Right now, I’m joyful to announce the final availability of community exercise occasions for Amazon Digital Personal Cloud (Amazon VPC) endpoints in AWS CloudTrail. This characteristic lets you report and monitor AWS API exercise traversing your VPC endpoints, serving to you strengthen your knowledge perimeter and implement higher detective controls.
Beforehand, it was laborious to detect potential knowledge exfiltration makes an attempt and unauthorized entry to the assets inside your community by VPC endpoints. Whereas VPC endpoint insurance policies may very well be configured to stop entry from exterior accounts, there was no built-in mechanism to log denied actions or detect when exterior credentials had been used at a VPC endpoint. This usually required you to construct customized options to examine and analyze TLS site visitors, which may very well be operationally pricey and negate the advantages of encrypted communications.
With this new functionality, now you can choose in to log all AWS API exercise passing by your VPC endpoints. CloudTrail information these occasions as a brand new occasion sort known as community exercise occasions, which seize each management aircraft and knowledge aircraft actions passing by a VPC endpoint.
Community exercise occasions in CloudTrail present a number of key advantages:
- Complete visibility – Log all API exercise traversing VPC endpoints, whatever the AWS account initiating the motion.
- Exterior credential detection – Establish when credentials from exterior your group are accessing your VPC endpoint.
- Information exfiltration prevention – Detect and examine potential unauthorized knowledge motion makes an attempt.
- Enhanced safety monitoring – Achieve insights into all AWS API exercise at your VPC endpoints with out the necessity to decrypt TLS site visitors.
- Visibility for regulatory compliance – Enhance your skill to satisfy regulatory necessities by monitoring all API exercise passing by.
Getting began with community exercise occasions for VPC endpoint logging
To allow community exercise occasions, I am going to the AWS CloudTrail console and select Trails within the navigation pane. I select Create path to create a brand new one. I enter a reputation within the Path identify discipline and select an Amazon Easy Storage Service (Amazon S3) bucket to retailer the occasion logs. After I create a path in CloudTrail, I can specify an current Amazon S3 bucket or create a brand new bucket to retailer my path’s occasion logs.
Should you set Log file SSE-KMS encryption to Enabled, you will have two choices: Select New to create a brand new AWS Key Administration Service (AWS KMS) key or select Present to decide on an current KMS key. Should you selected New, it’s good to sort an alias within the AWS KMS alias discipline. CloudTrail encrypts your log recordsdata with this KMS key and provides the coverage for you. The KMS key and Amazon S3 have to be in the identical AWS Area. For this instance, I exploit an current KMS key. I enter the alias within the AWS KMS alias discipline and depart the remainder as default for this demo. I select Subsequent for the following step.
Within the Select log occasions step, I select Community exercise occasions underneath Occasions. I select the occasion supply from the record of AWS companies, reminiscent of cloudtrail.amazonaws.com
, ec2.amazonaws.com
, kms.amazonaws.com
, s3.amazonaws.com
, and secretsmanager.amazonaws.com
. I add two community exercise occasion sources for this demo. For the primary supply, I choose ec2.amazonaws.com
choice. For Log selector template, I can use templates for widespread use circumstances or create fine-grained filters for particular situations. For instance, to log all API actions traversing the VPC endpoint, I can select the Log all occasions template. I select Log community exercise entry denied occasions template to log solely entry denied occasions. Optionally, I can enter a reputation within the Selector identify discipline to determine the log selector template, reminiscent of Embrace community exercise occasions for Amazon EC2.
As a second instance, I select Customized to create customized filters on a number of fields, reminiscent of eventName and vpcEndpointId. I can specify particular VPC endpoint IDs or filter the outcomes to incorporate solely the VPC endpoints that match particular standards. For Superior occasion selectors, I select vpcEndpointId from the Discipline dropdown, select equals as Operator, and enter the VPC endpoint ID. After I broaden the JSON view, I can see my occasion selectors as a JSON block. I select Subsequent and after reviewing the picks, I select Create path.
After it’s configured, CloudTrail will start logging community exercise occasions for my VPC endpoints, serving to me analyze and act on this knowledge. To investigate AWS CloudTrail community exercise occasions, you should use the CloudTrail console, AWS Command Line Interface (AWS CLI), and AWS SDK to retrieve related logs. You can even use CloudTrail Lake to seize, retailer and analyze your community exercise occasions. In case you are utilizing Trails, you should use Amazon Athena to question and filter these occasions based mostly on specific standards. Common evaluation of those occasions may help you keep safety, adjust to laws, and optimize your community infrastructure in AWS.
Now accessible
CloudTrail community exercise occasions for VPC endpoint logging offer you a robust device to boost your safety posture, detect potential threats, and achieve deeper insights into your VPC community site visitors. This characteristic addresses your important wants for complete visibility and management over your AWS environments.
Community exercise occasions for VPC endpoints can be found in all industrial AWS Areas.
For pricing data, go to AWS CloudTrail pricing.
To get began with CloudTrail community exercise occasions, go to AWS CloudTrail. For extra data on CloudTrail and its options, check with the AWS CloudTrail documentation.