Skip to content

cyberark/Forward-AWS-logs-to-PAS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Forward-AWS-logs-to-PAS

To help organizations address the challenge of monitoring privileged users in the Cloud environment, and detecting, alerting, and responding to high-risk privileged access,

Privileged Threat Analytics capabilities can be used to improve the efficiency of Cloud security teams and to secure threats within the Amazon Web Services (AWS) environment.

This solution provides the following functionality:

Detect unmanaged Access Keys and Passwords for IAM accounts

  • Detect the most privileged accounts in AWS
  • Take Shadow Admins into consideration
  • Add the IAM privileged user to pending accounts as part of automatic remediation

Detect compromised privileged IAM accounts

  • Detect privileged cloud activities that bypassed the Vault, and alert on suspected credentials theft attempts
  • Alert and take control over the managed accounts by initiating password rotation or Access key re-creation

Requirements


  • PAS version version 10.8 and up (Vault + PVWA + CPM + PTA required)
  • Network environment must contain NAT Gateway for the Lambda deployment to succeed. We advise using the CyberArk network template with NAT Gateway
  • Network access from the VPC where the Lambda is deployed to PTA
  • For the solution deployment, you need the following permissions:
    • Deploy cloud formation
    • S3 full permissions
    • SNS full permissions
    • Deploy Lambda
    • Create IAM role
  • Before running the solution, create a dedicated bucket in the region where you will perform the deployment with the following files :
    • MySnsToPta.zip
    • PtaCloudTrailToSns.zip

Deployment Parameters

Parameter Description
Bucket Name Enter the name of the bucket of the solution Lambda
Solution Subnet Enter the subnet in which the solution will be deployed
Solution VPC Enter the VPC in which the solution will be deployed
PTA IP Enter the IP of the PTA
PTA Port Enter the PTA Port for delivering logs

Manual procedure to change the PTA IP after the solution is deployed

For Lambda:

  1. In the AWS console, go to Lambda service.
  2. Locate the Lambda which contains "SNSToPTAFunction" in its name
  3. Update the "PTAIP" environment variable to the appropriate value.

For Security Group:

  1. In the AWS console go to EC2 service
  2. In the EC2 Dashboard, under "Network & Security", Select "Security Group"
  3. Locate the security group called "PTA-AWS-Solution-SG"
  4. Go to the "Outbound" tab and update the destination IP for PTA tcp port rule to the appropriate value.

Troubleshooting

  • Logs : In AWS console → go to Lambda service → Choose your lambda’s name from the list → Press on monitoring → press on “view logs in cloudwatch”

Deleting the Solution

  • Delete the cloud formation stack

  • Delete the Solution trigger that is located under : Cloud Watch→ Rules

Licensing

Copyright (c) 2019 CyberArk Software Ltd.

GNU Lesser General Public License v2.