformExample from '!!raw-loader!/files/c2c/cloudquery-gcp/example.tf'; - -cloudquery-icon - -The CloudQuery GCP integration pulls inventory from various Google Cloud Platform (GCP) APIs via the CloudQuery GCP plugin, transforms it into the CloudQuery schema, and then sends it to Sumo Logic. - -## Data collected - -| Polling Interval | Data | -| :--- | :--- | -| 12 hours | [Data service table data](https://github.com/cloudquery/cloudquery/blob/plugins-source-gcp-v10.0.0/plugins/source/gcp/resources/plugin/tables.go) | - -## Setup - -### Prerequisites - -[Enable](https://cloud.google.com/endpoints/docs/openapi/enable-api) all the service APIs in the authenticated GCP account related with the services from which you want to fetch data via CloudQuery GCP plugin. - -### Vendor configuration - -To download the user credentials JSON file by using the gcloud CLI, refer to the [Google Cloud documentation](https://cloud.google.com/docs/authentication/application-default-credentials#personal). - -### Source configuration - -When you create a CloudQuery GCP source, you add it to a Hosted Collector. Before creating the source, identify the Hosted Collector you want to use or create a new Hosted Collector. For instructions, see [Configure a Hosted Collector and Source](/docs/send-data/hosted-collectors/configure-hosted-collector). - -To configure a CloudQuery GCP Source: -1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the Sumo Logic top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**. -1. On the Collection page, click **Add Source** next to a Hosted Collector. -1. Search for and select **CloudQuery GCP**. -1. Enter a **Name** for the source. The description is optional. -1. **GCP Credentials**. Upload the credentials JSON file downloaded by running the gcloud CLI command. -1. **(Optional) Project ID(s)**. Enter the unique identifier number for your project. You can find this from the Google Cloud Console. If not specified, all the available active projects will be considered by default. -1. **(Optional) Organization ID(s)**. Enter the unique identifier number for your organization. You can find this from the Google Cloud Console. If not specified, all the available active projects will be considered by default. -1. **Services**. Enter the type of service from which the GCP data should be fetched via CloudQuery GCP plugin. -1. By default, **Polling Interval** is set to 12 hours. -1. **(Optional) Processing Rules for Logs**. Configure any desired filters, such as allowlist, denylist, hash, or mask, as described in [Create a Processing Rule](/docs/send-data/collection/processing-rules/create-processing-rule). -1. When you are finished configuring the Source, click **Save**. - -## JSON schema - -Sources can be configured using UTF-8 encoded JSON files with the Collector Management API. See [Use JSON to Configure Sources](/docs/send-data/use-json-configure-sources) for details.  - -| Parameter | Type | Required | Description | -|:---|:---|:---|:---| -| config | JSON Object | Yes | Contains the configuration parameters for the source. | -| schemaRef | JSON Object | Yes | Use `{“type”: “CloudQuery GCP Inventory”}`. | -| sourceType | String | Yes | Use “Universal” for CloudQuery GCP source Inventory. | - -### Configuration object - -| Parameter | Type | Required | Default | Description | Access | -|:---|:---|:---|:---|:---|:---| -| name | string | Yes | `null` | Type the desired name of the Source. The name must be unique per Collector. This value is assigned to the metadata field `_source`. | modifiable | -| description | string | No | `null` | Type a description of the Source. | modifiable | -| credentialsJson | JSON object | Yes | `null` | Service account key JSON file. | modifiable | -| projectIds | array | No | `null` | List of Project IDs from which the data needs to be pulled. | modifiable | -| orgIds | array | No | `null` | List of Organization IDs from which the data needs to be pulled. | modifiable | -| limitToServices | array | Yes | `null` | List of services from which the data should be pulled. | modifiable | -| pollingInterval | number | Yes | 12 Hours | This sets how often the Source checks for data. | modifiable | - -### JSON example - -{MyComponentSource} - -Download example - -### Terraform example - -{TerraformExample} - -Download example - -## Troubleshooting - -### Warning message - -#### Message - -``` -transport: received unexpected