SIEM connector for Yandex Cloud
With SIEM connector for Yandex Cloud, you can collect audit logs from Yandex Cloud resources and deliver them to the SIEM system deployed in the organization infrastructure. The event data is sent in CEF format over the syslog protocol. You can use this data to monitor Yandex Cloud service operation, as well as to detect and analyze information security incidents.
-
Configure uploading audit logs uploads to Object Storage.
-
Create an IPSec VPN tunnel between the cloud network and the corporate one. For detailed information, see the Tutorial on deploying a SIEM connector for Yandex Cloud (in Russian).
-
Get an SSH key pair to connect to a virtual machine (VM).
-
Create a VM from a public image. Under Image/boot disk selection, go to the Cloud Marketplace tab and select SIEM connector for Yandex Cloud. Under Access:
- Enter the username in the Login field.
- Paste the contents of the public key file in the SSH key field.
Save the VM public IP address.
-
Connect to the VM over SSH. Use the username you provided when creating the VM, as well as the private key.
-
Mount the bucket with audit logs to the VM’s file system using s3fs:
-
To set up the SIEM connector, run this command:
sudo /home/agent/yc_agent/agent agentsetup
-
To create a new configuration, enter
1
(create new config
). -
Select the configuration component:
3
(jsonfolderfollower
). -
Install the sources for audit logs:
- Enter
1
(Add, modify, or remove sources
). - Select
A
(Add
) and set the parameters for the sources:- In the
config file
field, enteryc
. - In the
folder
field, specify the path to the mounted bucket with audit logs, e.g.,/home/agent/logs/
. - In the
wildcard
field, enter the*.json
log mask. - In the
mode
field, specify what to do with logs once they have been processed on the VM:D
(DeleteFile
) orR
(RenameFile
). - In the
process folders recursively
field, typeY
(Yes
).
- In the
- Double-check the specified parameters and type
F
(Finish
).
- Enter
-
Set the destination for audit logs:
- Enter
2
(Add, modify, or remove destinations
). - Select
A
(Add
) and set the parameters for the destination:- In the
Destination type
field, enter0
(cefsyslog
). - In the
Host
field, enter the IP address of the server where you installed the SIEM system syslog connector in your corporate network. - In the
Port
field, specify514
. - In the
Protocol
field, specifyUDP
.
- In the
- Double-check the specified parameters and type
F
(Finish
).
- Enter
-
Start the SIEM connector:
- Enter
3
(Install as a service
). - To change the service name and description, at the
Change service name/description
prompt, typeY
(Yes
) and set the new parameters:- In the
Service name [inforter_agent_jsonfolderfollower]
field, enter the new name for the service. - In the
Description [inforter_agent_jsonfolderfollower]
field, enter the new service description.
- In the
- At the
Starting the service at startup
prompt, typeY
(Yes
).
- Enter
-
To exit the configuration menu, type
0
(Exit
).
- Cloud resource monitoring.
- Detecting information security incidents.
- Event analysis:
- Creating VMs.
- Adding external network interfaces for existing VMs.
- Adding a public IP address for existing VMs.
- Monitoring of access key management.
ATB
ATB provides paid technical support for SIEM connector users in Yandex Cloud. You can contact technical support:
- By phone: +7 (499) 648-75-48.
- By email: info@ast-security.ru.
Yandex Cloud
Yandex Cloud does not provide technical support for this product. If you have any issues, please refer to the respective developer’s information resources.