AWS Cloudtrail
If you already have your Cloud Trail configured, please skip to the “Creating a New SQS” section.
Creating a Cloud Trail configuration#
Access your AWS Console and select the Cloud Trail service.
Click Create trail

Enter the name you want to provide for this trail in the Trail Name field.

Select Enable for all accounts in my organization if you have multiple accounts.
Select either Create a New Bucket or Use existing S3 bucket to store Cloud Trail logs.
Copy and save the bucket name. You will need it for configuration.
Provide KMS Key Alias details if encryption needs to be turned on, else uncheck the box.
Accept all defaults and click Next.
Select the following for log events: Management Events, Data Events

Scroll Down and add Data event source for the following:
- S3
- Lambda
- DynmoDB


Click Next.
Review the configurations and click Create Trail.
Creating a new SQS #
Search for the SQS service and select Create Queue.
Select the Standard queue.
Enter a name for the SQS queue.

Select Advanced from Access policy.
Copy the following JSON code and paste it in Access Policy:
s
json{ "Version": "2012-10-17", "Id": "arn:aws:sqs:<AWS Region>:<AWS Account Number>:<SQS Queue Name>", "Statement": [{ "Sid": "Sid1591029198479", "Effect": "Allow", "Principal": { "AWS": "*" }, "Action": "SQS:*", "Resource": "arn:aws:sqs:<AWS Region>:<AWS Account Number>:<SQS Queue Name>", "Condition": { "ArnLike": { "aws:SourceArn": "<S3 Bucket ARN>" } } } ] }Replace the information in angle brackets with your AWS region, AWS account number, SQS queue name, and S3 bucket ARN.
Click Create Queue.
You will need to provide the SQS URL and region to SolCyber.
Events notification on S3 bucket to SQS #
Select the bucket where AWS Cloud Trail data is archived and click Properties.
Copy and secure S3 Bucket Name and Region for the bucket.
Scroll down to the B/Event Notifications/B widget.
Click Create Events Notifications.
Provide the name for the notification in the Event name field and select Put for Events.

Select the destination as SQS queue and select the SQS queue created in the previous step.

Click Save.
You will need to provide the S3 bucket name and region to SolCyber.
Authorizing the IAM user #
- Create an IAM service account to use for Securonix log ingestion. You may already have one if you have previously configured Guard Duty logs for Securonix.
- Select the user and attach the following AWS managed policies to the user:
- AmazonSQSFullAccess
- AmazonS3ReadOnlyAccess
- Copy and save the following information of the user:
- Secret
- Access Key ID
You will need to provide the IAM user access key ID and secret to SolCyber.