content-type \"text/html; charset=UTF-8 -``` - -#### Solution - -If you come across this warning message while fetching service data for the configured source, then contact the CloudQuery or GCP team. - -### Error handling - -For the SDK, if the response code is `401` or `403`, it indicates a config error. You'll need to quit and restart the integration. - -For any other error returned by CloudQuery, we will set ErrorGeneric as an error in the source. The integration will not stop its execution. - -## FAQ - -:::info -Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources. -::: diff --git a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-source.md b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-source.md deleted file mode 100644 index ee9382e227..0000000000 --- a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-source.md +++ /dev/null @@ -1,131 +0,0 @@ ---- -id: cloudquery-source -title: CloudQuery Source (Beta) -sidebar_label: CloudQuery -tags: - - cloud-to-cloud - - cloudquery -description: Learn how to collect inventory from the AWS APIs and transform them into the CloudQuery schema and send it to Sumo Logic. ---- - -import CodeBlock from '@theme/CodeBlock'; -import AccountExampleJSON from '/files/c2c/cloudquery/accountExample.json'; -import OrgExampleJSON from '/files/c2c/cloudquery/orgExample.json'; -import AccountComponentSource from '!!raw-loader!/files/c2c/cloudquery/accountExample.json'; -import OrgComponentSource from '!!raw-loader!/files/c2c/cloudquery/orgExample.json'; -import AccountTFExample from '!!raw-loader!/files/c2c/cloudquery/accountExample.tf'; -import OrgTFExample from '!!raw-loader!/files/c2c/cloudquery/orgExample.tf'; -import useBaseUrl from '@docusaurus/useBaseUrl'; - - - - - - -

Beta

- -cloudquery-icon - -The CloudQuery integration is used to pull inventory from the AWS APIs and transform them into the CloudQuery schema and send it to Sumo Logic. - -## Data collected - -| Polling Interval | Data | -| :--- | :--- | -| 12 hours | [Data service table data](https://hub.cloudquery.io/plugins/source/cloudquery/aws/v22.19.2/docs) | - -## Setup - -### Vendor configuration - -**Account Level**. The integration must be configured with the Access Key ID and Secret Access Key. Refer to the [AWS documentation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html) for guidance to create the Access Key ID and Secret Access Key. - -**Organization Level**. The integration must be configured with the Access Key ID, Secret Access Key, Admin Role ARN, and Member Role Name. Refer to the [CloudQuery documentation](https://www.cloudquery.io/blog/deploying-cloudquery-into-aws-org) for guidance to create the Admin Role ARN and Member Role Name. - -### Source configuration - -When you create an CloudQuery source, you add it to a Hosted Collector. Before creating the source, identify the Hosted Collector you want to use or create a new Hosted Collector. For instructions, see [Configure a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). - -To configure a CloudQuery Source: -1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the Sumo Logic top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**.   -1. On the Collection page, click **Add Source** next to a Hosted Collector. -1. Search for and select **CloudQuery**. -1. Enter a **Name** for the source. The description is optional. -1. (Optional) For **Source Category**, enter any string to tag the output collected from the Source. Category metadata is stored in a searchable field called `_sourceCategory`. -1. (Optional) **Fields**. Click the **+Add** button to define the fields you want to associate. Each field needs a name (key) and value. - * ![green check circle.png](/img/reuse/green-check-circle.png) A green circle with a check mark is shown when the field exists in the Fields table schema. - * ![orange exclamation point.png](/img/reuse/orange-exclamation-point.png) An orange triangle with an exclamation point is shown when the field doesn't exist in the Fields table schema. In this case, an option to automatically add the nonexistent fields to the Fields table schema is provided. If a field is sent to Sumo Logic that does not exist in the Fields schema it is ignored, known as dropped. -1. Select the configuration type from the given two options: Account Level and Organization Level. -1. **AWS Access Key ID**. Enter the Access Key ID collected from the [AWS