This guide tells you how to configure AWS (CloudTrail) collection protocol which collects events from Amazon Web Services (AWS) CloudTrail.
How AWS Collection Works
The Log Collector service collects events from Amazon Web Services (AWS) CloudTrail. CloudTrail records AWS API calls for an account. The events contain the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service. The AWS API call history provided by CloudTrail events enables security analysis, resource change tracking, and compliance auditing. CloudTrail uses Amazon S3 for log file storage and delivery. Security Analytics copies the log files from the cloud (S3 bucket), and sends the events contained in the files to the Log Collector.
The following figure illustrates how you deploy the AWS (CloudTrail) Collection Protocol in Security Analytics.
Configure AWS (CloudTrail) Collection Protocol in Security Analytics
You configure the Log Collector to use AWS (CloudTrail) collection for an event source in the event Source tab of the Log Collector parameter view. The following figure the basic workflow for configuring an event source for AWS (CloudTrail) Collection in Security Analytics. Please refer to:
- Step 1. Configure AWS (CloudTrail) Event Sources in Security Analytics for step-by-step instructions on how to configure events sources in Security Analytics that use the AWS Collection protocol.
- References - AWS (CloudTrail) Collection Configuration Parameters for a detailed description of each AWS (CloudTrail) Collection Protocol parameter.
The event source category is part of the content you downloaded from LIVE.
Configure Event Sources to Use AWS (CloudTrail) Collection Protocol
You need to configure each event source that uses the AWS (CloudTrail) Collection protocol to communicate with Security Analytics (see Step 2. Configure AWS (CloudTrail) Event Sources to Send Events to Security Analytics).