We are facing the issue where we are not able to ingest the AWS EC2 , ECS , IAM and VPC, We are using these logs types as AWS context data to enrich the Guarduty and Cloudtrail logs.
We are using the thirdparty api to ingest the logs and providing the access and secret key to fetech the data and relevant permission are already in place.
Does anybody faced the same issue?
AWS Context EC2 / IAM Logs SECOPS
Best answer by bweidel
Hi
I have also seen cases where cloud providers might not allow their data to be exported, if classified as compliance data such as FedRAMP for example, they may not allow any external export of that data. You might want to verify you can manually pull anything from that cloud service? Just trying to see if it’s a sending issue or a receiving issue.
I do still lean toward you probably will need to dump the AWS data to a bucket before accessing, which is the most common way we typically see ingestion of this type of data. Our documentation for setting up ingestion of AWS Guard-Duty & AWS Cloudtrail both have steps where we pull from the S3 Bucket. I don’t think AWS allows direct 3P API to pull from their cloud directly and export to external SIEM.
https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/guard-duty
https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/aws-cloudtrail
If you do a Google Search: “Can you ingest AWS EC2 metadata via an API from AWS EC2 to external SIEM?” It says: “Yes, you can ingest AWS EC2 metadata into an external SIEM, but not by a direct API pull from the EC2 instance itself to an external destination. Instead, you need to use a multi-step process involving AWS services and a data forwarding mechanism. The Instance Metadata Service (IMDS) is only accessible from within the instance.“ Of course you should reach out to AWS to verify.
Login to the community
Login with SSO
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.