documentation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html). -1. **AWS Secret Access Key**. Enter the Secret Access Key collected from the [AWS documentation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html). -1. **Admin Role ARN (Organization Level only)**. Enter the full ARN of the Admin Role collected from the [CloudQuery AWS role deployment](https://www.cloudquery.io/blog/deploying-cloudquery-into-aws-org) steps. -1. **Member Role Name (Organization Level only)**. Enter the member role name collected from the [CloudQuery AWS role deployment](https://www.cloudquery.io/blog/deploying-cloudquery-into-aws-org) steps. -1. **Regions**. Identify and enter your Region based on your Base URL. -1. **Services**. Enter the type of service from which the data needs to be collected. -1. By default, **Polling Interval** is set to 12 hours. -1. When you are finished configuring the Source, click **Save**. - -## JSON schema - -Sources can be configured using UTF-8 encoded JSON files with the Collector Management API. See [Use JSON to configure Sources](/docs/send-data/use-json-configure-sources) for details.  - -| Parameter | Type | Value | Required | Description | -|:--|:--|:--|:--|:--| -| schemaRef | JSON Object | `{"type":"CloudQuery"}` | Yes | Define the specific schema type. | -| sourceType | String | `"Universal"` | Yes | Type of source. | -| config | JSON Object | [Configuration object](#configuration-object) | Yes | Source type specific values. | - -### Configuration Object - -| Parameter | Type | Required | Default | Description | Example | -|:--|:--|:--|:--|:--|:--| -| name | String | Yes | `null` | Type a desired name of the source. The name must be unique per Collector. This value is assigned to the [metadata](/docs/search/get-started-with-search/search-basics/built-in-metadata) field `_source`. | `"mySource"` | -| description | String | No | `null` | Type a description of the source. | `"Testing source"` -| category | String | No | `null` | Type a category of the source. This value is assigned to the [metadata](/docs/search/get-started-with-search/search-basics/built-in-metadata) field `_sourceCategory`. See [best practices](/docs/send-data/best-practices) for details. | `"mySource/test"` -| fields | JSON Object | No | `null` | JSON map of key-value fields (metadata) to apply to the Collector or Source. Use the boolean field `_siemForward` to enable forwarding to SIEM.|`{"_siemForward": false, "fieldA": "valueA"}` | -| awsId | String | Yes | `null` | The AWS access ID that you want to use to authenticate collection requests. | | -| awsKey | String | Yes | `null` | The AWS secret key that you want to use to authenticate collection requests. | | -| adminRoleArn | String | Yes | `null` | ARN of an admin account. | | -| memberRoleName | String | Yes | `null` | Role name that CloudQuery should use to assume a role in the member account from the admin account. | | -| limitToRegions | Array | Yes | | List of regions for which the data has to be fetched. | | -| limitToServices | Array | Yes | | List of services for which the data has to be fetched. | | -| pollingInterval | Integer | No | 12 | This sets how often the Source checks for data. | | - -### JSON example - -#### Account level configuration - -{AccountComponentSource} - -Download example - -#### Organization level configuration - -{OrgComponentSource} - -Download example - -### Terraform example - -#### Account level configuration - -{AccountTFExample} - -Download example - -#### Organization level configuration - -{OrgTFExample} - -Download example - -## Limitations - -- The integration lacks support for fetching service table data from multiple AWS accounts. -- The integration does not support to retrieve data from services like Classic load balancer, Network load balancer, Aurora, and VPC. - -## FAQ - -:::info -Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources. -::: \ No newline at end of file diff --git a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md index 3386f11b74..b673eb0e04 100644 --- a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md +++ b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md @@ -187,12 +187,6 @@ In this section, we'll introduce the following concepts:

Sources in the Cloud-to-Cloud Integration Framework need updates over time to maintain data collection.

-
-
- icon

CloudQuery

-

Provides a secure endpoint to receive data from CloudQuery.

