Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Amazon Security Lake integration - Check data is exploitable #222

Closed
AlexRuiz7 opened this issue May 7, 2024 · 3 comments
Closed

Amazon Security Lake integration - Check data is exploitable #222

AlexRuiz7 opened this issue May 7, 2024 · 3 comments
Assignees
Labels
level/task Task issue request/operational Operational requests type/research Research issue

Comments

@AlexRuiz7
Copy link
Member

AlexRuiz7 commented May 7, 2024

Description

Related issue: #128

To complete the Wazuh integration with Amazon Security Lake, we need that the data sent to Amazon Security Lake is exploitable, meaning the data is written properly and that the integration works as expected.

https://aws.amazon.com/es/blogs/security/how-to-visualize-amazon-security-lake-findings-with-amazon-quicksight/

image

@AlexRuiz7 AlexRuiz7 added level/task Task issue type/research Research issue labels May 7, 2024
@AlexRuiz7 AlexRuiz7 added the request/operational Operational requests label May 7, 2024
@f-galland
Copy link
Member

Querying services

Data lakes should be queried by other AWS services such as:

  • Athena
  • Redshift spectrum
  • EMR
  • Glue
  • Quicksight
  • S3 Select

But Athena seems to be the predilect way to do it.

Permissions:

With regards to permissions, Amazon suggests using the following roles:

The role that enables Security Lake (when done through the web UI) gets database view permissions automatically.

Permissions can be granted on table, database or views.

In order to be able to query Security Lake using Athena (which seems to be the predilect way to do it), query access should be granted following the guide below:

Query language:

Queries to Security Lake are performed using a SQL like language:

@f-galland
Copy link
Member

f-galland commented May 7, 2024

As far as I can gather, I need to create a database/table out of the content of the S3 bucket

I've struggled to create a database out of one of our sample SecurityLake S3 buckets.
It seems I need to provide an output location, but I'm not sure where to find that field.

Firefox_Screenshot_2024-05-07T20-09-02 037Z

@AlexRuiz7
Copy link
Member Author

AlexRuiz7 commented May 15, 2024

We now have the required permissions to query the database in Athena. We did also run the Crawler manually to populate the database table with the latest data in the custom source prefix of the Amazon Security Lake S3 bucket.

image

image

Therefore, we conclude the data written to the S3 bucket is under the right format, exploitable through SQL queries and or subscriptions and that our integration works as desired.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
level/task Task issue request/operational Operational requests type/research Research issue
Projects
Status: Done
Development

No branches or pull requests

2 participants