Skip to content

Collect AWS CloudTrail logs using Cribl LogStream. Use this pack to optimize your CloudTrail events and send relevant events into your logging or SIEM solution.

License

Notifications You must be signed in to change notification settings

criblpacks/cribl-aws-cloudtrail-logs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cribl Pack for AWS CloudTrail Data Collection


This pack will help collect your Amazon Web Services (AWS) CloudTrail logs from an existing S3 bucket and into your logging solution of choice. The pipelines will help remove unnecessary fields and events thus reducing the noise and clutter of CloudTrail events. This pack is based on the blog post https://cribl.io/blog/threat-hunting-while-staying-compliant-categorizing-and-scoring-aws-cloudtrail-events-in-real-time/ . From here we built a content pack that helps lay the groundwork for collecting CloudTrail logs.

Uses for Cribl Content Pack


  • Share CloudTrail data between accounts / teams with the peace of mind that sensitive data is being redacted.
  • Easily consume AWS CloudTrail data without having to ingest useless fields and events. Lower the cost of collecting these chatty logs.
  • Test out new security products by simply adding a new route to send your data.
  • Replay old CloudTrail logs into ML/AI based security products to see if are any unknown threats or issues in your environment.

Requirements Section

Before you begin, ensure that you have met the following requirements:

  • Access to your CloudTrail S3 Bucket
  • A working Cribl LogStream Cloud Account

Release Notes

Version 0.0.1 - 2022-01-05

In this release, we have a couple simple use cases for CloudTrail data.

Contributing to the Pack

To contribute to the Pack, please do the following:

  • Pipelines :
    • To mask / redact sensetive data such as Account ID's, Access / Secret Keys
    • Remove cypher keys from events
    • Drop Describe, List and Get events
    • Lookup IP Addresses against a known list of AWS sourced IP ranges
  • Knowledge

Feel free to update the github for this pack : https://github.com/criblpacks/cribl-aws-cloudtrail-logs

Contact

Kam Amir - Cribl : [email protected]

License

This Pack uses the following license: Apache 2.0

About

Collect AWS CloudTrail logs using Cribl LogStream. Use this pack to optimize your CloudTrail events and send relevant events into your logging or SIEM solution.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published