-
-
icon

Code42 Incydr

diff --git a/sidebars.ts b/sidebars.ts index abaa5e2b26..9fda090052 100644 --- a/sidebars.ts +++ b/sidebars.ts @@ -414,7 +414,6 @@ module.exports = { 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/citrix-cloud-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/cse-aws-ec-inventory-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloud-to-cloud-source-versions', - //'send-data/hosted-collectors/cloud-to-cloud-integration-framework/cloudquery-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/code42-incydr-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-source', diff --git a/static/files/c2c/cloudquery-azure-plugin/example.json b/static/files/c2c/cloudquery-azure-plugin/example.json deleted file mode 100644 index 9759adaedb..0000000000 --- a/static/files/c2c/cloudquery-azure-plugin/example.json +++ /dev/null @@ -1,23 +0,0 @@ -{ - "api.version": "v1", - "source": { - "config": { - "name": "CloudQuery", - "clientId": "8e094def-e10f-495b-99d1-q3442312cfc5", - "clientSecret": "abc94def-e10f-495b-99d1-q3442312cef5", - "tenantId": "c088d126-d692-42ad-a4b6-9a542d28a132", - "subscriptionId": [ - "a39bedba-be8f-4c0f-abcd-b8c7913501ea" - ], - "services": [ - "compute", - "storage" - ], - "pollingInterval": 12 - }, - "schemaRef": { - "type": "CloudQuery Azure Inventory" - }, - "sourceType": "Universal" - } -} diff --git a/static/files/c2c/cloudquery-gcp/example.json b/static/files/c2c/cloudquery-gcp/example.json deleted file mode 100644 index d82814485e..0000000000 --- a/static/files/c2c/cloudquery-gcp/example.json +++ /dev/null @@ -1,25 +0,0 @@ -{ - "api.version": "v1", - "source": { - "config": { - "name": "CloudQuery GCP", - "credentialsJson": "aa", - "projectIds": [ - "test-gcp-435276" - ], - "organizationIds": [ - "24584326357", - "736586988" - ], - "limitToServices": [ - "compute", - "storage" - ], - "pollingInterval": 12 - }, - "schemaRef": { - "type": "CloudQuery GCP Inventory" - } - }, - "sourceType": "Universal" -} diff --git a/static/files/c2c/cloudquery-gcp/example.tf b/static/files/c2c/cloudquery-gcp/example.tf deleted file mode 100644 index b5c0935c8e..0000000000 --- a/static/files/c2c/cloudquery-gcp/example.tf +++ /dev/null @@ -1,26 +0,0 @@ -resource "sumologic_cloud_to_cloud_source" "asana_source" { - collector_id = sumologic_collector.collector.id - schema_ref = { - type = "CloudQuery GCP" - } - config = jsonencode({ - "name": "CloudQuery GCP", - "credentialsJson": "aa", - "projectIds": { - "test-gcp-435276" - }, - "organizationIds": { - "24584326357", - "736586988" - }, - "limitToServices": { - "compute", - "storage" - }, - "pollingInterval": 12 - }) -} -resource "sumologic_collector" "collector" { - name = "my-collector" - description = "Just testing this" -} \ No newline at end of file diff --git a/static/files/c2c/cloudquery/accountExample.json b/static/files/c2c/cloudquery/accountExample.json deleted file mode 100644 index 2b7fa36b59..0000000000 --- a/static/files/c2c/cloudquery/accountExample.json +++ /dev/null @@ -1,24 +0,0 @@ -{ - "api.version": "v1", - "source": { - "config": { - "name": "CloudQuery AWS Inventory", - "configType": "account", - "limitToRegions": [ - "us-east-1", - "us-east-2" - ], - "limitToServices": [ - "ec2", - "s3" - ], - "pollingInterval": 12, - "awsId": "************", - "awsKey": "***************************" - }, - "schemaRef": { - "type": "CloudQuery AWS Inventory" - }, - "sourceType": "Universal" - } -} \ No newline at end of file diff --git a/static/files/c2c/cloudquery/accountExample.tf b/static/files/c2c/cloudquery/accountExample.tf deleted file mode 100644 index 4f1d122ff1..0000000000 --- a/static/files/c2c/cloudquery/accountExample.tf +++ /dev/null @@ -1,25 +0,0 @@ -resource "sumologic_cloud_to_cloud_source" "cloudquery_source" { - collector_id = sumologic_collector.collector.id - schema_ref = { - type = "CloudQuery" - } - config = jsonencode({ - "name": "CloudQuery AWS Inventory", - "configType": "account", - "limitToRegions": [ - "us-east-1", - "us-east-2" - ], - "limitToServices": [ - "ec2", - "s3" - ], - "pollingInterval": 12, - "awsId": "************", - "awsKey": "***************************" - }) -} -resource "sumologic_collector" "collector" { - name = "my-collector" - description = "Just testing this" -} \ No newline at end of file diff --git a/static/files/c2c/cloudquery/orgExample.json b/static/files/c2c/cloudquery/orgExample.json deleted file mode 100644 index 8471403109..0000000000 --- a/static/files/c2c/cloudquery/orgExample.json +++ /dev/null @@ -1,26 +0,0 @@ -{ - "api.version": "v1", - "source": { - "config": { - "name": "CloudQuery AWS Inventory", - "configType": "org", - "limitToRegions": [ - "us-east-1", - "us-east-2" - ], - "limitToServices": [ - "ec2", - "s3" - ], - "pollingInterval": 12, - "awsId": "************", - "awsKey": "***************************", - "adminRoleArn": "arn:aws:iam::844732294830:role/cloudquery-mgmt-ro", - "memberRoleName": " cloudquery-ro" - }, - "schemaRef": { - "type": "CloudQuery