AWS Deployment Guide Overview

Document created by RSA Information Design and Development Employee on Jul 27, 2017Last modified by David O'Malley on Sep 5, 2017
Version 7Show Document
  • View in full screen mode

Before you can deploy Security Analytics in the Amazon Web Services (AWS) you need to:

  • Understand the requirements of your enterprise.
  • Know the scope of a Security Analytics deployment.

When you are ready to begin deployment:

  • Make sure that you have a Security Analytics"Throughput" license.
  • For packet capture in AWS, you can purchase either of the following Third-Party solutions. If you engage one of these third-parities, they will assign an account representative and a professional services engineer to you who will work closely with RSA staff.

    • Gigamon® GigVUE

    • Ixia Cloudlens™

  • Use Chrome for your browser (Internet Explorer is not supported).

AWS Environment Recommendations

AWS instances have the same functionality as the Security Analytics hardware hosts. RSA recommends that you perform the following tasks when you set up your AWS environment.

  • Based on the resource requirements of the different components, follow best practices to use the system and dedicated storage Elastic Block Store (EBS) Volumes appropriately.
  • Make sure that compute capacity provides a write speed of 10% greater than the required sustained capture and ingest rate for the deployment.
  • Build Concentrator directory for index database on the Provisioned IOPS SSD.

Abbreviations and Other Terminology Used in this Guide

AMIAmazon Machine Image
AWSAmazon Web Services


Bring your own licensing

CPUCentral Processing Unit
AWS Dedicated Instances run in a VPC on hardware that is dedicated to a single customer. Dedicated instances are physically isolated at the host hardware level from instances that belong to other AWS accounts. Dedicated instances may share hardware with other instances from the same AWS account that are not Dedicated instances. Refer to the AWS "Amazon EC2 Dedicated Instance" documentation ( for more information on dedicated instances.
An Amazon EBS–optimized instance uses an optimized configuration stack and provides additional, dedicated capacity for Amazon EBS I/O. This optimization provides the best performance for your EBS volumes by minimizing contention between Amazon EBS I/O and other traffic from your instance. Refer to the AWS "Amazon EBS–Optimized Instances" documentation ( for more information on EBS-optimized instances.
EBS VolumeElastic Block Store (EBS) volume is a highly available and reliable storage volume that you can attach to any running instance that is in the same Availability Zone. Refer to the AWS "Amazon EBS Volumes" documentation ( for more information on EBS Volumes.
EC2 instanceVirtual server in AWS Elastic Compute Cloud (EC2) for running applications on the AWS infrastructure. See also Instance.
Networking Enabled

Enhanced networking provides higher bandwidth, higher packet-per-second performance, and consistently lower inter-instance latencies.

If your packets-per-second rate appears to have reached its ceiling, you should consider moving to enhanced networking because you have likely reached the upper thresholds of the virtual machine network interface (VIF) driver.

Refer to the AWS "How do I enable and configure enhanced networking on my EC2 instances " documentation ( for more information on enhanced networking.

EPSEvents Per Second
GBGigabyte. 1GB = 1,000,000,000 bytes
GbGigbit. 1Gb = 1,000,000,000 bits.
GbpsGigabits per second or billions of bits per second. It measures bandwidth on a digital data transmission medium such as optical fiber.
GHzGigaHertz 1 GHz = 1,000,000,000 Hz
HDDHard Disk Drive
InstanceA virtual host in the AWS (that is, virtual machine or server in the AWS infrastructure on which you run services or applications). See also EC2 Instance.
Instance TypeSpecifies the required CPU and RAM for an instance. Refer to the AWS "Amazon EC2 Instance Types" documentation ( for more information on instance types.
IOPSInput/Output Operations Per Second
MbpsMegabits per second or millions of bits per second. It measures bandwidth on a digital data transmission medium such as optical fiber.
On-PremiseOn-premise hosts are installed and run on computers on the premises (in the building) of the organization using the hosts, rather than in the AWS.
PPSPackets Per Second
RAMRandom Access Memory (also known as memory)
Security GroupSet of firewall rules. See the "Network Architecture and Ports" documentation in RSA Link ( for a comprehensive list of the ports you must set up for all Security Analytics components.
SSDSolid-State Drive
TagA meaningful identifier for AWS instance.
Tap VendorNetwork Tapping Vendor
vCPUVirtual Central Processing Unit (also known as a virtual processor)
VMVirtual Machine
VPCVirtual Public Cloud
vRAMVirtual Random Access Memory (also known as virtual memory)

AWS Deployment Scenarios

The following diagrams illustrate some common AWS deployment scenarios. In the diagrams, the:

  • GigaVUE Series (Gigamon® Solution), in combination with Tunneling (created by the Security Analytics administrator), facilitates packet data capture in AWS.
  • CloudLens™ (Ixia® Solution) through Ixia clients and the CloudLens Docker installed on the Decoder, facilitates packet data capture in AWS.
  • Decoder collects packet data. The Decoder captures, parses, and reconstructs all network traffic from Layers 2 – 7.
  • Log Decoder collects logs. The Log Decoder collects log events from hundreds of devices and event sources.
  • Concentrator indexes metadata extracted from network or log data and makes it available for enterprise-wide querying and real-time analytics while facilitating reporting and alerting.

  • Security Analytics Server hosts Incident Management, Reporting, Investigation, Live Content Management, Administration and other aspects of the user interface.

Full Security Analytics Stack VPC Visibility (Packet Solution)

This diagram shows all Security Analytics components (full stack) deployed in AWS.

Hybrid Deployment - Decoder and Log Decoder (Packet Solution)

This diagram shows the Decoder and Log Decoder deployed in AWS with all other Security Analytics components deployed on your premises.

Hybrid Deployment - Decoder, Log Decoder, and Concentrator (Packet Solution)

This diagram shows the Decoder, Log Decoder, and the Concentrator deployed in AWS with all other Security Analytics components deployed on your premises.


You need the following items before you begin the integration process:

  • Ixia account (
  • Access to AWS console
  • Network rout-able (and proper AWS Security Groups) for the containers to transfer data to the RSA Security Analytics Suite Decoder.

Supported Services

RSA provides the following Security Analytics services.

  • Security Analytics Server
  • Archiver
  • Broker
  • Concentrator
  • Event Stream Analysis
  • Log Decoder
  • Decoder
  • Remote Log Collector



You are here

Table of Contents > AWS Deployment