Configure AWS Minimal Permission Deployment
Alert Logic strongly recommends deploying with full permissions to facilitate the discovery of your AWS environment and allow Alert Logic to automate required AWS services. To learn more about full permission deployment, see Configure AWS Full Permission Deployment.
Minimal permission deployment employs the most limited privileges that still allow Alert Logic to work properly in AWS.
Minimal permission deployment allows you to set up CloudTrail in either the AWS account you want protected by Alert Logic or in a separate account with an S3 bucket to which CloudTrail is configured for centralized log collection.
Configure minimal permission deployment
To perform minimal permission cross-account role configuration, you must log into your AWS account and create an IAM role. AWS role creation requires that you provide an AWS policy, a document that specifies the permissions assigned to the AWS role you create for Alert Logic to access your AWS account. The policy document grants only the permissions required to monitor your environments.
To deploy minimal permissions for your AWS implementation:
- Set up AWS CloudTrail. Choose to:
- Create an IAM policy and role for minimal permission deployment.
- Configure Amazon S3 bucket policies for CloudTrail log collection
Set up AWS CloudTrail
For minimal permission deployment to work properly, you must set up your AWS CloudTrail manually. The process to set up AWS CloudTrail depends on whether you need to create an SNS topic or edit an existing SNS topic for CloudTrail.
Create a CloudTrail and SNS topic
If AWS CloudTrail is not yet enabled for your account, you must create a new trail, with an S3 bucket and SNS topic, and configure it for use with Alert Logic.
To set up CloudTrail with a new SNS topic:
- Log into the AWS protected account.
- Select the CloudTrail service.
- Click Create a trail, and then click Create trail to open the full workflow.
- In Trail name, type a name for your trail.
- Click Create a new S3 bucket.
- In Trail log bucket and folder, type the name of the S3 bucket in which to store your CloudTrail logs in your account.
- In AWS KMS alias, type a KMS alias to enable log file encryption.
- For SNS notification delivery, select Enabled.
- For Create a new SNS topic, select New.
- Click Next, click Next, and then click Create trail.
Use an existing CloudTrail and SNS topic
If you already enabled AWS CloudTrail for your account, the trail likely has the "multi-region" flag enabled. If you set up more than one trail with this flag enabled, Alert Logic selects the trail that appears first in alphabetical order. The existing trail you use must be configured with SNS delivery enabled, as described in the steps below.
To configure an existing SNS Topic:
- From the AWS CloudTrail console, click Trails, and then select your existing trail.
- For SNS notification delivery, select Enabled.
- For Create a new SNS topic, select New . Note the ARN of the SNS topic; you will need it when defining the IAM policy.
- Click Save changes.
Create an IAM policy and role for minimal permission deployment
Configure Amazon S3 bucket policies for CloudTrail log collection
For Alert Logic to collect CloudTrail logs from your S3 buckets, you must allow permission for the IAM role you created above to access the ListObjects and GetObject APIs for the bucket and prefix where you store the logs.
The process to configure the S3 bucket policy depends on your current configuration. Use one of the following procedures:
Create an Amazon S3 bucket policy
You must create an S3 bucket policy if your CloudTrail does not have that policy set up.
To create an Amazon S3 bucket policy:
- From the IAM Console click Roles, select the role you created above, and then note the IAM Role ARN value to ensure that the correct policy is applied to your bucket.
- From the Amazon S3 console, find the bucket that stores the logs to be collected.
If the logs are stored under one or more prefixes (which appear as folders in the console), note the prefix but stop at the top-level bucket, because bucket policies can only be edited from this level.
- Click Properties, and then expand the Permissions section and click Add Bucket Policy.
- Define the policy as follows:
- Download and open this policy document, copy the contents, and then paste them into the bucket policy window.
- Where indicated, replace BUCKET_NAME/PREFIX with the name of your bucket.
- Where indicated, replace YOUR_IAM_ROLE_ARN with the account number of the protected account.
- Click Save.
Edit an existing Amazon S3 bucket policy
If the Amazon S3 bucket where you store logs has an existing bucket policy, you must make the following changes to your policy to allow the IAM role created forAlert Logic to collect logs.
To update an existing Amazon S3 bucket policy:
-
From the Amazon S3 console, find the bucket that stores collected logs.
If the logs are stored under one or more prefixes (which appear as folders in the console), note the prefix but stop at the top-level bucket, because bucket policies can only be edited from this level.
- Click Properties, expand the Permissions section, and then click Edit Bucket Policy.
- Make the following changes to your policy:
- Download the bucket policy block (.txt) and copy the contents.
- Where indicated, replace BUCKET_NAME/PREFIX with the name of your bucket.
- Where indicated, replace YOUR_IAM_ROLE_ARN with the account number of the protected account.
- After the last permissions statement in the bucket policy window, paste the bucket policy block contents.
- Click Save.
Complete minimal permission deployment configuration
To complete configuration of a minimal permission deployment, you must log into the Alert Logic console, and then enter the AWS role information created above.
To configure this deployment in the Alert Logic console:
- Browse to the Deployments page.
- Click the tile for the AWS deployment you want to configure.
- Enter the Role ARN and External ID you created above.
- Click CREATE.
Configure minimal permission deployment with centralized log collection
Minimal permission deployment with centralized log collection requires you to log into the AWS console to set up and configure both S3 and SNS in the receiving account (the AWS account in which you want to centralize log collection), and then log into the protected account (the AWS account you want to protect) to set up CloudTrail and an IAM role.