AWS Inventory" - }, - "sourceType": "Universal" - } -} \ No newline at end of file diff --git a/static/files/c2c/cloudquery/orgExample.tf b/static/files/c2c/cloudquery/orgExample.tf deleted file mode 100644 index c3ab77dc31..0000000000 --- a/static/files/c2c/cloudquery/orgExample.tf +++ /dev/null @@ -1,27 +0,0 @@ -resource "sumologic_cloud_to_cloud_source" "cloudquery_source" { - collector_id = sumologic_collector.collector.id - schema_ref = { - type = "CloudQuery" - } - config = jsonencode({ - "name": "CloudQuery AWS Inventory", - "configType": "org", - "limitToRegions": [ - "us-east-1", - "us-east-2" - ], - "limitToServices": [ - "ec2", - "s3" - ], - "pollingInterval": 12, - "awsId": "************", - "awsKey": "***************************", - "adminRoleArn": "arn:aws:iam::844732294830:role/cloudquery-mgmt-ro", - "memberRoleName": " cloudquery-ro" - }) -} -resource "sumologic_collector" "collector" { - name = "my-collector" - description = "Just testing this" -} \ No newline at end of file diff --git a/static/img/integrations/amazon-aws/cis-for-aws-cloudtrail-multi-regions.png b/static/img/integrations/amazon-aws/cis-for-aws-cloudtrail-multi-regions.png new file mode 100644 index 0000000000..4d8241ed82 Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-cloudtrail-multi-regions.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-guardduty-multi-regions.png b/static/img/integrations/amazon-aws/cis-for-aws-guardduty-multi-regions.png new file mode 100644 index 0000000000..e7feb9a01c Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-guardduty-multi-regions.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-infrastructure-overview.png b/static/img/integrations/amazon-aws/cis-for-aws-infrastructure-overview.png index 1f0b4c4728..6ff40760b7 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-infrastructure-overview.png and b/static/img/integrations/amazon-aws/cis-for-aws-infrastructure-overview.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-install-0.png b/static/img/integrations/amazon-aws/cis-for-aws-install-0.png new file mode 100644 index 0000000000..a70224fe36 Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-install-0.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-install-0a.png b/static/img/integrations/amazon-aws/cis-for-aws-install-0a.png new file mode 100644 index 0000000000..7188925caa Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-install-0a.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-install-0b.png b/static/img/integrations/amazon-aws/cis-for-aws-install-0b.png new file mode 100644 index 0000000000..4b83b5f99d Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-install-0b.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-install-1.png b/static/img/integrations/amazon-aws/cis-for-aws-install-1.png index d2b8e9688d..99106c675c 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-install-1.png and b/static/img/integrations/amazon-aws/cis-for-aws-install-1.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-install-step-1.png b/static/img/integrations/amazon-aws/cis-for-aws-install-step-1.png index d091098ba6..ccb6a43675 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-install-step-1.png and b/static/img/integrations/amazon-aws/cis-for-aws-install-step-1.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-install-step-2.png b/static/img/integrations/amazon-aws/cis-for-aws-install-step-2.png index 0297bf672b..109a882a58 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-install-step-2.png and b/static/img/integrations/amazon-aws/cis-for-aws-install-step-2.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-install-step-3.png b/static/img/integrations/amazon-aws/cis-for-aws-install-step-3.png index 92364a6589..200112a548 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-install-step-3.png and b/static/img/integrations/amazon-aws/cis-for-aws-install-step-3.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-installed.png b/static/img/integrations/amazon-aws/cis-for-aws-installed.png new file mode 100644 index 0000000000..2d942e2912 Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-installed.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-network-firewall-multi-regions.png b/static/img/integrations/amazon-aws/cis-for-aws-network-firewall-multi-regions.png new file mode 100644 index 0000000000..e1456bc9c4 Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-network-firewall-multi-regions.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-param-1.png b/static/img/integrations/amazon-aws/cis-for-aws-param-1.png index 246635fec7..e0b7a3f97a 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-param-1.png and b/static/img/integrations/amazon-aws/cis-for-aws-param-1.