As we speak, I’m blissful to announce the final availability of community exercise occasions for Amazon Digital Non-public Cloud (Amazon VPC) endpoints in AWS CloudTrail. This function lets you file and monitor AWS API exercise traversing your VPC endpoints, serving to you strengthen your knowledge perimeter and implement higher detective controls.
Beforehand, it was onerous to detect potential knowledge exfiltration makes an attempt and unauthorized entry to the assets inside your community via VPC endpoints. Whereas VPC endpoint insurance policies might be configured to stop entry from exterior accounts, there was no built-in mechanism to log denied actions or detect when exterior credentials have been used at a VPC endpoint. This usually required you to construct customized options to examine and analyze TLS visitors, which might be operationally expensive and negate the advantages of encrypted communications.
With this new functionality, now you can choose in to log all AWS API exercise passing via your VPC endpoints. CloudTrail data these occasions as a brand new occasion kind known as community exercise occasions, which seize each management aircraft and knowledge aircraft actions passing via a VPC endpoint.
Community exercise occasions in CloudTrail present a number of key advantages:
- Complete visibility – Log all API exercise traversing VPC endpoints, whatever the AWS account initiating the motion.
- Exterior credential detection – Establish when credentials from exterior your group are accessing your VPC endpoint.
- Knowledge exfiltration prevention – Detect and examine potential unauthorized knowledge motion makes an attempt.
- Enhanced safety monitoring – Achieve insights into all AWS API exercise at your VPC endpoints with out the necessity to decrypt TLS visitors.
- Visibility for regulatory compliance – Enhance your means to satisfy regulatory necessities by monitoring all API exercise passing via.
Getting began with community exercise occasions for VPC endpoint logging
To allow community exercise occasions, I am going to the AWS CloudTrail console and select Trails within the navigation pane. I select Create path to create a brand new one. I enter a reputation within the Path identify area and select an Amazon Easy Storage Service (Amazon S3) bucket to retailer the occasion logs. Once I create a path in CloudTrail, I can specify an current Amazon S3 bucket or create a brand new bucket to retailer my path’s occasion logs.
For those who set Log file SSE-KMS encryption to Enabled, you’ve two choices: Select New to create a brand new AWS Key Administration Service (AWS KMS) key or select Current to decide on an current KMS key. For those who selected New, you could kind an alias within the AWS KMS alias area. CloudTrail encrypts your log recordsdata with this KMS key and provides the coverage for you. The KMS key and Amazon S3 have to be in the identical AWS Area. For this instance, I take advantage of an current KMS key. I enter the alias within the AWS KMS alias area and depart the remainder as default for this demo. I select Subsequent for the following step.
Within the Select log occasions step, I select Community exercise occasions beneath Occasions. I select the occasion supply from the checklist of AWS companies, reminiscent of cloudtrail.amazonaws.com
, ec2.amazonaws.com
, kms.amazonaws.com
, s3.amazonaws.com
, and secretsmanager.amazonaws.com
. I add two community exercise occasion sources for this demo. For the primary supply, I choose ec2.amazonaws.com
possibility. For Log selector template, I can use templates for frequent use circumstances or create fine-grained filters for particular situations. For instance, to log all API actions traversing the VPC endpoint, I can select the Log all occasions template. I select Log community exercise entry denied occasions template to log solely entry denied occasions. Optionally, I can enter a reputation within the Selector identify area to determine the log selector template, reminiscent of Embody community exercise occasions for Amazon EC2.
As a second instance, I select Customized to create customized filters on a number of fields, reminiscent of eventName and vpcEndpointId. I can specify particular VPC endpoint IDs or filter the outcomes to incorporate solely the VPC endpoints that match particular standards. For Superior occasion selectors, I select vpcEndpointId from the Subject dropdown, select equals as Operator, and enter the VPC endpoint ID. Once I increase the JSON view, I can see my occasion selectors as a JSON block. I select Subsequent and after reviewing the picks, I select Create path.
After it’s configured, CloudTrail will start logging community exercise occasions for my VPC endpoints, serving to me analyze and act on this knowledge. To research AWS CloudTrail community exercise occasions, you need to use the CloudTrail console, AWS Command Line Interface (AWS CLI), and AWS SDK to retrieve related logs. You too can use CloudTrail Lake to seize, retailer and analyze your community exercise occasions. In case you are utilizing Trails, you need to use Amazon Athena to question and filter these occasions based mostly on specific standards. Common evaluation of those occasions can assist you keep safety, adjust to rules, and optimize your community infrastructure in AWS.
Now obtainable
CloudTrail community exercise occasions for VPC endpoint logging offer you a robust device to reinforce your safety posture, detect potential threats, and acquire deeper insights into your VPC community visitors. This function addresses your crucial wants for complete visibility and management over your AWS environments.
Community exercise occasions for VPC endpoints can be found in all business AWS Areas.
For pricing data, go to AWS CloudTrail pricing.
To get began with CloudTrail community exercise occasions, go to AWS CloudTrail. For extra data on CloudTrail and its options, check with the AWS CloudTrail documentation.