SEC 4: How do you detect and investigate security events?
Capture and analyze events from logs and metrics to gain visibility. Take action on security events and potential threats to help secure your workload.
Resources
Threat management in the cloud: Amazon GuardDuty and AWS Security Hub
Remediating Amazon GuardDuty and AWS Security Hub Findings
Centrally Monitoring Resource Configuration and Compliance
Setting up Amazon GuardDuty
AWS Security Hub
Amazon CloudWatch
Getting started: Amazon CloudWatch Logs
Amazon EventBridge
AWS Config
AWS Answers: Centralized Logging
Security Partner Solutions: Logging and Monitoring
Best Practices:
-
Configure service and application logging: Configure logging throughout the workload, including application logs, resource logs, and AWS service logs. For example, ensure that AWS CloudTrail, Amazon CloudWatch Logs, Amazon GuardDuty and AWS Security Hub are enabled for all accounts within your organization.
-
Analyze logs, findings, and metrics centrally: All logs, metrics, and telemetry should be collected centrally, and automatically analyzed to detect anomalies and indicators of unauthorized activity. A dashboard can provide you easy to access insight into real-time health. For example, ensure that Amazon GuardDuty and Security Hub logs are sent to a central location for alerting and analysis.
-
Automate response to events: Using automation to investigate and remediate events reduces human effort and error, and enables you to scale investigation capabilities. Regular reviews will help you tune automation tools, and continuously iterate. For example, automate responses to Amazon GuardDuty events by automating the first investigation step, then iterate to gradually remove human effort.
-
Implement actionable security events: Create alerts that are sent to and can be actioned by your team. Ensure that alerts include relevant information for the team to take action. For example, ensure that Amazon GuardDuty and AWS Security Hub alerts are sent to the team to action, or sent to response automation tooling with the team remaining informed by messaging from the automation framework.
Improvement Plan
Configure service and application logging
AWS Answers: native AWS security-logging capabilities
Getting started with CloudWatch Logs
Developer Tools/Log Analysis
Authentication and Access Control for Amazon CloudWatch
Identity and access management in Amazon S3
Amazon GuardDuty
Lab: Automated Deployment of Detective Controls
Creating a trail in CloudTrail
Lab: Automated Deployment of Detective Controls
AWS Config
Lab: Automated Deployment of Detective Controls
AWS Security Hub
Analyze logs, findings, and metrics centrally
Use Amazon OpenSearch Service to log and monitor (almost) everything
Find a partner that specializes in logging and monitoring solutions
Configuring Athena to analyze CloudTrail logs
Centralize logging solution
Logging and Monitoring
Automate response to events
Lab: Automated Deployment of Detective Controls
Lab: Amazon GuardDuty hands on
Implement actionable security events
AWS service documentation
Using Amazon CloudWatch Metrics
Using Amazon CloudWatch Alarms