Change Guardian monitors the following in AWS IAM:
Access Control
Groups
Identity and Profiling
Policies
User Accounts
This section provides the following information:
The following diagram illustrates how Change Guardian collects events from AWS IAM:
Complete the following tasks to start monitoring AWS IAM events:
Task |
See |
---|---|
Complete the prerequisites |
|
Add the license key |
|
Configure Change Guardian for monitoring |
Configuring Change Guardian for Monitoring |
Triage events |
Ensure that the following is complete:
You must configure the Change Guardian server to receive AWS IAM event logs from Change Guardian Event Collector Addon for Windows Agent.
To enable monitoring:
In Agent Manager, select the asset and click Manage Installations > Install Agents.
Or
In Agent Manager, select the asset and click Manage Installations > Reconfigure Agents.
In the Reconfigure Agent page, select Enable Collector Plugin under Edit Agent Configuration.
Specify the location to store CEF events in CEF Data Output Path.
NOTE:Ensure that the value in CEF Data Output Path matches the CEF data path you specify during Change Guardian Event Collector Addon for Windows Agent installation. You can get the CEF data path from the ceffolder parameter in <install_directory>\current\user\agent\agent.properties.
NOTE:Capturing of events from AWS cloudtrail to CEF logs is delayed. For more information, see Amazon SQS delay queues.
Access Control: Policies about the following:
Creating and deleting SAML
Server certificate
Signing certificate
Deleting, updating, and uploading SSH
Enabling, resyncing, and deactivating multi-factor authentication
Virtual multi-factor authentication
Groups: Polices about creating, changing, and deleting groups
Identity and Profiling: Policies about creating and deleting Instance Profile and OpenID Connect provider
Policies: Policies about the following:
Attaching and deleting group policy, role policy, and user policy
Creating and deleting policies and policy versions
User Accounts: Policies about the following:
Creating, changing and deleting access key, account alias, login profile, role, and user account
Changing user account password
For information about creating policies in Change Guardian, see Creating Policies.
After creating policies, you can assign them to assets. For information about assigning policies, see Working with Policies.