To deploy minimal permission deployment with centralized log collection:
- In the receiving account:
- In the protected account:
- In the Alert Logic console:
Configure Amazon S3 bucket policies for CloudTrail log collection for the receiving account
For Alert Logic to collect CloudTrail logs from your S3 buckets, you must allow permission for the IAM role you create to access the ListObjects and GetObject APIs for the bucket and prefix where you store the logs.
The process to configure the S3 bucket policy depends on your current configuration. Use one of the following procedures:
Enable a new S3 bucket policy in the receiving account
If S3 is not enabled for the receiving account, you must enable it, and then configure it for use with Alert Logic.
To create an Amazon S3 bucket policy:
- Log into the receiving account.
- From the AWS console, click S3, and then click Create bucket.
- Complete the appropriate fields in the Create bucket window.
- Click Next to accept the default settings for properties and permissions.
- Click Create.
- From the AWS S3 console, select the bucket you just created.
- Click the Permissions tab, and then click Bucket Policy.
- Create the bucket policy as follows:
- Download the bucket policy (.txt) and paste the contents into the bucket policy window.
- Where indicated, replace ReceivingAccountBucketName with the name of your bucket.
- Where indicated, replace ProtectedAccountID with the account number of the protected account.
- Download the bucket policy (.txt) and paste the contents into the bucket policy window.
- Click Save.
Edit an existing S3 bucket policy in the receiving account
If you enabled S3 for the receiving account, you must configure S3 for use with Alert Logic.
- Log into the receiving account.
- From the IAM Console, click S3, and then find the bucket that stores collected logs.
- Click Properties, expand the Permissions section, and then click Edit Bucket Policy.
- Perform the following actions:
- Download the bucket policy block (.txt) and copy the contents.
- After the last permissions statement in the bucket policy window, paste the bucket policy block contents.
- Where indicated, replace ReceivingAccountBucketName with the name of your bucket.
- Where indicated, replace ProtectedAccountID with the account number of the protected account.
- Click Save.
Configure SNS topic for the receiving account
For minimal permission deployment to work properly, you must set up your AWS CloudTrail manually in the receiving account. The process to set up AWS CloudTrail depends on whether you need to create an SNS topic or edit an existing SNS topic for CloudTrail.
Create a new SNS topic for the receiving account
You must create an Simple Notification Service (SNS) topic in the receiving account and configure it for use with Alert Logic.
To create an SNS topic:
- Log into the receiving account.
- From the AWS console, click Simple Notification Service.
- From the SNS dashboard, click Create topic, and then provide a topic name. The Display name is optional in this case.
- Click Create topic.
- On the Topics page, make note of the ARN for the new SNS topic.
- Select Other topic actions > Edit topic policy.
- Click Advanced view.
- Make the following changes to your topic policy:
- After the last permissions statement, add a comma (,).
- Download the SNS topic policy text block (.txt) and paste it into the policy after the comma.
- Replace SNS_TOPIC_ARN with the Topic ARN.
- Click Update policy.
Edit an existing SNS topic for the receiving account
If you have an existing Simple Notification Service (SNS) topic enabled in the receiving account, you must edit the existing topic policy.
To edit an existing SNS topic:
- Log into the receiving account.
- From the AWS console, click Simple Notification Service.
- From the SNS dashboard, click Topics, and then select the topic you want to edit.
- Select Other topic actions > Edit topic policy.
- Click Advanced view.
- Make the following changes to your topic policy:
- After the last permissions statement, add a comma (,).
- Download the SNS topic policy text block (.txt) and paste it into the policy after the comma.
- Replace SNS_TOPIC_ARN with the Topic ARN.
- Click Update policy.
Create a minimal permissions IAM policy and role for the receiving account
To perform cross-account role configuration with centralized log collection, you must log into your AWS account and create an IAM role for the account you want to use for centralized log collection.
AWS role creation requires that you provide an AWS policy, a document that specifies the permissions assigned to the AWS role you create for Alert Logic to access your AWS account. The policy document for the receiving account grants only read-only access.
Download and open this policy document for the receiving account (.txt). Keep the document open so you can copy and paste the information during IAM role creation for centralized log collection. To create a cross-account access role, see Create a cross-account access role.
Set up CloudTrail in the protected account
- Log into the AWS protected account.
- Click CloudTrail >Trails.
- Click Create trail.
- In Trail name, type a name for your trail.
- For Apply trail to all regions, click Yes.
- For Create a new S3 bucket, select No .
- In S3 bucket, type the name of the S3 bucket you created in the receiving account to store your CloudTrail logs.
- Click Advanced.
- For Send SNS notification for every log file delivery, select Yes.
- For Create a new SNS topic, select No, and then enter the topic ARN for the SNS topic you created in the receiving account.
- Click Save.
- Click Create.
Create a minimal permission IAM policy and role for the protected account
To perform cross-account role configuration with centralized log collection, you must log into your AWS account and create an IAM role for the account you want to protect. The policy document for the protected account grants only the permissions required to monitor your environments.
Download and open this policy document for the protected account (JSON file). Keep the document open so you can copy and paste the information during IAM role creation for the protected account. To create a cross-account access role, see Configure IAM Role for Amazon Web Services (AWS)
Complete minimal permission deployment configuration with centralized log collection
To complete configuration of a minimal permission deployment with centralized log collection, you must log into the Alert Logic console, and then enter the AWS role information created above. To learn more about AWS deployments, see AWS Deployments.
To configure this deployment in the Alert Logic console:
- Browse to the Deployments page.
- Click the tile for the AWS deployment you want to configure.
- Enter the Role ARN and External ID for the protected account.
- Select I want this environment to use cross-account CloudTrail to centralize CloudTrail log collection.
- Enter the Role ARN and External ID for the receiving account.
- Click CREATE.