While Amazon GuardDuty has many threat detection capability, it doesn’t offer the possibility to create detections for custom use cases. For custom threat detection you need to:
To centralize diverse event logs in a multi-account environment to a centralized data lake with the data normalized to the Open CyberSecurity Schema Framework you can leverage Amazon Security Lake a service that scales to petabytes, and simplifies integration with 3rd party enterprise security solutions that send data to the lake such as CrowdStrike, Palo Alto, Tanium, and Okta, and solutions that can query the lake or receive the normalized events such as Security Information and Event Management (SIEM) solutions (that work as subscribers), business intelligence tools and you can query the whole lake with Amazon Athena . With a Security Lake you can maintain a smaller period of time in the visualization tools and still keep the record of all logs in a searchable format for years.
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/V7XwbPPjXSY" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
<iframe src="https://www.youtube.com/embed/qcXB6Y_7bNo" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video"></iframe>
</div>
In environments with hybrid infrastructure a SIEM is often used to centralize events (on-prem / multi-cloud), to have a central repository where events are analyzed and rules are configured to detect incidents based on different use cases required to achieve business objectives.
Most of the SIEM solutions in the market have the ability to collect data from AWS (AWS Cloudtrail, AWS Security Hub findings, etc.), here’s a list of some of the vendors that can collect AWS logs:
No. SIEM Solutions aggregate Events (like a firewall accepted message), then correlates to generate Security Findings / Offenses. AWS Security Hub aggregates Findings (information relevant for the security team to take an action).
You can deploy a SIEM on an OpenSearch cluster in your AWS Account through a CloudFormation template available on aws-samples github: Link to aws-samples in github: https://github.com/aws-samples/siem-on-amazon-elasticsearch OpenSearch provides 2200 out-of-the-box open-source Sigma security rules.
Splunk has the ability to integrate cloud logs, as can be seen in the following image of the documentation:
https://splunkbase.splunk.com/app/1876/
[Link to add-on documentation ]
QuickStart for splunk deployment in AWS https://aws.amazon.com/quickstart/architecture/splunk-enterprise/
Splunk is available at AWS Marketplace https://aws.amazon.com/marketplace/pp/B00PUXWXNE
QRadar has the ability to integrate cloud logs, as can be seen in the following image of the documentation:
QRadar is available at the AWS Marketplace in multiple modalities :
https://aws.amazon.com/security-lake/pricing
Offers a free trial for 15 days
https://aws.amazon.com/opensearch-service/pricing
Offers a free tier of 750 hours per month, and 10 GB per month of optional Amazon Elastic Block Store (EBS) storage.