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-param-2.png b/static/img/integrations/amazon-aws/cis-for-aws-param-2.png index beef1cbf37..b861445ba2 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-param-2.png and b/static/img/integrations/amazon-aws/cis-for-aws-param-2.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-param-3.png b/static/img/integrations/amazon-aws/cis-for-aws-param-3.png index 98d6576d79..90a6574af9 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-param-3.png and b/static/img/integrations/amazon-aws/cis-for-aws-param-3.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-param-4.png b/static/img/integrations/amazon-aws/cis-for-aws-param-4.png index 561b7d93c8..47f44f16fc 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-param-4.png and b/static/img/integrations/amazon-aws/cis-for-aws-param-4.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-param-5.png b/static/img/integrations/amazon-aws/cis-for-aws-param-5.png index 82e7cff887..007ade53e3 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-param-5.png and b/static/img/integrations/amazon-aws/cis-for-aws-param-5.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-param-6.png b/static/img/integrations/amazon-aws/cis-for-aws-param-6.png index d65d361148..7e27d2d104 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-param-6.png and b/static/img/integrations/amazon-aws/cis-for-aws-param-6.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-param-7.png b/static/img/integrations/amazon-aws/cis-for-aws-param-7.png index b8940c80be..388ceb9344 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-param-7.png and b/static/img/integrations/amazon-aws/cis-for-aws-param-7.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-param-7a.png b/static/img/integrations/amazon-aws/cis-for-aws-param-7a.png index 4d5ea127d7..a974429a7e 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-param-7a.png and b/static/img/integrations/amazon-aws/cis-for-aws-param-7a.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-permissions-cft.png b/static/img/integrations/amazon-aws/cis-for-aws-permissions-cft.png index 65000e41a1..aab099b0ca 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-permissions-cft.png and b/static/img/integrations/amazon-aws/cis-for-aws-permissions-cft.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-permissions.png b/static/img/integrations/amazon-aws/cis-for-aws-permissions.png index fe8981d9f3..aaf14ca764 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-permissions.png and b/static/img/integrations/amazon-aws/cis-for-aws-permissions.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-quick-create-stack.png b/static/img/integrations/amazon-aws/cis-for-aws-quick-create-stack.png index b67f3238d7..4e4d4d043b 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-quick-create-stack.png and b/static/img/integrations/amazon-aws/cis-for-aws-quick-create-stack.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-security-control-failures-investigation.png b/static/img/integrations/amazon-aws/cis-for-aws-security-control-failures-investigation.png index 0ca6297ce3..3b45ca3ff9 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-security-control-failures-investigation.png and b/static/img/integrations/amazon-aws/cis-for-aws-security-control-failures-investigation.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-security-control-failures-overview.png b/static/img/integrations/amazon-aws/cis-for-aws-security-control-failures-overview.png index 5867e7d5fb..12bc69d77c 100644 Binary files a/static/img/integrations/amazon-aws/cis-for-aws-security-control-failures-overview.png and b/static/img/integrations/amazon-aws/cis-for-aws-security-control-failures-overview.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-security-hub-multi-regions.png b/static/img/integrations/amazon-aws/cis-for-aws-security-hub-multi-regions.png new file mode 100644 index 0000000000..0461cd034b Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-security-hub-multi-regions.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions-1.png b/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions-1.png new file mode 100644 index 0000000000..92d59ebd45 Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions-1.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions-2.png b/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions-2.png new file mode 100644 index 0000000000..4e6818f033 Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions-2.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions-3.png b/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions-3.png new file mode 100644 index 0000000000..528eda9118 Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions-3.png differ diff --git a/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions.png b/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions.png new file mode 100644 index 0000000000..e7d8b4a1d8 Binary files /dev/null and b/static/img/integrations/amazon-aws/cis-for-aws-waf-multi-regions.png differ